Security Breach in Anonymized Social networks

dc.contributor.authorAghvami, Mina
dc.contributor.authorKidane Hilina, Deribe
dc.contributor.departmentChalmers tekniska högskola / Institutionen för data- och informationsteknik (Chalmers)sv
dc.contributor.departmentChalmers University of Technology / Department of Computer Science and Engineering (Chalmers)en
dc.date.accessioned2019-07-03T13:17:34Z
dc.date.available2019-07-03T13:17:34Z
dc.date.issued2012
dc.description.abstractThe purpose of the study was to show a threat of privacy leak for members of social networks. The general way to protect the privacy of these networks is using anonymization methods. On the other hand, deanynimization methods exist against these anonymization algorithms. Those methods were introduced and one of them was explained in details. Improvements of the algorithm were suggested by changing different parameters of it based on the social networks characteristics. These parameters were limiting similarity score, eccentricity, sorting, degree limit, ordering, and degree comparison and running the algorithm in two stages. The result of the experiment showed that by choosing proper values for similarity score, eccentricity, degree and also sorting the nodes, we can improve the performance of the algorithm by preventing it from propagating in the wrong direction. Sorting the nodes will also improve the result with a similar reason.
dc.identifier.urihttps://hdl.handle.net/20.500.12380/184492
dc.language.isoeng
dc.setspec.uppsokTechnology
dc.subjectData- och informationsvetenskap
dc.subjectComputer and Information Science
dc.titleSecurity Breach in Anonymized Social networks
dc.type.degreeExamensarbete för masterexamensv
dc.type.degreeMaster Thesisen
dc.type.uppsokH
local.programmeComputer science – algorithms, languages and logic (MPALG), MSc
Ladda ner
Original bundle
Visar 1 - 1 av 1
Hämtar...
Bild (thumbnail)
Namn:
184492.pdf
Storlek:
759.63 KB
Format:
Adobe Portable Document Format
Beskrivning:
Fulltext