• HOME
  • IEEE Projects
    • IEEE Projects 2017 Dot Net Projects
    • IEEE Projects 2017 Java Projects
    • IEEE Projects 2016 Dot Net Projects
    • IEEE Projects 2016 Java Projects
    • IEEE Projects 2015
    • IEEE Projects 2014
      • IEEE 2014 Java Projects
        • IEEE Projects 2014 For Cse in Data Mining Java
        • IEEE Projects 2014 For Cse in cloud computing Java
        • IEEE Projects 2014 For Cse in Image Processing Java
        • IEEE Projects 2014 For Cse in Mobile Computing Java
        • IEEE Projects 2014 For Cse in Networking Java
        • IEEE Projects 2014 For Cse in Network Security Java
        • IEEE Projects 2014 For Cse in Software Engineering Java
      • IEEE 2014 Dotnet Projects
        • IEEE Projects 2014 For Cse in Data Mining Dotnet
        • IEEE Projects 2014 For Cse in Cloud Computing Dotnet
        • IEEE Projects 2014 For Cse in Netwoking Dotnet
        • IEEE Projects 2014 For Cse in Netwok Security Dotnet
    • IEEE Projects 2013
      • IEEE 2013 JAVA Projects
      • IEEE 2013 Dotnet Projects
    • IEEE Projects 2012
      • IEEE 2012 JAVA Projects
      • IEEE 2012 Dotnet Projects
    • IEEE Projects 2011
      • IEEE 2011 JAVA Projects
      • IEEE 2011 Dotnet Projects
    • IEEE Projects 2010
  • Power Electronics Projects
    • IEEE Projects 2015 For Power Electronics
    • IEEE Projects 2014 For Power Electronics
    • IEEE 2013 Power Electronics Projects
  • EMBEDDED Projects
    • IEEE Projects 2015 For Embedded Systems
    • IEEE 2013 Embedded Projects
  • Matlab Projects
    • IEEE 2013 Image Processing Projects
    • IEEE 2013 Power Electronics Projects
    • IEEE 2013 Communication Projects
  • NS2 Projects

Phd Projects | IEEE Project | IEEE Projects 2020-19 in Trichy & Chennai

IEEE Projects Trichy, Best IEEE Project Centre Chennai, Final Year Projects in Trichy - We Provide IEEE projects 2018 - 2019 , IEEE 2018 Java Projects for M.E/M.Tech, IEEE 2018 Dot net Projects for B.E/B.Tech, IEEE 2018 Power electronics Projects Engineering & Diploma Students, Matlab, Embedded, NS2 Projects
  • HOME
  • IEEE 2017 DOT NET PROJECT TITLES
  • IEEE 2017 JAVA PROJECT TITLES
  • CONTACT US
You are here: Home / bulk ieee projects 2013 / Privacy Preservation in distributed social network using clustering technique

Privacy Preservation in distributed social network using clustering technique

November 30, 2013 by IeeeAdmin

Networks are structures that describe a set of entities and the relations between them. A social network, for example, provides information on individuals in some population and the links between them, which may describe relations of friendship, collaboration, correspondence and so forth. An information network, as another example, may describe scientific publications and their citation links. The nodes of the graph correspond to the entities, while edges denote relations between them. Real social networks may be more complex or contain additional information. the graph would be directed; if the interaction involves more than two parties (e.g., a social network that describes co-membership in social clubs) then the network would be modeled as a hyper-graph; There are several types of interaction, the edges would be labeled; or the nodes in the graph could be accompanied by attributes that provide demographic information such as age, gender, location or occupation which could enrich and shed light on the structure of the network. the data in such social networks cannot be released as is, since it might contain sensitive information. A naive anonymization of the network, in the sense of removing identifying attributes like names or social security numbers from the data, is insufficient. The mere structure of the released graph may reveal the identity of the individuals behind some of the nodes. The methods of the first category provide k-anonymity via a deterministic procedure of edge additions or deletions. Those methods it is assumed that the adversary has a background knowledge regarding some property of its target node, and then those methods modify the graph so that it becomes k-anonymous with respect to that assumed property. The methods of the second category add noise to the data, in the form of random additions, deletions or switching of edges, in order to prevent adversaries from identifying their target in the network, or inferring the existence of links between nodes

Filed Under: bulk ieee projects 2013 Tagged With: bulk ieee projects 2015, ieee 2015 bulk projects, ieee projects 2015 bulk

Copyright © 2025 · News Pro Theme on Genesis Framework · WordPress · Log in