SlideShare a Scribd company logo
1 of 1
Download to read offline
ECWAY TECHNOLOGIES
IEEE PROJECTS & SOFTWARE DEVELOPMENTS
OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE
CELL: +91 98949 17187, +91 875487 2111 / 3111 / 4111 / 5111 / 6111
VISIT: www.ecwayprojects.com MAIL TO: ecwaytechnologies@gmail.com

ANONYMIZATION OF CENTRALIZED AND DISTRIBUTED SOCIAL
NETWORKS BY SEQUENTIAL CLUSTERING

ABSTRACT:

We study the problem of privacy-preservation in social networks. We consider the distributed
setting in which the network data is split between several data holders. The goal is to arrive at an
anonymized view of the unified network without revealing to any of the data holders information
about links between nodes that are controlled by other data holders. To that end, we start with the
centralized setting and offer two variants of an anonymization algorithm which is based on
sequential clustering (Sq).

Our algorithms significantly outperform the SaNGreeA algorithm due to Campan and Truta
which is the leading algorithm for achieving anonymity in networks by means of clustering. We
then devise secure distributed versions of our algorithms. To the best of our knowledge, this is
the first study of privacy preservation in distributed social networks. We conclude by outlining
future research proposals in that direction.

More Related Content

Viewers also liked

ภาษาอังกฤษช่วยสานฝันลูกของคุณได้อย่างไร
ภาษาอังกฤษช่วยสานฝันลูกของคุณได้อย่างไร ภาษาอังกฤษช่วยสานฝันลูกของคุณได้อย่างไร
ภาษาอังกฤษช่วยสานฝันลูกของคุณได้อย่างไร WallStreet English
 
Depression A Major Reason for Short-Term Disability
Depression A Major Reason for Short-Term DisabilityDepression A Major Reason for Short-Term Disability
Depression A Major Reason for Short-Term DisabilityDigital EYE Media
 
Construction industry report
Construction industry reportConstruction industry report
Construction industry reportAflac
 
Technology -- the first strategy to startups
Technology  -- the first strategy to startupsTechnology  -- the first strategy to startups
Technology -- the first strategy to startupstechmaddy
 
Abg basics-overview-pdf
Abg basics-overview-pdfAbg basics-overview-pdf
Abg basics-overview-pdfMahmoud Kareem
 
10.5 relative non-relative care assessment
10.5 relative non-relative care assessment10.5 relative non-relative care assessment
10.5 relative non-relative care assessmentscreaminc
 
Using Brain Waves as New Biometric Feature for Authenticating a Computer User...
Using Brain Waves as New Biometric Feature for Authenticating a Computer User...Using Brain Waves as New Biometric Feature for Authenticating a Computer User...
Using Brain Waves as New Biometric Feature for Authenticating a Computer User...CSCJournals
 
GIDS 2016 Understanding and Building No SQLs
GIDS 2016 Understanding and Building No SQLsGIDS 2016 Understanding and Building No SQLs
GIDS 2016 Understanding and Building No SQLstechmaddy
 
Statégie Numérique Tarn Tourisme
Statégie Numérique Tarn TourismeStatégie Numérique Tarn Tourisme
Statégie Numérique Tarn TourismeTarn Tourisme
 
ATELIER 7 - Des outils gratuits pour être mieux visible
ATELIER 7 - Des outils gratuits pour être mieux visibleATELIER 7 - Des outils gratuits pour être mieux visible
ATELIER 7 - Des outils gratuits pour être mieux visibleTarn Tourisme
 
Survey Analysis
Survey AnalysisSurvey Analysis
Survey AnalysisToni Lough
 

Viewers also liked (18)

GRATIS REPORT
GRATIS REPORTGRATIS REPORT
GRATIS REPORT
 
Ct. appeals
Ct. appealsCt. appeals
Ct. appeals
 
ภาษาอังกฤษช่วยสานฝันลูกของคุณได้อย่างไร
ภาษาอังกฤษช่วยสานฝันลูกของคุณได้อย่างไร ภาษาอังกฤษช่วยสานฝันลูกของคุณได้อย่างไร
ภาษาอังกฤษช่วยสานฝันลูกของคุณได้อย่างไร
 
Depression A Major Reason for Short-Term Disability
Depression A Major Reason for Short-Term DisabilityDepression A Major Reason for Short-Term Disability
Depression A Major Reason for Short-Term Disability
 
Construction industry report
Construction industry reportConstruction industry report
Construction industry report
 
Technology -- the first strategy to startups
Technology  -- the first strategy to startupsTechnology  -- the first strategy to startups
Technology -- the first strategy to startups
 
