Skip to Main Content (Press Enter)

Logo UNINSUBRIA
  • ×
  • Home
  • Degrees
  • Courses
  • Jobs
  • People
  • Outputs
  • Organizations
  • Third Mission
  • Projects
  • Expertise & Skills

UNI-FIND
Logo UNINSUBRIA

|

UNI-FIND

uninsubria.it
  • ×
  • Home
  • Degrees
  • Courses
  • Jobs
  • People
  • Outputs
  • Organizations
  • Third Mission
  • Projects
  • Expertise & Skills
  1. Outputs

Protecting Privacy in Knowledge Graphs With Personalized Anonymization

Academic Article
Publication Date:
2024
abstract:
Knowledge graphs (KGs) are emerging data models allowing data providers to share data. This data sharing might bring new knowledge and collaborations, with evident benefits for providers. However, since KGs might contain sensitive information about users, it is of utmost importance to ensure KG anonymization before publishing. Recently, some proposals have addressed the problem of KGs' anonymization based on the k k-anonymity principle. These techniques propose to anonymize the whole dataset with the same anonymization level. However, in a contest where data are collected from different users, it is crucial to consider also users' preferences on the anonymization level to adopt for their data. To cope with this requirement, this paper presents the Personalized k k-Attribute Degree (p-k k-ad) principle. It allows users to specify their anonymity levels (the k k values) while preventing adversaries from re-identifying them with a confidence higher than frac1k 1k with their specified k k. Moreover, we design the Personalized Cluster-Based Knowledge Graph Anonymization Algorithm (PCKGA) to generate anonymized KGs satisfying p-k k-ad. We conduct experiments on four real-life datasets and show that PCKGA greatly improves the quality of anonymized KGs comparing to previous algorithms.
Iris type:
Articolo su Rivista
List of contributors:
Hoang, A. -T.; Carminati, B.; Ferrari, E.
Authors of the University:
CARMINATI BARBARA
FERRARI ELENA
Handle:
https://irinsubria.uninsubria.it/handle/11383/2179551
Published in:
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING
Journal
  • Accessibility
  • Use of cookies

Powered by VIVO | Designed by Cineca | 26.4.5.0