Staying safe and visible via message sharing in online social networks

被引:0
|
作者
Yilin Shen
Thang N. Dinh
My T. Thai
Hien T. Nguyen
机构
[1] University of Florida,The Department of Computer and Information Science and Engineering
[2] Ton Duc Thang University,Faculty of Information Technology
来源
关键词
Online social networks; Circle of trust; Computational complexity; Approximation algorithms;
D O I
暂无
中图分类号
学科分类号
摘要
As an imperative channel for fast information propagation, online social networks (OSNs) also have their defects. One of them is the information leakage, i.e., information could be spread via OSNs to the users whom we are not willing to share with. Thus the problem of constructing a circle of trust to share information with as many friends as possible without further spreading it to unwanted targets has become a challenging research topic but still remained open. Our work is the first attempt to study the Maximum Circle of Trust problem seeking to share the information with the maximum expected number of poster’s friends such that the information spread to the unwanted targets is brought to its knees. First, we consider a special and more practical case with the two-hop information propagation and a single unwanted target. In this case, we show that this problem is NP-hard, which denies the existence of an exact polynomial-time algorithm. We thus propose a Fully Polynomial-Time Approximation Scheme (FPTAS), which can not only adjust any allowable performance error bound but also run in polynomial time with both the input size and allowed error. FPTAS is the best approximation solution one can ever wish for an NP-hard problem. We next consider the number of unwanted targets is bounded and prove that there does not exist an FPTAS in this case. Instead, we design a Polynomial-Time Approximation Scheme (PTAS) in which the allowable error can also be controlled. When the number of unwanted targets are not bounded, we provide a randomized algorithm, along with the analytical theoretical bound and inapproximaibility result. Finally, we consider a general case with many hops information propagation and further show its #P-hardness and propose an effective Iterative Circle of Trust Detection (ICTD) algorithm based on a novel greedy function. An extensive experiment on various real-world OSNs has validated the effectiveness of our proposed approximation and ICTD algorithms. Such an extensive experiment also highlights several important observations on information leakage which help to sharpen the security of OSNs in the future.
引用
收藏
页码:186 / 217
页数:31
相关论文
共 50 条
  • [21] Privacy Enhanced Location Sharing for Mobile Online Social Networks
    Son, Junggab
    Kim, Donghyun
    Bhuiyan, Md Zakirul Alam
    Tashakkori, Rahman
    Seo, Jungtaek
    Lee, Dong Hoon
    IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING, 2020, 5 (02): : 279 - 290
  • [22] Analyzing information sharing strategies of users in online social networks
    Dong-Anh Nguyen
    Tan, Shulong
    Ramanathan, Ram
    Yan, Xifeng
    PROCEEDINGS OF THE 2016 IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING ASONAM 2016, 2016, : 247 - 254
  • [23] Enabling Secure Secret Sharing in Distributed Online Social Networks
    Vu, Le-Hung
    Aberer, Karl
    Buchegger, Sonja
    Datta, Anwitaman
    25TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, 2009, : 419 - +
  • [24] Evaluating Secure Methodology for Photo Sharing in Online Social Networks
    Alwabel, Athar A.
    Alsuhibany, Suliman A.
    APPLIED SCIENCES-BASEL, 2022, 12 (23):
  • [25] Multiparty Authorization Framework for Data Sharing in Online Social Networks
    Hu, Hongxin
    Ahn, Gail-Joon
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXV, 2011, 6818 : 29 - 43
  • [26] Locating Experts via Online Social Networks
    Xu, Kuang
    Xie, Jing
    Li, Victor O. K.
    2010 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2010,
  • [27] Social but safe? Quality and safety of diabetes-related online social networks
    Weitzman, Elissa R.
    Cole, Emily
    Kaci, Liljana
    Mendl, Kenneth D.
    JOURNAL OF THE AMERICAN MEDICAL INFORMATICS ASSOCIATION, 2011, 18 (03) : 292 - 297
  • [28] A Lightweight Message Dissemination Strategy for Minimizing Delay in Online Social Networks
    Wang, En
    Yang, Yongjian
    Wu, Jie
    Yang, Wei-Shih
    Liu, Wenbin
    2015 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2015,
  • [29] Malware Propagation Analysis in Message-Recallable Online Social Networks
    Chen, Yijin
    Mao, Yuming
    Leng, Supeng
    Wei, Yunkai
    Chiang, Yuchen
    2017 17TH IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT 2017), 2017, : 1366 - 1371
  • [30] User Trust Inference in Online Social Networks: A Message Passing Perspective
    Liu, Yu
    Wang, Bai
    APPLIED SCIENCES-BASEL, 2022, 12 (10):