R.Rajeshkumar et al, International Journal of Computer Science and Mobile Computing, Vol.3 Issue.10, October- 2014, pg. 910-917
© 2014, IJCSMC All Rights Reserved 910
Available Online at www.ijcsmc.com
International Journal of Computer Science and Mobile Computing
A Monthly Journal of Computer Science and Information Technology
ISSN 2320–088X
IJCSMC, Vol. 3, Issue. 10, October 2014, pg.910 – 917
SURVEY ARTICLE
A Survey on Optimized Structural Diversity
R.Rajeshkumar
1
, S.Saranya
2
, S.Shanthi
3
1,2
M.E Scholar, Department of Computer Science and Engineering
3
Assistant Professor, Department of Computer Science and Engineering
Sri Eshwar College of Engineering, Coimbatore
rajeshdreams07@gmail.com
1
, saranyacse41@gmail.com
2
, shan.sece@gmail.com
3
Abstract - This paper identifies various concepts involved in social networks for anonymizing the original details
of the user. We focus on the various methods that can be applied for applying the anonymization techniques. The
methods used are re-identification, k-isomorphism, k-automorphism and k
w
-SDA. These methods are used to
provide the security and privacy for each user and the community in the social networks. The k
w
-SDA method is
used to prevent privacy breaches in dynamic networks and minimize graph alterations.
Keywords - Social network, privacy, anonymization, re-identification, k-isomorphism, k-automorphism
I. INTRODUCTION
Social data mining has some privacy and security challenges like stealing the original information of users. To
overcome these challenges there are variety of methods have been proposed. Although, anonymization of the information is
again the challenging task. For this, the methods such as re-identification, k-isomorphism, k-automorphism and k
w
-SDA and R-
MAT. In re-identification, privacy risks are associated with releasing network datasets are identified. This method mainly
concentrates on risk assessment. K-isomorphism is used for privacy preserving publication against structural attacks. K-
anonymity does not protect data against link info attacks. k
w
-Structural Diversity Anonymity is used to identify protection in
sequential releases of dynamic networks. This technique is used to anonymize the graph based on previous releases and
minimize graph alterations. This method mainly used for protecting multicommunity identity. R-MAT generates graph by
operating on its adjacency matrix. It is used to generate the graph automatically with communities within communities.
A. R-MAT
The World Wide Web, the Internet topology and Peer-to-Peer networks follows surprising power-laws exhibit strange
―bow-tie" or ―jellyfish" structures, while still having a small diameter.