Loading [MathJax]/extensions/MathMenu.js
q-Anon: Rethinking Anonymity for Social Networks | IEEE Conference Publication | IEEE Xplore

q-Anon: Rethinking Anonymity for Social Networks


Abstract:

This paper proposes that social network data should be assumed public but treated private. Assuming this rather confusing requirement means that anonymity models such as ...Show More

Abstract:

This paper proposes that social network data should be assumed public but treated private. Assuming this rather confusing requirement means that anonymity models such as k-anonymity cannot be applied to the most common form of private data release on the internet, social network APIs. An alternative anonymity model, q-Anon, is presented, which measures the probability of an attacker logically deducing previously unknown information from a social network API while assuming the data being protected may already be public information. Finally, the feasibility of such an approach is evaluated suggesting that a social network site such as Facebook could practically implement an anonymous API using q-Anon, providing its users with an anonymous option to the current application model.
Date of Conference: 20-22 August 2010
Date Added to IEEE Xplore: 30 September 2010
ISBN Information:
Conference Location: Minneapolis, MN, USA
Citations are not available for this document.

I. Introduction

Traditional anonymity research assumes that data is released as a research-style microdata set or statistical data set with well understood data types. Furthermore, it is assumed that the data provider knows a priori the background knowledge of possible attackers and how the data will be used. These models use these assumptions to specify data types as “quasi-identifiable” or “sensitive”. However, it is not so simple to make these assumptions about social networks. It is not easy to predict how applications may use social network data nor can concrete assumptions be made about the background knowledge of those who may attack a social network user's privacy. As such, all social network data must be treated as both sensitive (private) and quasi-identifiable (public) which makes it difficult to apply existing anonymity models to social networks.

Cites in Papers - |

Cites in Papers - IEEE (3)

Select All
1.
A. Praveena, S. Smys, "Ensuring data security in cloud based social networks", 2017 International conference of Electronics, Communication and Aerospace Technology (ICECA), vol.2, pp.289-295, 2017.
2.
A. Praveena, S. Smys, "Prevention of inference attacks for private information in social networking sites", 2017 International Conference on Inventive Systems and Control (ICISC), pp.1-7, 2017.
3.
Prateek Joshi, C. -C. Jay Kuo, "Security and privacy in online social networks: A survey", 2011 IEEE International Conference on Multimedia and Expo, pp.1-6, 2011.

Cites in Papers - Other Publishers (7)

1.
Uma Shree Yadav, Brij B. Gupta, Dragan Peraković, Francisco José García Peñalvo, Ivan Cvitić, "Security and Privacy of Cloud-Based Online Online Social Media: A Survey", Sustainable Management of Manufacturing Systems in Industry 4.0, pp.213, 2022.
2.
Ratandeep Kaur, Manisha Sharma, Taruna S., "Ensemble Based Model for Privacy in Online Social Network", SSRN Electronic Journal, 2019.
3.
Hamman Samuel, Osmar Zaïane, Trust, Privacy and Security in Digital Business, vol.10442, pp.66, 2017.
4.
Azzedine Boukerche, Antonio A. F. Loureiro, Eduardo F. Nakamura, Horacio A. B. F. Oliveira, Heitor S. Ramos, Leandro A. Villas, "Cloud-assisted Computing for Event-driven Mobile Services", Mobile Networks and Applications, vol.19, no.2, pp.161, 2014.
5.
Irene Diaz, Anca Ralescu, Advances in Computational Intelligence, vol.300, pp.509, 2012.
6.
Juuso Karikoski, "Handset-Based Data Collection Process and Participant Attitudes", International Journal of Handheld Computing Research, vol.3, no.4, pp.1, 2012.
7.
Leighton Evans, "Location-based services: transformation of the experience of space", Journal of Location Based Services, vol.5, no.3-4, pp.242, 2011.
Contact IEEE to Subscribe

References

References is not available for this document.