-
Burning some myths on privacy properties of social networks against active attacks
Authors:
Serafino Cicerone,
Gabriele Di Stefano,
Sandi Klavžar,
Ismael G. Yero
Abstract:
This work focuses on showing some arguments addressed to dismantle the extended idea about that social networks completely lacks of privacy properties. We consider the so-called active attacks to the privacy of social networks and the counterpart $(k,\ell)$-anonymity measure, which is used to quantify the privacy satisfied by a social network against active attacks. To this end, we make use of the…
▽ More
This work focuses on showing some arguments addressed to dismantle the extended idea about that social networks completely lacks of privacy properties. We consider the so-called active attacks to the privacy of social networks and the counterpart $(k,\ell)$-anonymity measure, which is used to quantify the privacy satisfied by a social network against active attacks. To this end, we make use of the graph theoretical concept of $k$-metric antidimensional graphs for which the case $k=1$ represents those graphs achieving the worst scenario in privacy whilst considering the $(k,\ell)$-anonymity measure.
As a product of our investigation, we present a large number of computational results stating that social networks might not be as insecure as one often thinks. In particular, we develop a large number of experiments on random graphs which show that the number of $1$-metric antidimensional graphs is indeed ridiculously small with respect to the total number of graphs that can be considered. Moreover, we search on several real networks in order to check if they are $1$-metric antidimensional, and obtain that none of them are such. Along the way, we show some theoretical studies on the mathematical properties of the $k$-metric antidimensional graphs for any suitable $k\ge 1$. In addition, we also describe some operations on graphs that are $1$-metric antidimensional so that they get embedded into another larger graphs that are not such, in order to obscure their privacy properties against active attacks.
△ Less
Submitted 17 April, 2025;
originally announced April 2025.
-
Complexity Issues Concerning the Quadruple Roman Domination Problem in Graphs
Authors:
V. S. R. Palagiri,
G. P. Sharma,
I. G. Yero
Abstract:
Given a graph $G$ with vertex set $V(G)$, a mapping $h : V(G) \rightarrow \lbrace 0, 1, 2, 3, 4, 5 \rbrace$ is called a quadruple Roman dominating function (4RDF) for $G$ if it holds the following. Every vertex $x$ such that $h(x)\in \{0,1,2, 3\}$ satisfies that $h(N[x]) = \sum_{v\in N[x]} h(v) \geq |\{y:y \in N(x) \; \text{and} \; h(y) \neq 0\}|+4$, where $N(x)$ and $N[x]$ stands for the open and…
▽ More
Given a graph $G$ with vertex set $V(G)$, a mapping $h : V(G) \rightarrow \lbrace 0, 1, 2, 3, 4, 5 \rbrace$ is called a quadruple Roman dominating function (4RDF) for $G$ if it holds the following. Every vertex $x$ such that $h(x)\in \{0,1,2, 3\}$ satisfies that $h(N[x]) = \sum_{v\in N[x]} h(v) \geq |\{y:y \in N(x) \; \text{and} \; h(y) \neq 0\}|+4$, where $N(x)$ and $N[x]$ stands for the open and closed neighborhood of $x$, respectively. The smallest possible weight $\sum_{x \in V(G)} h(x)$ among all possible 4RDFs $h$ for $G$ is the quadruple Roman domination number of $G$, denoted by $γ_{[4R]}(G)$.
This work is focused on complexity aspects for the problem of computing the value of this parameter for several graph classes. Specifically, it is shown that the decision problem concerning $γ_{[4R]}(G)$ is NP-complete when restricted to star convex bipartite, comb convex bipartite, split and planar graphs. In contrast, it is also proved that such problem can be efficiently solved for threshold graphs where an exact solution is demonstrated, while for graphs having an efficient dominating set, tight upper and lower bounds in terms of the classical domination number are given. In addition, some approximation results to the problem are given. That is, we show that the problem cannot be approximated within $(1 - ε) \ln |V|$ for any $ε> 0$ unless $P=NP$. An approximation algorithm for it is proposed, and its APX-completeness proved, whether graphs of maximum degree four are considered. Finally, an integer linear programming formulation for our problem is presented.
△ Less
Submitted 28 November, 2024;
originally announced November 2024.
