Staying safe and visible via message sharing in online social networks

被引:0
|
作者
Yilin Shen
Thang N. Dinh
My T. Thai
Hien T. Nguyen
机构
[1] University of Florida,The Department of Computer and Information Science and Engineering
[2] Ton Duc Thang University,Faculty of Information Technology
来源
关键词
Online social networks; Circle of trust; Computational complexity; Approximation algorithms;
D O I
暂无
中图分类号
学科分类号
摘要
As an imperative channel for fast information propagation, online social networks (OSNs) also have their defects. One of them is the information leakage, i.e., information could be spread via OSNs to the users whom we are not willing to share with. Thus the problem of constructing a circle of trust to share information with as many friends as possible without further spreading it to unwanted targets has become a challenging research topic but still remained open. Our work is the first attempt to study the Maximum Circle of Trust problem seeking to share the information with the maximum expected number of poster’s friends such that the information spread to the unwanted targets is brought to its knees. First, we consider a special and more practical case with the two-hop information propagation and a single unwanted target. In this case, we show that this problem is NP-hard, which denies the existence of an exact polynomial-time algorithm. We thus propose a Fully Polynomial-Time Approximation Scheme (FPTAS), which can not only adjust any allowable performance error bound but also run in polynomial time with both the input size and allowed error. FPTAS is the best approximation solution one can ever wish for an NP-hard problem. We next consider the number of unwanted targets is bounded and prove that there does not exist an FPTAS in this case. Instead, we design a Polynomial-Time Approximation Scheme (PTAS) in which the allowable error can also be controlled. When the number of unwanted targets are not bounded, we provide a randomized algorithm, along with the analytical theoretical bound and inapproximaibility result. Finally, we consider a general case with many hops information propagation and further show its #P-hardness and propose an effective Iterative Circle of Trust Detection (ICTD) algorithm based on a novel greedy function. An extensive experiment on various real-world OSNs has validated the effectiveness of our proposed approximation and ICTD algorithms. Such an extensive experiment also highlights several important observations on information leakage which help to sharpen the security of OSNs in the future.
引用
收藏
页码:186 / 217
页数:31
相关论文
共 50 条
  • [41] Contextual Integrity and Personal Health Information Sharing in Online Social Networks
    Li, Han
    Luo, Xin
    Sarathy, Rathindra
    Xu, Heng
    Journal of the Association for Information Systems, 2024, 25 (06) : 1500 - 1532
  • [42] Metrics for Privacy Assessment When Sharing Information in Online Social Networks
    Alemany, Jose
    Del Val, Elena
    Alberola, Juan M.
    Garcia-Fornes, Ana
    IEEE ACCESS, 2019, 7 : 143631 - 143645
  • [43] Towards Secure Data Sharing Processes in Online Social Networks: Trusty
    Akkuzu, Gulsum
    Aziz, Benjamin
    Adda, Mo
    ICSOFT: PROCEEDINGS OF THE 15TH INTERNATIONAL CONFERENCE ON SOFTWARE TECHNOLOGIES, 2020, : 418 - 425
  • [44] Social networks, semiosis, and production: authoring aspects of sharing content online
    Ziller, Joana
    Moura, Maria Aparecida
    MCLUHAN GALAXY CONFERENCE: UNDERSTANDING MEDIA, TODAY, 2011, : 497 - 508
  • [45] The social sharing of emotion (SSE) in online social networks: A case study in Live Journal
    Hidalgo, C. T. Rodriguez
    Tan, E. S. H.
    Verlegh, P. W. J.
    COMPUTERS IN HUMAN BEHAVIOR, 2015, 52 : 364 - 372
  • [46] An Experiment in Hiring Discrimination via Online Social Networks
    Acquisti, Alessandro
    Fong, Christina
    MANAGEMENT SCIENCE, 2020, 66 (03) : 1005 - 1024
  • [47] School Absenteeism: An Online Survey via Social Networks
    Verena Pflug
    Silvia Schneider
    Child Psychiatry & Human Development, 2016, 47 : 417 - 429
  • [48] Who is Visible: Resolving Access Policy Conflicts in Online Social Networks
    Fang, Liang
    Yin, Lihua
    Zhang, Qiaoduo
    Li, Fenghua
    Fang, Binxing
    GLOBECOM 2017 - 2017 IEEE GLOBAL COMMUNICATIONS CONFERENCE, 2017,
  • [49] Sampling Online Social Networks via Heterogeneous Statistics
    Wang, Xin
    Ma, Richard T. B.
    Xu, Yinlong
    Li, Zhipeng
    2015 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (INFOCOM), 2015,
  • [50] Travel Routes Recommendations via Online Social Networks
    Comito, Carmela
    PROCEEDINGS OF THE 2019 IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING (ASONAM 2019), 2019, : 1168 - 1173