Cheese
CheeseCheese
Cheese
 
Abg basics-overview-pdf
Abg basics-overview-pdfAbg basics-overview-pdf
Abg basics-overview-pdf
 
prezentaacija
prezentaacijaprezentaacija
prezentaacija
 
#ET11 - A21-Design de services
#ET11 - A21-Design de services#ET11 - A21-Design de services
#ET11 - A21-Design de services
 
Bcm corporate brochure issue 17 eng final
Bcm corporate brochure issue 17 eng finalBcm corporate brochure issue 17 eng final
Bcm corporate brochure issue 17 eng final
 
10.5 relative non-relative care assessment
10.5 relative non-relative care assessment10.5 relative non-relative care assessment
10.5 relative non-relative care assessment
 
Using Brain Waves as New Biometric Feature for Authenticating a Computer User...
Using Brain Waves as New Biometric Feature for Authenticating a Computer User...Using Brain Waves as New Biometric Feature for Authenticating a Computer User...
Using Brain Waves as New Biometric Feature for Authenticating a Computer User...
 
GIDS 2016 Understanding and Building No SQLs
GIDS 2016 Understanding and Building No SQLsGIDS 2016 Understanding and Building No SQLs
GIDS 2016 Understanding and Building No SQLs
 
Statégie Numérique Tarn Tourisme
Statégie Numérique Tarn TourismeStatégie Numérique Tarn Tourisme
Statégie Numérique Tarn Tourisme
 
ATELIER 7 - Des outils gratuits pour être mieux visible
ATELIER 7 - Des outils gratuits pour être mieux visibleATELIER 7 - Des outils gratuits pour être mieux visible
ATELIER 7 - Des outils gratuits pour être mieux visible
 
Microdosing (Phase 0) studies
Microdosing (Phase 0) studiesMicrodosing (Phase 0) studies
Microdosing (Phase 0) studies
 
Survey Analysis
Survey AnalysisSurvey Analysis
Survey Analysis
 

Similar to Android anonymization of centralized and distributed social networks by sequential clustering

Android anonymization of centralized and distributed social networks by sequ...
Android  anonymization of centralized and distributed social networks by sequ...Android  anonymization of centralized and distributed social networks by sequ...
Android anonymization of centralized and distributed social networks by sequ...ecway
 
Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...ecway
 
Java anonymization of centralized and distributed social networks by sequent...
Java  anonymization of centralized and distributed social networks by sequent...Java  anonymization of centralized and distributed social networks by sequent...
Java anonymization of centralized and distributed social networks by sequent...ecwayerode
 
Toward a statistical framework for source anonymity in sensor networks
Toward a statistical framework for source anonymity in sensor networksToward a statistical framework for source anonymity in sensor networks
Toward a statistical framework for source anonymity in sensor networksEcwayt
 
Dotnet toward a statistical framework for source anonymity in sensor networks
Dotnet  toward a statistical framework for source anonymity in sensor networksDotnet  toward a statistical framework for source anonymity in sensor networks
Dotnet toward a statistical framework for source anonymity in sensor networksEcwaytech
 
Toward a statistical framework for source anonymity in sensor networks
Toward a statistical framework for source anonymity in sensor networksToward a statistical framework for source anonymity in sensor networks
Toward a statistical framework for source anonymity in sensor networksEcwaytech
 
Dotnet model-based analysis of wireless system architectures for real-time a...
Dotnet  model-based analysis of wireless system architectures for real-time a...Dotnet  model-based analysis of wireless system architectures for real-time a...
Dotnet model-based analysis of wireless system architectures for real-time a...Ecwaytech
 
Model based analysis of wireless system architectures for real-time applications
Model based analysis of wireless system architectures for real-time applicationsModel based analysis of wireless system architectures for real-time applications
Model based analysis of wireless system architectures for real-time applicationsecwayprojects
 
2014 ieee project android titles
2014 ieee project android titles2014 ieee project android titles
2014 ieee project android titlesEcwaytechnoz
 
2013 ieee project android titles
2013 ieee project android titles2013 ieee project android titles
2013 ieee project android titlesEcwaytechnoz
 
2014 ieee project android titles
2014 ieee project android titles2014 ieee project android titles
2014 ieee project android titlesEcwaytech
 
2013 ieee project android titles
2013 ieee project android titles2013 ieee project android titles
2013 ieee project android titlesEcwayt
 
2013 ieee project android titles
2013 ieee project android titles2013 ieee project android titles
2013 ieee project android titlesEcwayt
 