-
Mutual-visibility problems on graphs of diameter two
Authors:
Serafino Cicerone,
Gabriele Di Stefano,
Sandi Klavžar,
Ismael G. Yero
Abstract:
The mutual-visibility problem in a graph $G$ asks for the cardinality of a largest set of vertices $S\subseteq V(G)$ so that for any two vertices $x,y\in S$ there is a shortest $x,y$-path $P$ so that all internal vertices of $P$ are not in $S$. This is also said as $x,y$ are visible with respect to $S$, or $S$-visible for short. Variations of this problem are known, based on the extension of the v…
▽ More
The mutual-visibility problem in a graph $G$ asks for the cardinality of a largest set of vertices $S\subseteq V(G)$ so that for any two vertices $x,y\in S$ there is a shortest $x,y$-path $P$ so that all internal vertices of $P$ are not in $S$. This is also said as $x,y$ are visible with respect to $S$, or $S$-visible for short. Variations of this problem are known, based on the extension of the visibility property of vertices that are in and/or outside $S$. Such variations are called total, outer and dual mutual-visibility problems. This work is focused on studying the corresponding four visibility parameters in graphs of diameter two, throughout showing bounds and/or closed formulae for these parameters.
The mutual-visibility problem in the Cartesian product of two complete graphs is equivalent to (an instance of) the celebrated Zarankievicz's problem. Here we study the dual and outer mutual-visibility problem for the Cartesian product of two complete graphs and all the mutual-visibility problems for the direct product of such graphs as well. We also study all the mutual-visibility problems for the line graphs of complete and complete bipartite graphs. As a consequence of this study, we present several relationships between the mentioned problems and some instances of the classical Turán problem. Moreover, we study the visibility problems for cographs and several non-trivial diameter-two graphs of minimum size.
△ Less
Submitted 4 January, 2024;
originally announced January 2024.
-
Variety of mutual-visibility problems in graphs
Authors:
Serafino Cicerone,
Gabriele Di Stefano,
Lara Drozek,
Jaka Hedzet,
Sandi Klavzar,
Ismael G. Yero
Abstract:
If $X$ is a subset of vertices of a graph $G$, then vertices $u$ and $v$ are $X$-visible if there exists a shortest $u,v$-path $P$ such that $V(P)\cap X \subseteq \{u,v\}$. If each two vertices from $X$ are $X$-visible, then $X$ is a mutual-visibility set. The mutual-visibility number of $G$ is the cardinality of a largest mutual-visibility set of $G$ and has been already investigated. In this pap…
▽ More
If $X$ is a subset of vertices of a graph $G$, then vertices $u$ and $v$ are $X$-visible if there exists a shortest $u,v$-path $P$ such that $V(P)\cap X \subseteq \{u,v\}$. If each two vertices from $X$ are $X$-visible, then $X$ is a mutual-visibility set. The mutual-visibility number of $G$ is the cardinality of a largest mutual-visibility set of $G$ and has been already investigated. In this paper a variety of mutual-visibility problems is introduced based on which natural pairs of vertices are required to be $X$-visible. This yields the total, the dual, and the outer mutual-visibility numbers. We first show that these graph invariants are related to each other and to the classical mutual-visibility number, and then we prove that the three newly introduced mutual-visibility problems are computationally difficult. According to this result, we compute or bound their values for several graphs classes that include for instance grid graphs and tori. We conclude the study by presenting some inter-comparison between the values of such parameters, which is based on the computations we made for some specific families.
△ Less
Submitted 29 July, 2023; v1 submitted 3 April, 2023;
originally announced April 2023.
-
Complexity and equivalency of multiset dimension and ID-colorings
Authors:
Anni Hakanen,
Ismael G. Yero
Abstract:
This investigation is firstly focused into showing that two metric parameters represent the same object in graph theory. That is, we prove that the multiset resolving sets and the ID-colorings of graphs are the same thing. We also consider some computational and combinatorial problems of the multiset dimension, or equivalently, the ID-number of graphs. We prove that the decision problem concerning…
▽ More
This investigation is firstly focused into showing that two metric parameters represent the same object in graph theory. That is, we prove that the multiset resolving sets and the ID-colorings of graphs are the same thing. We also consider some computational and combinatorial problems of the multiset dimension, or equivalently, the ID-number of graphs. We prove that the decision problem concerning finding the multiset dimension of graphs is NP-complete. We consider the multiset dimension of king grids and prove that it is bounded above by 4. We also give a characterization of the strong product graphs with one factor being a complete graph, and whose multiset dimension is not infinite.
△ Less
Submitted 10 July, 2024; v1 submitted 13 March, 2023;
originally announced March 2023.
-
On analyzing and evaluating privacy measures for social networks under active attack
Authors:
Bhaskar DasGupta,
Nasim Mobasheri,
Ismael G. Yero
Abstract:
Widespread usage of complex interconnected social networks such as Facebook, Twitter and LinkedIn in modern internet era has also unfortunately opened the door for privacy violation of users of such networks by malicious entities. In this article we investigate, both theoretically and empirically, privacy violation measures of large networks under active attacks that was recently introduced in (In…
▽ More
Widespread usage of complex interconnected social networks such as Facebook, Twitter and LinkedIn in modern internet era has also unfortunately opened the door for privacy violation of users of such networks by malicious entities. In this article we investigate, both theoretically and empirically, privacy violation measures of large networks under active attacks that was recently introduced in (Information Sciences, 328, 403-417, 2016). Our theoretical result indicates that the network manager responsible for prevention of privacy violation must be very careful in designing the network if its topology does not contain a cycle. Our empirical results shed light on privacy violation properties of eight real social networks as well as a large number of synthetic networks generated by both the classical Erdos-Renyi model and the scale-free random networks generated by the Barabasi-Albert preferential-attachment model.
