Results (
Arabic) 1:
[Copy]Copied!
In this technique, during anonymization phase fake nodes are added to the clusters toanonymize the nodes within. The degree of fake nodes is taken as maximum of themost probable degree (The degree which maximum number of nodes in the graphpossess) and the average degree of the graph. This is done to ensure that averagedegree of graph and the structural properties of graph are maintained. To achievethis, the edges are added to connect these fake nodes with the existing needy nodestill the degree of the former crosses this most probably degree value, followingwhich a new fake node is created. Edges are added between the fake nodes and nodesof the clusters which require higher degree to achieve anonymity. In some cases, thedegree required by all the nodes in clusters may be satisfied, but the fake nodesthemselves might not be anonymized. To anonymize fake nodes we connect them toone another even if their degree exceeds themaximum degree possible. This wouldnot affect our original network because these nodes are redundant information inthemselves.
Being translated, please wait..