Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2539150.2539215acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiiwasConference Proceedingsconference-collections
research-article

Sensitive and Neighborhood Privacy on Shortest Paths in the Cloud

Published: 02 December 2013 Publication History

Abstract

Efficient shortest path calculation has been studied extensively, in particular, in the distributed environment. However, preserving privacy in the cloud environment has just attracted latest attention. To preserve fixed-pattern one-neighborhood privacy in the cloud, current approach requires the calculation of all-pairs shortest paths in advance, which is time consuming for large graphs. In addition, specific paths that are sensitive and require hiding the source and destination vertices are not well addressed. In this work, we propose a new flexible k-neighborhood privacy-protection and efficient shortest distance computation scheme for sensitive shortest paths in the cloud environment. Combining the construction of k-skip shortest path sub-graphs, sensitive vertex adjustment, vertex hierarchy labeling and bottom-up partitioning techniques, the proposed approach not only subsumes one-neighborhood privacy but also provides efficient partitioning and query processing for sensitive shortest paths. Numerical experiments demonstrating the characteristics of proposed approach are presented.

References

[1]
D. Agrawal, A. El Abbadi, S. Antony, and S. Das, "Data management challenges in cloud computing infrastructures," in Proceedings of the 6th international conference on Databases in Networked Information Systems, Berlin, Heidelberg, 2010, pp. 1--10.
[2]
S. Das, O. Egecioglu, and A. El Abbadi, "Anonymizing weighted social network graphs," in 2010 IEEE 26th International Conference on Data Engineering (ICDE), 2010, pp. 904--907.
[3]
A. W.-C. Fu, H. Wu, J. Cheng, S. Chu, and R. C.-W. Wong, "IS-LABEL: an Independent-Set based Labeling Scheme for Point-to-Point Distance Querying on Large Graphs," arXiv: 1211.2367, Nov. 2012.
[4]
J. Gao, J. X. Yu, R. Jin, J. Zhou, T. Wang, and D. Yang, "'Neighborhood-privacy protected shortest distance computing in cloud," in Proceedings of the 2011 ACM SIGMOD International Conference on Management of data, New York, NY, USA, 2011, pp. 409--120.
[5]
M. Hay, G. Miklau, D. Jensen, D. Towsley, and P. Weis, "Resisting structural re-identification in anonymized social networks," Proc Vldb Endow, vol. 1, no. 1, pp. 102--114, Aug. 2008.
[6]
IPython.parallel, http://ipython.org/ipython-doc/dev/parallel/
[7]
K. Liu and E. Terzi, "Towards identity anonymization on graphs," in Proceedings of the 2008 ACM SIGMOD international conference on Management of data, New York, NY, USA, 2008, pp. 93--106.
[8]
L. Liu, J. Wang, J. Liu, J. Zhang, Privacy preservation in social networks with sensitive edge weights, In SDM, pages 954--965, 2009.
[9]
S.L. Wang, C.C. Shih, H.H. Ting, and T.P. Hong, "Degree Anonymization for K-Shortest-Path Privacy", 2013 IEEE International Conference on SMC, October, 2013, Manchester, UK.
[10]
S.L. Wang, Z.Z. Tsai, T.P. Hong, and H.H. Ting, "Anonymizing Shortest Paths on Social Network Graphs", The Third Asian Conference on Intelligent Information and Database Systems (ACIIDS). April, 2011, Daegu, Korea
[11]
Networkx, http://networkx.github.io/
[12]
Y. Tao, C. Sheng, and J. Pei, "On k-skip shortest paths," in Proceedings of the 2011 ACM SIGMOD International Conference on Management of data, New York, NY, USA, 2011, pp. 421--132.
[13]
VirtualBox, https://www.virtualbox.org/
[14]
M. Yuan, L. Chen, and P. S. Yu, "Personalized privacy protection in social networks," Proc VLDB Endow, vol. 4, no. 2, pp. 141--150, Nov. 2010.
[15]
B. Zhou and J. Pei, "Preserving Privacy in Social Networks Against Neighborhood Attacks," in Proceedings of the 2008 IEEE 24th International Conference on Data Engineering, Washington, DC, USA, 2008, pp. 506--515.

Cited By

View all
  • (2018)(K, P)-shortest path algorithm in the cloud maintaining neighborhood privacyJournal of Web Engineering10.5555/3177203.317720515:1-2(29-44)Online publication date: 21-Dec-2018

Index Terms

  1. Sensitive and Neighborhood Privacy on Shortest Paths in the Cloud

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    IIWAS '13: Proceedings of International Conference on Information Integration and Web-based Applications & Services
    December 2013
    753 pages
    ISBN:9781450321136
    DOI:10.1145/2539150
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    In-Cooperation

    • @WAS: International Organization of Information Integration and Web-based Applications and Services

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 02 December 2013

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. k-neighborhood privacy
    2. k-skip
    3. privacy preservation
    4. sensitive shortest path

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    IIWAS '13

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)1
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 18 Aug 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2018)(K, P)-shortest path algorithm in the cloud maintaining neighborhood privacyJournal of Web Engineering10.5555/3177203.317720515:1-2(29-44)Online publication date: 21-Dec-2018

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media