Active or inactive: infer private user information in location-based social network

被引:3
作者
Guo Chi [1 ]
Luo Meng [2 ]
Liu Xuan [3 ]
Cui Jingsong [2 ]
机构
[1] Wuhan Univ, Global Nav Satellite Syst Res Ctr, Wuhan 430072, Peoples R China
[2] Wuhan Univ, Comp Sch, Wuhan 430072, Peoples R China
[3] Wuhan Univ, Sch Remote Sensing & Informat Engn, Wuhan 430072, Peoples R China
关键词
location-based service; LBS; privacy inference; social network; Bayesian network; big data;
D O I
10.1504/IJES.2016.076112
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Private user information can be compromised while revealing individual location data in widely used location-based social networks (LBSNs). In order to reveal the risk of location privacy faced by users, we demonstrate a method, which transforms social networks into Bayesian networks, to infer private information through the location data and relationships among users in LBSNs, such as Gowalla, regardless of whether users are active or inactive. Location data from active users can be easily used to infer private information like consumption level. For example, people who frequently appear in expensive restaurants are likely to rank the high consumption level. Those inactive users, who share sparse location data, reveal their private information through their active friends whose private information is easily divulged. Our experimental results show that friends have a high probability of having been to the same places. Combining with relationship data, the possibility of revealing private information is dramatically improved.
引用
收藏
页码:185 / 195
页数:11
相关论文
共 29 条
[1]   Privacy preserving social networking [J].
Babu, Korra Sathya ;
Hota, Jhalak ;
Jena, Sanjay Kumar .
INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2014, 9 (03) :165-176
[2]  
Backstrom L., 2010, P 19 INT C WORLD WID, P61, DOI DOI 10.1145/1772690.1772698
[3]  
Brdar S., 2012, P MOB DAT CHALL NOK
[4]   A taxonomy-based model of security and privacy in online social networks [J].
Caviglione, L. ;
Coccoli, M. ;
Merlo, A. .
INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2014, 9 (04) :325-338
[5]  
Etter V., 2012, MOB DAT CHALL NOK WO
[6]   Non-Cooperative Location Privacy [J].
Freudiger, Julien ;
Manshaei, Mohammad Hossein ;
Hubaux, Jean-Pierre ;
Parkes, David C. .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2013, 10 (02) :84-98
[7]  
Friedman N, 1999, IJCAI-99: PROCEEDINGS OF THE SIXTEENTH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, VOLS 1 & 2, P1300
[8]  
Gao H., 2012, NOK MOB DAT CHALL WO
[9]  
He JM, 2006, LECT NOTES COMPUT SC, V3975, P154
[10]  
Huang C-M., 2012, NOKIA MOBILE DATA CH, V1