2014 ieee project android titles
2014 ieee project android titles2014 ieee project android titles
2014 ieee project android titlesEcway2004
 
2014 ieee project android titles
2014 ieee project android titles2014 ieee project android titles
2014 ieee project android titlesEcwaytechnoz
 
2013 ieee project android titles
2013 ieee project android titles2013 ieee project android titles
2013 ieee project android titlesEcway2004
 
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUDKEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUDNaseem nisar
 
Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt...
Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt...Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt...
Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt...Eswar Publications
 
Dotnet 2015 2016 2017 ieee project list-with abstract
Dotnet 2015 2016 2017 ieee project list-with abstractDotnet 2015 2016 2017 ieee project list-with abstract
Dotnet 2015 2016 2017 ieee project list-with abstractAdz91 Digital Ads Pvt Ltd
 

Similar to Android anonymization of centralized and distributed social networks by sequential clustering (20)

Android anonymization of centralized and distributed social networks by sequ...
Android  anonymization of centralized and distributed social networks by sequ...Android  anonymization of centralized and distributed social networks by sequ...
Android anonymization of centralized and distributed social networks by sequ...
 
Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...
 
Java anonymization of centralized and distributed social networks by sequent...
Java  anonymization of centralized and distributed social networks by sequent...Java  anonymization of centralized and distributed social networks by sequent...
Java anonymization of centralized and distributed social networks by sequent...
 
Ijcnc050210
Ijcnc050210Ijcnc050210
Ijcnc050210
 
Toward a statistical framework for source anonymity in sensor networks
Toward a statistical framework for source anonymity in sensor networksToward a statistical framework for source anonymity in sensor networks
Toward a statistical framework for source anonymity in sensor networks
 
Dotnet toward a statistical framework for source anonymity in sensor networks
Dotnet  toward a statistical framework for source anonymity in sensor networksDotnet  toward a statistical framework for source anonymity in sensor networks
Dotnet toward a statistical framework for source anonymity in sensor networks
 
Toward a statistical framework for source anonymity in sensor networks
Toward a statistical framework for source anonymity in sensor networksToward a statistical framework for source anonymity in sensor networks
Toward a statistical framework for source anonymity in sensor networks
 
Dotnet model-based analysis of wireless system architectures for real-time a...
Dotnet  model-based analysis of wireless system architectures for real-time a...Dotnet  model-based analysis of wireless system architectures for real-time a...
Dotnet model-based analysis of wireless system architectures for real-time a...
 
Model based analysis of wireless system architectures for real-time applications
Model based analysis of wireless system architectures for real-time applicationsModel based analysis of wireless system architectures for real-time applications
Model based analysis of wireless system architectures for real-time applications
 
2014 ieee project android titles
2014 ieee project android titles2014 ieee project android titles
2014 ieee project android titles
 
2013 ieee project android titles
2013 ieee project android titles2013 ieee project android titles
2013 ieee project android titles
 
2014 ieee project android titles
2014 ieee project android titles2014 ieee project android titles
2014 ieee project android titles
 
2013 ieee project android titles
2013 ieee project android titles2013 ieee project android titles
2013 ieee project android titles
 
2013 ieee project android titles
2013 ieee project android titles2013 ieee project android titles
2013 ieee project android titles
 
2014 ieee project android titles
2014 ieee project android titles2014 ieee project android titles
2014 ieee project android titles
 
2014 ieee project android titles
2014 ieee project android titles2014 ieee project android titles
2014 ieee project android titles
 
2013 ieee project android titles
2013 ieee project android titles2013 ieee project android titles
2013 ieee project android titles
 
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUDKEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
 
Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt...
Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt...Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt...
Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt...
 
Dotnet 2015 2016 2017 ieee project list-with abstract
Dotnet 2015 2016 2017 ieee project list-with abstractDotnet 2015 2016 2017 ieee project list-with abstract
Dotnet 2015 2016 2017 ieee project list-with abstract
 

More from Ecwaytechnoz

Wheelztracker.pptx
Wheelztracker.pptxWheelztracker.pptx
Wheelztracker.pptxEcwaytechnoz
 
Coloring based inter-wban scheduling for mobile wireless body area networks
Coloring based inter-wban scheduling for mobile wireless body area networksColoring based inter-wban scheduling for mobile wireless body area networks
Coloring based inter-wban scheduling for mobile wireless body area networksEcwaytechnoz
 
Code modulation based encryption & decryption technique for secure communicat...
Code modulation based encryption & decryption technique for secure communicat...Code modulation based encryption & decryption technique for secure communicat...
Code modulation based encryption & decryption technique for secure communicat...Ecwaytechnoz
 
