A privacy-sensitive data identification model in online social networks

被引:1
|
作者
Yi, Yuzi [1 ]
Zhu, Nafei [1 ]
He, Jingsha [1 ]
Jurcut, Anca Delia [2 ]
Ma, Xiangjun [1 ]
Luo, Yehong [1 ]
机构
[1] Beijing Univ Technol, Fac Informat Technol, Beijing, Peoples R China
[2] Univ Coll Dublin, Sch Comp Sci, Dublin, Ireland
关键词
INFERENCE; ATTACK;
D O I
10.1002/ett.4876
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Privacy protection in online social networks (OSNs) has received a great deal of attention in recent years. One way of circumventing conventional privacy protection is privacy inference based on data that can be easily obtained in OSNs. Previous work on privacy inference has studied the issue mostly from the viewpoint of the attackers and methods thus designed were mostly aimed at pursuing the accuracy of the inference results with little regard on the causes of privacy breaches. To develop more effective privacy protection mechanisms that takes privacy inference into consideration, it is necessary to identify the information that plays a more important role in privacy breaches. In this paper, we propose a privacy-sensitive data identification model in OSNs, which can identify key pieces of data that are most sensitive as far the privacy of the user is concerned. Firstly, a privacy inference method is proposed based on conditional random fields to infer the privacy of the target users. Then, a privacy-sensitive data identification method is proposed by using the intermediate data of the proposed privacy inference method based on the targeted influence maximization algorithm. Thus, the key pieces of data in the form of user attributes and relationships on which the privacy of the target user depends can be determined to facilitate the implementation of privacy protection mechanisms. The effectiveness as well as the advantages of the proposed model is verified and demonstrated through experiment using real datasets. The impact of the key factors on privacy inference is also analyzed to guide the design of effective privacy protection strategies.
引用
收藏
页数:21
相关论文
共 50 条
  • [1] Privacy-Sensitive Data in Connected Cars
    Nawrath, T.
    Fischer, D.
    Markscheffel, B.
    2016 11TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2016, : 392 - 393
  • [2] GINA: Group Gender Identification Using Privacy-Sensitive Audio Data
    Shen, Jiaxing
    Lederman, Oren
    Cao, Jiannong
    Berg, Florian
    Tang, Shaojie
    Pentland, Alex Sandy
    2018 IEEE INTERNATIONAL CONFERENCE ON DATA MINING (ICDM), 2018, : 457 - 466
  • [3] A Privacy Preserving Framework to Protect Sensitive Data in Online Social Networks
    Shetty N.P.
    Muniyal B.
    Yagnik N.
    Banerjee T.
    Singh A.
    Journal of Cyber Security and Mobility, 2022, 11 (04): : 575 - 600
  • [4] Effects of Social Behaviors of Robots in Privacy-Sensitive Situations
    Yang, Daseul
    Chae, Yu-Jung
    Kim, Doogon
    Lim, Yoonseob
    Kim, Dong Hwan
    Kim, ChangHwan
    Park, Sung-Kee
    Nam, Changjoo
    INTERNATIONAL JOURNAL OF SOCIAL ROBOTICS, 2022, 14 (02) : 589 - 602
  • [5] Capturing spontaneous conversation and social dynamics: A privacy-sensitive data collection effort
    Wyatt, Danny
    Choudhury, Tanzeem
    Kautz, Henry
    2007 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOL IV, PTS 1-3, 2007, : 213 - +
  • [6] RECONSTRUCTION OF PRIVACY-SENSITIVE DATA FROM PROTECTED TEMPLATES
    Rezaeifar, Shideh
    Razeghi, Behrooz
    Taran, Olga
    Holotyak, Taras
    Voloshynovskiy, Slava
    2019 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING (ICIP), 2019, : 1163 - 1167
  • [7] Effects of Social Behaviors of Robots in Privacy-Sensitive Situations
    Daseul Yang
    Yu-Jung Chae
    Doogon Kim
    Yoonseob Lim
    Dong Hwan Kim
    ChangHwan Kim
    Sung-Kee Park
    Changjoo Nam
    International Journal of Social Robotics, 2022, 14 : 589 - 602
  • [8] Towards a Formal Model of Privacy-Sensitive Dynamic Coalitions
    Bab, Sebastian
    Sarrouh, Nadim
    ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE, 2012, (83): : 10 - 21
  • [9] Analysis and classification of privacy-sensitive content in social media posts
    Livio Bioglio
    Ruggero G. Pensa
    EPJ Data Science, 11
  • [10] Privacy-Sensitive Congestion Charging
    Beresford, Alastair R.
    Davies, Jonathan J.
    Harle, Robert K.
    SECURITY PROTOCOLS, 2009, 5087 : 97 - 104