Skip to main content

Table 1 Classification of privacy preservation techniques based on sensitive information

From: Social network integration and analysis using a generalization and probabilistic approach for privacy preservation

  

Types of sensitive information

      
  

Node

Node

Link

Link

Subgraph

Aggregated

Other

  

Existence

Properties

Existence

Properties

Property

Graph property

Graph information

Privacy preservation techniques

Perturbation

 

[10]

[16]

  

[16]

 
 

Based

       
 

Technique

       
 

Generalization

[4, 6]

[8,9,11]

[4, 6, 15]

   

[8]

 

Based

       
 

Technique

       
 

Hybrid

 

[12]

[13]

[13]

[12]

  
 

(Perturbation & Generalization)

       
 

Protocol

      

[22]

 

Based

       
 

Technique