Securing Social Media User Data - An Adversarial Approach

被引:14
|
作者
Beigi, Ghazaleh [1 ]
Zhang, Yanchao [1 ]
Shu, Kai [1 ]
Liu, Huan [1 ]
机构
[1] Arizona State Univ, Tempe, AZ 85287 USA
关键词
DE-ANONYMIZATION; PRIVACY;
D O I
10.1145/3209542.3209552
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Social media users generate tremendous amounts of data. To better serve users, it is required to share the user-related data among researchers, advertisers and application developers. Publishing such data would raise more concerns on user privacy. To encourage data sharing and mitigate user privacy concerns, a number of anonymization and de-anonymization algorithms have been developed to help protect privacy of social media users. In this work, we propose a new adversarial attack specialized for social media data. We further provide a principled way to assess effectiveness of anonymizing different aspects of social media data. Our work sheds light on new privacy risks in social media data due to innate heterogeneity of user-generated data which require striking balance between sharing user data and protecting user privacy.
引用
收藏
页码:165 / 173
页数:9
相关论文
共 50 条
  • [1] An Efficient Approach to Securing User Data in Android
    Jayan, Suranya
    Sun, Jiangfeng
    Shin, Dongwan
    [J]. 2017 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC), 2017, : 400 - 405
  • [2] On fairness: User perspectives on social media data mining
    Kennedy, Helen
    Elgesem, Dag
    Miguel, Cristina
    [J]. CONVERGENCE-THE INTERNATIONAL JOURNAL OF RESEARCH INTO NEW MEDIA TECHNOLOGIES, 2017, 23 (03): : 270 - 288
  • [3] Data Mining the City: User Demands through Social Media
    Cakir, Hulya Soydas
    Levent, Vecdi Emre
    [J]. ICONARP INTERNATIONAL JOURNAL OF ARCHITECTURE AND PLANNING, 2021, 9 (02): : 799 - 818
  • [4] User Data as Public Resource: Implications for Social Media Regulation
    Napoli, Philip M.
    [J]. POLICY AND INTERNET, 2019, 11 (04): : 439 - 459
  • [5] Social User Mining: Survey on Mining Different Types of Social Media Data
    Eltaher, Mohammed
    Lee, Jeongkyu
    [J]. INTERNATIONAL JOURNAL OF MULTIMEDIA DATA ENGINEERING & MANAGEMENT, 2013, 4 (04): : 58 - 70
  • [6] A Robust Approach for Securing Audio Classification Against Adversarial Attacks
    Esmaeilpour, Mohammad
    Cardinal, Patrick
    Koerich, Alessandro
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 : 2147 - 2159
  • [7] Securing Digital Reputation in Online Social Media
    Liu, Yuhong
    Sun, Yan
    [J]. IEEE SIGNAL PROCESSING MAGAZINE, 2014, 31 (01) : 149 - 155
  • [8] An encryption of social network user browsing trajectory data based on adversarial neural network
    Wang, Xinliang
    [J]. International Journal of Web Based Communities, 2024, 20 (1-2) : 114 - 127
  • [9] User opinion classification in social media: A global consistency maximization approach
    Li, Jiexun
    Li, Xin
    Zhu, Bin
    [J]. INFORMATION & MANAGEMENT, 2016, 53 (08) : 987 - 996
  • [10] Opinion Mining on Social Media Data: Sentiment Analysis of User Preferences
    Pavaloaia, Vasile-Daniel
    Teodor, Elena-Madalina
    Fotache, Doina
    Danilet, Magdalena
    [J]. SUSTAINABILITY, 2019, 11 (16)