Clustering sentence level text using a novel fuzzy relational clustering algo...
Clustering sentence level text using a novel fuzzy relational clustering algo...Clustering sentence level text using a novel fuzzy relational clustering algo...
Clustering sentence level text using a novel fuzzy relational clustering algo...Ecwaytechnoz
 
Clustering large probabilistic graphs
Clustering large probabilistic graphsClustering large probabilistic graphs
Clustering large probabilistic graphsEcwaytechnoz
 
Cloudsim t-drive enhancing driving directions with taxi drivers’ intelligence
Cloudsim  t-drive enhancing driving directions with taxi drivers’ intelligenceCloudsim  t-drive enhancing driving directions with taxi drivers’ intelligence
Cloudsim t-drive enhancing driving directions with taxi drivers’ intelligenceEcwaytechnoz
 
Cloudsim ranking on data manifold with sink points
Cloudsim  ranking on data manifold with sink pointsCloudsim  ranking on data manifold with sink points
Cloudsim ranking on data manifold with sink pointsEcwaytechnoz
 
Cloudsim quality-differentiated video multicast in multirate wireless networks
Cloudsim  quality-differentiated video multicast in multirate wireless networksCloudsim  quality-differentiated video multicast in multirate wireless networks
Cloudsim quality-differentiated video multicast in multirate wireless networksEcwaytechnoz
 
Cloudsim power allocation for statistical qo s provisioning in opportunistic...
Cloudsim  power allocation for statistical qo s provisioning in opportunistic...Cloudsim  power allocation for statistical qo s provisioning in opportunistic...
Cloudsim power allocation for statistical qo s provisioning in opportunistic...Ecwaytechnoz
 
Cloudsim distributed web systems performance forecasting using turning bands...
Cloudsim  distributed web systems performance forecasting using turning bands...Cloudsim  distributed web systems performance forecasting using turning bands...
Cloudsim distributed web systems performance forecasting using turning bands...Ecwaytechnoz
 
Cloudsim distributed processing of probabilistic top-k queries in wireless s...
Cloudsim  distributed processing of probabilistic top-k queries in wireless s...Cloudsim  distributed processing of probabilistic top-k queries in wireless s...
Cloudsim distributed processing of probabilistic top-k queries in wireless s...Ecwaytechnoz
 
Chopper based dc motor speed control
Chopper based dc motor speed controlChopper based dc motor speed control
Chopper based dc motor speed controlEcwaytechnoz
 
Channel assignment for throughput optimization in multichannel multiradio wir...
Channel assignment for throughput optimization in multichannel multiradio wir...Channel assignment for throughput optimization in multichannel multiradio wir...
Channel assignment for throughput optimization in multichannel multiradio wir...Ecwaytechnoz
 
Channel allocation and routing in hybrid multichannel multiradio wireless mes...
Channel allocation and routing in hybrid multichannel multiradio wireless mes...Channel allocation and routing in hybrid multichannel multiradio wireless mes...
Channel allocation and routing in hybrid multichannel multiradio wireless mes...Ecwaytechnoz
 
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoringEcwaytechnoz
 
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoringEcwaytechnoz
 
Capacity of hybrid wireless mesh networks with random a ps
Capacity of hybrid wireless mesh networks with random a psCapacity of hybrid wireless mesh networks with random a ps
Capacity of hybrid wireless mesh networks with random a psEcwaytechnoz
 
Bomb detection robot with wireless camera
Bomb detection robot with wireless cameraBomb detection robot with wireless camera
Bomb detection robot with wireless cameraEcwaytechnoz
 
Bed side patients monitoring system with emergency alert
Bed side patients monitoring system with  emergency alertBed side patients monitoring system with  emergency alert
Bed side patients monitoring system with emergency alertEcwaytechnoz
 

More from Ecwaytechnoz (20)

Wheelztracker.pptx
Wheelztracker.pptxWheelztracker.pptx
Wheelztracker.pptx
 
Coloring based inter-wban scheduling for mobile wireless body area networks
Coloring based inter-wban scheduling for mobile wireless body area networksColoring based inter-wban scheduling for mobile wireless body area networks
Coloring based inter-wban scheduling for mobile wireless body area networks
 
Code modulation based encryption & decryption technique for secure communicat...
Code modulation based encryption & decryption technique for secure communicat...Code modulation based encryption & decryption technique for secure communicat...
Code modulation based encryption & decryption technique for secure communicat...
 
