Loading [MathJax]/extensions/MathZoom.js
Prevention of inference attacks for private information in social networking sites | IEEE Conference Publication | IEEE Xplore

Prevention of inference attacks for private information in social networking sites


Abstract:

One of the most important terms we hear these days is Social networks which are online applications which allow its users to connect by various link types. Due to its eno...Show More

Abstract:

One of the most important terms we hear these days is Social networks which are online applications which allow its users to connect by various link types. Due to its enormous growth, any individual can become a member in any of these online social networking sites. Consequently, these websites gain huge profit just by providing a platform for the users to communicate. Online social networks, such as Facebook, LinkedIn are progressively utilized by many people. It makes digital communication technologies sharpening tools for extending the social circle of people. It has already become an important integral part of our daily lives, enabling us to contact our friends and families on time. As social networks have developed rapidly, recent research has begun to explore social networks to understand their structure, advertising and marketing, and data mining online population, representing 1.2 billion users around the world. More and more social network data has been made publicly available and analyzed in one way or another. But some of the information revealed is meant to be private hence social network data has led to the risk of leakage of confidential information of individuals. This is because they collect huge personal data and users take risks of trusting them. It is possible to use learning algorithms on released data to predict private information. Privacy preservation is a significant research issue in social networking. Since more personalized information is shared with the public, violating the privacy of a target user become much easier. This paper explains the possibility of various inference attacks by these private data. These attacks can be minimized by sanitization methods that are put forward in this paper. We explore how to launch inference attacks using released social networking data to predict private information. This paper also comes with the security features which are essential for an online social networking site. The research in this field i...
Date of Conference: 19-20 January 2017
Date Added to IEEE Xplore: 16 October 2017
ISBN Information:
Conference Location: Coimbatore, India
References is not available for this document.

I. Introduction

Social networks are online web based applications that allow their users to connect with their friends and share common interests, either professionally or personally with whom they share and these networks allow people to list details about themselves that are relevant to the nature of the network. According to Cluley “Social networks are great fun, and can be advantageous but people really need to understand that its complicated world and you need to step wisely”. Users post content to the application to update connections and share personal news, accomplishments, interests and more. This content can be in the form of simple text status updates, videos or photos. People may use to find a new job, find new clients or stay in touch with long distance friends and family. Examples are LinkedIn, Facebook, Twitter and YouTube.