△ Less
Submitted 16 September, 2018;
originally announced September 2018.
-
On the Computational Complexities of Three Privacy Measures for Large Networks Under Active Attack
Authors:
Tanima Chatterjee,
Bhaskar DasGupta,
Nasim Mobasheri,
Venkatkumar Srinivasan,
Ismael G. Yero
Abstract:
With the arrival of modern internet era, large public networks of various types have come to existence to benefit the society as a whole and several research areas such as sociology, economics and geography in particular. However, the societal and research benefits of these networks have also given rise to potentially significant privacy issues in the sense that malicious entities may violate the…
▽ More
With the arrival of modern internet era, large public networks of various types have come to existence to benefit the society as a whole and several research areas such as sociology, economics and geography in particular. However, the societal and research benefits of these networks have also given rise to potentially significant privacy issues in the sense that malicious entities may violate the privacy of the users of such a network by analyzing the network and deliberately using such privacy violations for deleterious purposes. Such considerations have given rise to a new active research area that deals with the quantification of privacy of users in large networks and the corresponding investigation of computational complexity issues of computing such quantified privacy measures. In this paper, we formalize three such privacy measures for large networks and provide non-trivial theoretical computational complexity results for computing these measures. Our results show the first two measures can be computed efficiently, whereas the third measure is provably hard to compute within a logarithmic approximation factor. Furthermore, we also provide computational complexity results for the case when the privacy requirement of the network is severely restricted, including an efficient logarithmic approximation.
△ Less
Submitted 5 July, 2016;
originally announced July 2016.
-
k-Metric Antidimension: a Privacy Measure for Social Graphs
Authors:
Rolando Trujillo-Rasua,
Ismael G. Yero
Abstract:
Let $G = (V, E)$ be a simple connected graph and $S = \{w_1, \cdots, w_t\} \subseteq V$ an ordered subset of vertices. The metric representation of a vertex $u\in V$ with respect to $S$ is the $t$-vector $r(u|S) = (d_G(u, w_1), \cdots, d_G(u, w_t))$, where $d_G(u, v)$ represents the length of a shortest $u-v$ path in $G$. The set $S$ is called a resolving set for $G$ if $r(u|S) = r(v|S)$ implies…
▽ More
Let $G = (V, E)$ be a simple connected graph and $S = \{w_1, \cdots, w_t\} \subseteq V$ an ordered subset of vertices. The metric representation of a vertex $u\in V$ with respect to $S$ is the $t$-vector $r(u|S) = (d_G(u, w_1), \cdots, d_G(u, w_t))$, where $d_G(u, v)$ represents the length of a shortest $u-v$ path in $G$. The set $S$ is called a resolving set for $G$ if $r(u|S) = r(v|S)$ implies $u = v$ for every $u, v \in V$. The smallest cardinality of a resolving set is the metric dimension of $G$. In this article we propose, to the best of our knowledge, a new problem in Graph Theory that resembles to the aforementioned metric dimension problem. We call $S$ a $k$-antiresolving set if $k$ is the largest positive integer such that for every vertex $v \in V-S$ there exist other $k-1$ different vertices $v_1, \cdots, v_{k-1} \in V-S$ with $r(v|S) = r(v_1|S) = \cdots = r(v_{k-1}|S)$, \emph{i.e.}, $v$ and $v_1, \cdots, v_{k-1}$ have the same metric representation with respect to $S$. The $k$-metric antidimension of $G$ is the minimum cardinality among all the $k$-antiresolving sets for $G$.
In this article, we introduce a novel privacy measure, named $(k, \ell)$-anonymity and based on the $k$-metric antidimension problem, aimed at evaluating the resistance of social graphs to active attacks. We, therefore, propose a true-biased algorithm for computing the $k$-metric antidimension of random graphs. The success rate of our algorithm, according to empirical results, is above $80 \%$ and $90 \%$ when looking for a $k$-antiresolving basis and a $k$-antiresolving set respectively. We also investigate theoretical properties of the $k$-antiresolving sets and the $k$-metric antidimension of graphs. In particular, we focus on paths, cycles, complete bipartite graphs and trees.
△ Less
Submitted 21 March, 2015; v1 submitted 9 August, 2014;
originally announced August 2014.