R.Rajeshkumar et al, International Journal of Computer Science and Mobile Computing, Vol.3 Issue.10, October- 2014, pg. 910-917 © 2014, IJCSMC All Rights Reserved 910 Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320088X IJCSMC, Vol. 3, Issue. 10, October 2014, pg.910 917 SURVEY ARTICLE A Survey on Optimized Structural Diversity R.Rajeshkumar 1 , S.Saranya 2 , S.Shanthi 3 1,2 M.E Scholar, Department of Computer Science and Engineering 3 Assistant Professor, Department of Computer Science and Engineering Sri Eshwar College of Engineering, Coimbatore rajeshdreams07@gmail.com 1 , saranyacse41@gmail.com 2 , shan.sece@gmail.com 3 Abstract - This paper identifies various concepts involved in social networks for anonymizing the original details of the user. We focus on the various methods that can be applied for applying the anonymization techniques. The methods used are re-identification, k-isomorphism, k-automorphism and k w -SDA. These methods are used to provide the security and privacy for each user and the community in the social networks. The k w -SDA method is used to prevent privacy breaches in dynamic networks and minimize graph alterations. Keywords - Social network, privacy, anonymization, re-identification, k-isomorphism, k-automorphism I. INTRODUCTION Social data mining has some privacy and security challenges like stealing the original information of users. To overcome these challenges there are variety of methods have been proposed. Although, anonymization of the information is again the challenging task. For this, the methods such as re-identification, k-isomorphism, k-automorphism and k w -SDA and R- MAT. In re-identification, privacy risks are associated with releasing network datasets are identified. This method mainly concentrates on risk assessment. K-isomorphism is used for privacy preserving publication against structural attacks. K- anonymity does not protect data against link info attacks. k w -Structural Diversity Anonymity is used to identify protection in sequential releases of dynamic networks. This technique is used to anonymize the graph based on previous releases and minimize graph alterations. This method mainly used for protecting multicommunity identity. R-MAT generates graph by operating on its adjacency matrix. It is used to generate the graph automatically with communities within communities. A. R-MAT The World Wide Web, the Internet topology and Peer-to-Peer networks follows surprising power-laws exhibit strange ―bow-tie" or ―jellyfish" structures, while still having a small diameter.