Select All
1.
R. Gross, A. Acquisti and H.J.H., "Information revelation and privacy in online social networks", WPES, pp. 71-80, 2005.
2.
K.P.N. Puttaswamy, A. Sala and B.Y. Zhao, "Starclique: guaranteeing user privacy in social networks against intersection attacks", CoNEXT, pp. 157-168, 2009.
3.
J. He, W. Chu and V. Liu, "Inferring Privacy Information from Social Networks", Proc. Intelligence and Security Informatics, 2006.
4.
L. Sweeney, "k-anonymity: A model for protecting privacy", International Journal of Uncertainty Fuzziness and Knowledge-Based Systems, vol. 10, no. 5, pp. 557-570, 2002.
5.
A. Annapoorani and P. Indira Priya, "Inferring Private Information from Social Network Using Collective Classification", International Journal of Innovative Research in Computer and Communication Engineering, vol. 4, no. 1, March 2014.
6.
Jayasree Dasari and K.R. Koteswara Rao, "Sanitization Techniques for Protecting Social Networks from Inference Attacks", International Journal of Computer Science and Mobile Computing IJCSMC, vol. 3, no. 12, pp. 236-244, December 2014.
7.
Chethana Nair, Neethu Krishna and Siby Abraham, "Generalization Algorithm For Prevent Inference Attacks in Social Network Data", International Journal of Research in Computer and Communication Technology” IJRCCT, December 2014.
8.
R Divya, B. Mahesh and R. Ushasree, "Data Implication Attacks on Social Networks with Data Sanitization", International Journal of Current Engineering and Technology, vol. 4, no. 3, June 2014.
9.
Brinal Colaco and Shamsuddin Khan, "Privacy Preserving Data Mining for Social Networks", International Journal of Engineering Research Technology, vol. 3, no. 8, August 2014.
10.
Pooja Shelke and Ashish Badiye, "Social Networking: Its Uses and Abuses", Research Journal of Forensic Sciences Maharashtra, pp. 2-7, 2013.
11.
Seyed Hossein Ahmadinejad and Philip WL Fong, "On the feasibility of inference attacks by third-party extensions to social network systems", Proceedings of the 8th ACM SIGSAC symposium on Information computer and communications security, 2013.
12.
R. Pranay and P. Pavan Kumar, "A Survey on Obstruction of Confidential Information Attacks in Social Networks", International Journal of Research in Information Technology, vol. 2, no. 6, June 2014.
13.
B. Zhou, Jian Pei and Wo-Shun Luk, "A brief survey on anonymization techniques for privacy preserving publishing of social network data", ACM SIGKDD Explorations Newsletter, vol. 10, pp. 12-22, 2008.
14.
Saikat Guha, Kevin Tang and Paul Francis, "NOYB: Privacy in Online Social Networks", Proc. of first workshop on Online social networks WOSN08, pp. 49-54, 2008.
15.
Gary Blosser and Justin Zhan, "Privacy Preserving Collaborative Social Network", Proc. of International Conference on Information Security and Assurance ISA 2008, pp. 543-548, 2008.
16.
Alina Campan, Traian Marius Truta and Nicholas Cooper, "P-Sensitive K-Anonymity with Generalization Constraints", Transactions on Data Privacy archive, vol. 3, no. 2, pp. 65-89, 2010.
17.
Elena Zheleva and Lise Getoor, "Privacy in Social Networks: A Survey" in Social Network Data Analytics, US:Springer, pp. 277-306, 2011.
18.
Roy Ford, Traian Marius Truta and Alina Campan, P-Sensitive K-Anonymity for Social Networks.
19.
A. Narayanan and V. Shmatikov, "De-anonymizing social networks", Proc of 30th IEEE Symposium on Security and Privacy, pp. 173-187, 2009.
20.
Z. Lijie and Z. Weining, "Edge Anonymity in Social Network Graphs", Proc. of International Conference on Computational Science and Engineering CSE09, pp. 1-8, 2009.
21.
X. Ying and X. Wu, "On link privacy in randomizing social networks", Advances in Knowledge Discovery and Data Mining, pp. 28-39, 2009.
22.
Amin Tootoonchian, Stefan Saroiu, Yashar Ganjali and Alec Wolman, "Lockr: Better Privacy for Social Networks", Proc. of the 5th ACM International Conference on Emerging Networking Experiments and Technologies (CoNEXT), 2009.
23.
Philip W.L. Fong, Mohd Anwar and Zhen Zhao, "A Privacy Preservation Model for Facebook-Style Social Network Systems", Computer Security — ESORICS 2009, vol. 5789, pp. 303-320, 2009.
24.
X. Tang and C.C. Yang, "Generalizing Terrorist Social Networks with K-Nearest Neighbor and Edge Betweenness for Social Network Integration and Privacy Preservation", Proc. of IEEE International Conference on Intelligence and Security Informatics, 2010.
25.
Lihui Lan and Shiguang Ju Hua Jin, "Anonymizing Social Network using Bipartite Graph", Proc. of International Conference on Computational and Information Sciences (ICCIS), pp. 993-996, 2010.
26.
Xuan Ding, Lan Zhang, Zhiguo Wan and Ming Gu, "A Brief Survey on De-anonymization Attacks in Online Social Networks", Proc. of International Conference on Computational Aspects of Social Networks, pp. 611-615, 2010.
27.
Jinyuan Sun, Xiaoyan Zhu and Yuguang Fang, "A Privacy-Preserving Scheme for Online Social Networks with Efficient Revocation", Proc. of INFOCOM, pp. 1-9, 2010.
28.
Aaron Beach, Mike Gartrell and Richard Han, "q-Anon: Rethinking Anonymity for Social Networks", Proc. of IEEE Second International Conference on Social Computing (SocialCom), pp. 185-192, 2010.
29.
Yan Zhu, Zexing Hu, Huaixi Wang, Hongxin Hu and Gail-Joon Ahn, "A Collaborative Framework: for Privacy Protection in Online Social Networks", Proc. of 6th International Conference on Collaborative Computing: Networking Applications and Worksharing (CollaborateCom), pp. 1-10, 2010.
30.
Xintao Wu, Xiaowei Ying, Kun Liu and Lei Chen, "A Survey of Privacy-Preservation of Graphs and Social Networks", Managing and Mining Graph Data Advances in Database Systems, vol. 40, pp. 421-453, 2010.
Contact IEEE to Subscribe

References

References is not available for this document.