Nettleton, David F.Torra, Vicenç2020-03-102020-03-102011Nettleton DF, Torra V. Data privacy for simply anonymized network logs represented as graphs-considerations for graph alteration operations. International Journal of Uncertainty, Fuzziness and Knowlege-Based Systems. 2011 Dec;19(suppl. 1):107-25. DOI: 10.1142/S02184885110073740218-4885http://hdl.handle.net/10230/43848In this paper we review the state of the art on graph privacy with special emphasis on applications to online social networks, and we consider some novel aspects which have not been greatly covered in the specialized literature on graph privacy. The following key considerations are covered: (i) choice of different operators to modify the graph; (ii) information loss based on the cost of graph operations in terms of statistical characteristics (degree, clustering coefficient and path length) in the original graph; (iii) computational cost of the operations; (iv) in the case of the aggregation of two nodes, the choice of similar adjacent nodes rather than isomorphic topologies, in order to maintain the overall structure of the graph; (v) a statistically knowledgeable attacker who is able to search for regions of a simply anonymized graph based on statistical characteristics and map those onto a given node and its immediate neighborhood.application/pdfengElectronic version of an article published as International Journal of Uncertainty, Fuzziness and Knowlege-Based Systems. 2011 Dec;19(suppl. 1):107-125. DOI: 10.1142/S0218488511007374 © copyright World Scientific Publishing Company https://www.worldscientific.com/worldscinet/ijufksData privacy for simply anonymized network logs represented as graphs-considerations for graph alteration operationsinfo:eu-repo/semantics/articlehttp://dx.doi.org/10.1142/S0218488511007374Data privacyGraphsOperatorsHeuristicsinfo:eu-repo/semantics/openAccess