Skip to main content

Table 1 Classification of privacy preservation techniques based on sensitive information

From: Social network integration and analysis using a generalization and probabilistic approach for privacy preservation

   Types of sensitive information       
   Node Node Link Link Subgraph Aggregated Other
   Existence Properties Existence Properties Property Graph property Graph information
Privacy preservation techniques Perturbation   [10] [16]    [16]  
  Based        
  Technique        
  Generalization [4, 6] [8,9,11] [4, 6, 15]     [8]
  Based        
  Technique        
  Hybrid   [12] [13] [13] [12]   
  (Perturbation & Generalization)        
  Protocol        [22]
  Based        
  Technique