Clustering sentence level text using a novel fuzzy relational clustering algo...
Clustering sentence level text using a novel fuzzy relational clustering algo...Clustering sentence level text using a novel fuzzy relational clustering algo...
Clustering sentence level text using a novel fuzzy relational clustering algo...
 
Clustering large probabilistic graphs
Clustering large probabilistic graphsClustering large probabilistic graphs
Clustering large probabilistic graphs
 
Cloudsim t-drive enhancing driving directions with taxi drivers’ intelligence
Cloudsim  t-drive enhancing driving directions with taxi drivers’ intelligenceCloudsim  t-drive enhancing driving directions with taxi drivers’ intelligence
Cloudsim t-drive enhancing driving directions with taxi drivers’ intelligence
 
Cloudsim ranking on data manifold with sink points
Cloudsim  ranking on data manifold with sink pointsCloudsim  ranking on data manifold with sink points
Cloudsim ranking on data manifold with sink points
 
Cloudsim quality-differentiated video multicast in multirate wireless networks
Cloudsim  quality-differentiated video multicast in multirate wireless networksCloudsim  quality-differentiated video multicast in multirate wireless networks
Cloudsim quality-differentiated video multicast in multirate wireless networks
 
Cloudsim power allocation for statistical qo s provisioning in opportunistic...
Cloudsim  power allocation for statistical qo s provisioning in opportunistic...Cloudsim  power allocation for statistical qo s provisioning in opportunistic...
Cloudsim power allocation for statistical qo s provisioning in opportunistic...
 
Cloudsim distributed web systems performance forecasting using turning bands...
Cloudsim  distributed web systems performance forecasting using turning bands...Cloudsim  distributed web systems performance forecasting using turning bands...
Cloudsim distributed web systems performance forecasting using turning bands...
 
Cloudsim distributed processing of probabilistic top-k queries in wireless s...
Cloudsim  distributed processing of probabilistic top-k queries in wireless s...Cloudsim  distributed processing of probabilistic top-k queries in wireless s...
Cloudsim distributed processing of probabilistic top-k queries in wireless s...
 
Civil 2013 titles
Civil 2013 titlesCivil 2013 titles
Civil 2013 titles
 
Chopper based dc motor speed control
Chopper based dc motor speed controlChopper based dc motor speed control
Chopper based dc motor speed control
 
Channel assignment for throughput optimization in multichannel multiradio wir...
Channel assignment for throughput optimization in multichannel multiradio wir...Channel assignment for throughput optimization in multichannel multiradio wir...
Channel assignment for throughput optimization in multichannel multiradio wir...
 
Channel allocation and routing in hybrid multichannel multiradio wireless mes...
Channel allocation and routing in hybrid multichannel multiradio wireless mes...Channel allocation and routing in hybrid multichannel multiradio wireless mes...
Channel allocation and routing in hybrid multichannel multiradio wireless mes...
 
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoring
 
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoring
 
Capacity of hybrid wireless mesh networks with random a ps
Capacity of hybrid wireless mesh networks with random a psCapacity of hybrid wireless mesh networks with random a ps
Capacity of hybrid wireless mesh networks with random a ps
 
Bomb detection robot with wireless camera
Bomb detection robot with wireless cameraBomb detection robot with wireless camera
Bomb detection robot with wireless camera
 
Bed side patients monitoring system with emergency alert
Bed side patients monitoring system with  emergency alertBed side patients monitoring system with  emergency alert
Bed side patients monitoring system with emergency alert
 

Android anonymization of centralized and distributed social networks by sequential clustering

  • 1. ECWAY TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE CELL: +91 98949 17187, +91 875487 2111 / 3111 / 4111 / 5111 / 6111 VISIT: www.ecwayprojects.com MAIL TO: ecwaytechnologies@gmail.com ANONYMIZATION OF CENTRALIZED AND DISTRIBUTED SOCIAL NETWORKS BY SEQUENTIAL CLUSTERING ABSTRACT: We study the problem of privacy-preservation in social networks. We consider the distributed setting in which the network data is split between several data holders. The goal is to arrive at an anonymized view of the unified network without revealing to any of the data holders information about links between nodes that are controlled by other data holders. To that end, we start with the centralized setting and offer two variants of an anonymization algorithm which is based on sequential clustering (Sq). Our algorithms significantly outperform the SaNGreeA algorithm due to Campan and Truta which is the leading algorithm for achieving anonymity in networks by means of clustering. We then devise secure distributed versions of our algorithms. To the best of our knowledge, this is the first study of privacy preservation in distributed social networks. We conclude by outlining future research proposals in that direction.