Social influence-based privacy inference attacks in online social networks

被引:3
|
作者
Yi, Yuzi [1 ]
He, Jingsha [1 ]
Zhu, Nafei [1 ]
Ma, Xiangjun [1 ]
机构
[1] Beijing Univ Technol, Fac Informat Technol, Beijing 100124, Peoples R China
来源
SECURITY AND PRIVACY | 2022年 / 5卷 / 02期
关键词
graph attention networks; online social networks; privacy inference attacks; privacy protection; BEHAVIOR; MEDIA;
D O I
10.1002/spy2.194
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Privacy inference attacks in online social networks aim at inferring hidden attributes of target users based on released attributes of the users as well as information about social relationships in the networks. Although many privacy inference methods have been proposed in recent years, most of the methods have mostly focused on pursuing high accuracy of the inference results without paying too much attention on identifying users who make the most contributions to the inference, making it less useful in the development of effective countermeasures. In this paper, by taking full consideration of the roles of users in privacy inference, we propose a privacy inference method based on graph attention networks that can provide information about not only the private attributes of the target users, but also the importance of the users in the process of inferring the results. We also design a novel mechanism for the selection of influential users to make our proposed method adaptive to the characteristics of user influence diffusion, resulting in involving fewer number of users in privacy inference and hence improving the efficiency. We also performed some experiment to evaluate the proposed method using a real online social network dataset to show the effectiveness of the proposed method. Comparison with other comparable methods also shows that the results of our proposed method are more accurate.
引用
收藏
页数:12
相关论文
共 50 条
  • [21] Bayesian-Inference-Based Recommendation in Online Social Networks
    Yang, Xiwang
    Guo, Yang
    Liu, Yong
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2013, 24 (04) : 642 - 651
  • [22] A SURVEY ON VULNERABLE ATTACKS IN ONLINE SOCIAL NETWORKS
    NaliniPriya, G.
    Asswini, M.
    [J]. INTERNATIONAL CONFERENCE ON INNOVATION INFORMATION IN COMPUTING TECHNOLOGIES, 2015, 2015,
  • [23] Preserving privacy in social networks against neighborhood attacks
    Zhou, Bin
    Pei, Jian
    [J]. 2008 IEEE 24TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING, VOLS 1-3, 2008, : 506 - 515
  • [24] Attribute Couplet Attacks and Privacy Preservation in Social Networks
    Yin, Dan
    Shen, Yiran
    Liu, Chenyang
    [J]. IEEE ACCESS, 2017, 5 : 25295 - 25305
  • [25] Privacy leakage analysis in online social networks
    Li, Yan
    Li, Yingjiu
    Yan, Qiang
    Deng, Robert H.
    [J]. COMPUTERS & SECURITY, 2015, 49 : 239 - 254
  • [26] Strategies for Privacy Negotiation in Online Social Networks
    Kekulluoglu, Dilara
    Kokciyan, Nadin
    Yolum, Pinar
    [J]. ECAI 2016: 22ND EUROPEAN CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2016, 285 : 1608 - 1609
  • [27] A survey on privacy in decentralized online social networks
    De Salve, Andrea
    Mori, Paolo
    Ricci, Laura
    [J]. COMPUTER SCIENCE REVIEW, 2018, 27 : 154 - 176
  • [28] SECURITY AND PRIVACY IN ONLINE SOCIAL NETWORKS: A SURVEY
    Joshi, Prateek
    Kuo, C. -C. Jay
    [J]. 2011 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO (ICME), 2011,
  • [29] Measuring Privacy Leaks in Online Social Networks
    Srivastava, Agrima
    Geethakumari, G.
    [J]. 2013 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2013, : 2095 - 2100
  • [30] Trust and Privacy Exploitation in Online Social Networks
    Wong, Kaze
    Wong, Angus
    Yeung, Alan
    Fan, Wei
    Tang, Su-Kit
    [J]. IT PROFESSIONAL, 2014, 16 (05) : 28 - 33