A privacy-sensitive data identification model in online social networks

被引:1
|
作者
Yi, Yuzi [1 ]
Zhu, Nafei [1 ]
He, Jingsha [1 ]
Jurcut, Anca Delia [2 ]
Ma, Xiangjun [1 ]
Luo, Yehong [1 ]
机构
[1] Beijing Univ Technol, Fac Informat Technol, Beijing, Peoples R China
[2] Univ Coll Dublin, Sch Comp Sci, Dublin, Ireland
来源
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES | 2024年 / 35卷 / 01期
关键词
INFERENCE; ATTACK;
D O I
10.1002/ett.4876
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Privacy protection in online social networks (OSNs) has received a great deal of attention in recent years. One way of circumventing conventional privacy protection is privacy inference based on data that can be easily obtained in OSNs. Previous work on privacy inference has studied the issue mostly from the viewpoint of the attackers and methods thus designed were mostly aimed at pursuing the accuracy of the inference results with little regard on the causes of privacy breaches. To develop more effective privacy protection mechanisms that takes privacy inference into consideration, it is necessary to identify the information that plays a more important role in privacy breaches. In this paper, we propose a privacy-sensitive data identification model in OSNs, which can identify key pieces of data that are most sensitive as far the privacy of the user is concerned. Firstly, a privacy inference method is proposed based on conditional random fields to infer the privacy of the target users. Then, a privacy-sensitive data identification method is proposed by using the intermediate data of the proposed privacy inference method based on the targeted influence maximization algorithm. Thus, the key pieces of data in the form of user attributes and relationships on which the privacy of the target user depends can be determined to facilitate the implementation of privacy protection mechanisms. The effectiveness as well as the advantages of the proposed model is verified and demonstrated through experiment using real datasets. The impact of the key factors on privacy inference is also analyzed to guide the design of effective privacy protection strategies.
引用
收藏
页数:21
相关论文
共 50 条
  • [41] Themes and Research Directions in Privacy-Sensitive Robotics
    Rueben, Matthew
    Aroyo, Alexander Mois
    Lutz, Christoph
    Schmoelz, Johannes
    Van Cleynenbreugel, Pieter
    Corti, Andrea
    Agrawal, Siddharth
    Smart, William D.
    2018 IEEE WORKSHOP ON ADVANCED ROBOTICS AND ITS SOCIAL IMPACTS (ARSO), 2018, : 77 - 84
  • [42] Recipient Privacy in Online Social Networks
    Beato, Filipe
    Halunen, Kimmo
    Mennink, Bart
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, IWSEC 2016, 2016, 9836 : 254 - 264
  • [43] Preserving Privacy in Online Social Networks
    Raji, Fatemeh
    Miri, Ali
    Jazi, Mohammad Davarpanah
    FOUNDATIONS AND PRACTICE OF SECURITY, 2011, 6888 : 1 - +
  • [44] Privacy of Organization in Online Social Networks
    Singh, Priyanja
    Shrivastava, Sarang
    RECENT FINDINGS IN INTELLIGENT COMPUTING TECHNIQUES, VOL 3, 2018, 709 : 141 - 152
  • [45] Privacy and Temporal Aware Allocation of Data in Decentralized Online Social Networks
    De Salve, Andrea
    Guidi, Barbara
    Mori, Paolo
    Ricci, Laura
    Ambriola, Vincenzo
    GREEN, PERVASIVE, AND CLOUD COMPUTING (GPC 2017), 2017, 10232 : 237 - 251
  • [46] Privacy-Preserving Data Allocation in Decentralized Online Social Networks
    De Salve, Andrea
    Mori, Paolo
    Ricci, Laura
    Al-Aaridhi, Raed
    Graffi, Kalman
    DISTRIBUTED APPLICATIONS AND INTEROPERABLE SYSTEMS, DAIS 2016, 2016, 9687 : 47 - 60
  • [47] A collaborative distributed privacy-sensitive decision support system for monitoring heterogeneous data sources
    Kargupta, H
    Sarkar, K
    Aswath, D
    Handy, WD
    2005 INTERNATIONAL SYMPOSIUM ON COLLABORATIVE TECHNOLOGIES AND SYSTEMS, PROCEEDINGS, 2005, : 380 - 387
  • [48] Sensitive Information for Privacy on Social Networks
    Wang, Ruby Ching-Ying
    Wang, Rui Yi
    Tai, Chih-Hua
    Yang, De-Nian
    2016 CONFERENCE ON TECHNOLOGIES AND APPLICATIONS OF ARTIFICIAL INTELLIGENCE (TAAI), 2016, : 46 - 51
  • [49] From web search to healthcare utilization: privacy-sensitive studies from mobile data
    White, Ryen
    Horvitz, Eric
    JOURNAL OF THE AMERICAN MEDICAL INFORMATICS ASSOCIATION, 2013, 20 (01) : 61 - 68
  • [50] Detecting Privacy-Sensitive Code Changes with Language Modeling
    Demirci, Gokalp
    Murali, Vijayaraghavan
    Ahmad, Imad
    Rao, Rajeev
    Aye, Gareth Ari
    2022 MINING SOFTWARE REPOSITORIES CONFERENCE (MSR 2022), 2022, : 762 - 763