Distributed privacy preservation for online social network using flexible clustering and whale optimization algorithm

被引:1
|
作者
Uke, Nilesh J. [1 ]
Lokhande, Sharayu A. [2 ]
Kale, Preeti [3 ]
Pawar, Shilpa Devram [2 ]
Junnarkar, Aparna A. [4 ]
Yadav, Sulbha [5 ]
Bhavsar, Swapna [6 ]
Mahajan, Hemant [7 ]
机构
[1] Trinity Acad Engn, Pune, India
[2] Army Inst Technol, Pune, India
[3] Chh Shahu Coll Engn, Aurangabad, India
[4] Vishwakarma Inst Informat Technol, Pune, India
[5] Lokmanya Tilak Coll Engn, Navi Mumbai, India
[6] PES Modern Coll Engn, Pune, India
[7] Datta Meghe Inst Med Sci, Wardha, India
来源
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS | 2024年 / 27卷 / 05期
关键词
Artificial intelligence; Anonymization; Distributed clustering; Information loss; Online social networking; Privacy preservation; INTERNET;
D O I
10.1007/s10586-024-04295-9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Over the past few years, global use of Online Social Networks (OSNs) has increased. The rising use of OSN makes protecting users' privacy from OSN attacks difficult. Finally, it affects the basic commitment to protect OSN users from such invasions. The lack of a distributed, dynamic, and artificial intelligence (AI)-based privacy-preserving strategy for performance trade-offs is a research challenge. We propose the Distributed Privacy Preservation (DPP) for OSN using Artificial Intelligence (DPP-OSN-AI) to reduce Information Loss (IL) and improve privacy preservation from different OSN threats. DPP-OSN-AI uses AI to design privacy notions in distributed OSNs. DPP-OSN-AI consists of AI-based clustering, l-diversity, and t-closeness phases to achieve the DPP for OSN. The AI-based clustering is proposed for dynamic and optimal clustering of OSN users to ensure personalized k-anonymization to protect from AI-based threats. First, the optimal number of clusters is discovered dynamically with simple computations, and then the Whale Optimization Algorithm is designed to optimally place the OSN users across the clusters such that it helps to protect them from AI-based threats. Because k-anonymized OSN clusters are insufficient to handle all privacy concerns in a distributed OSN environment, we systematically applied the l-diversity privacy idea followed by the t-closeness to it, resulting in higher DPP and lower IL. The DPP-OSN-AI model is assessed for IL Efficiency (ILE), Degree of Anonymization (DoA,) and computational complexity using publically accessible OSN datasets. Compared to state-of-the-art, DPP-OSN-AI model DoA is 15.57% higher, ILE is 17.85% higher, and computational complexity is 3.61% lower.
引用
收藏
页码:5995 / 6012
页数:18
相关论文
共 50 条
  • [1] Privacy preservation based on clustering perturbation algorithm for social network
    Yu, Fahong
    Chen, Meijia
    Yu, Bolin
    Li, Wenping
    Ma, Longhua
    Gao, Huimin
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (09) : 11241 - 11258
  • [2] Privacy preservation based on clustering perturbation algorithm for social network
    Fahong Yu
    Meijia Chen
    Bolin Yu
    Wenping Li
    Longhua Ma
    Huimin Gao
    Multimedia Tools and Applications, 2018, 77 : 11241 - 11258
  • [3] Privacy Preservation Method Based on Clustering Interference Algorithm in Social Networks
    Zhang R.
    Wu X.
    Journal of Engineering Science and Technology Review, 2022, 15 (02) : 191 - 197
  • [4] Machine Learning-based Online Social Network Privacy Preservation
    Gao, Tianchong
    Li, Feng
    ASIA CCS'22: PROCEEDINGS OF THE 2022 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2022, : 467 - 478
  • [5] A many-objective whale optimization algorithm to perform robust distributed clustering in wireless sensor network
    Kotary, Dinesh Kumar
    Nanda, Satyasai Jagannath
    Gupta, Rachana
    APPLIED SOFT COMPUTING, 2021, 110
  • [6] Privacy preserving using joint 2 K-means clustering and coati optimization algorithm for online social networks
    Gowda N.R.
    Venkatesh
    Venugopal K.R.
    International Journal of Information Technology, 2024, 16 (4) : 2715 - 2724
  • [7] Clustering based k-anonymity algorithm for privacy preservation
    Ni S.
    Xie M.
    Qian Q.
    International Journal of Network Security, 2017, 19 (06) : 1062 - 1071
  • [8] Privacy Preservation in Distributed Subgradient Optimization Algorithms
    Lou, Youcheng
    Yu, Lean
    Wang, Shouyang
    Yi, Peng
    IEEE TRANSACTIONS ON CYBERNETICS, 2018, 48 (07) : 2154 - 2165
  • [9] A Spectral Clustering Algorithm Based on Differential Privacy Preservation
    Cui, Yuyang
    Wu, Huaming
    Zhang, Yongting
    Gao, Yonggang
    Wu, Xiang
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2021, PT III, 2022, 13157 : 397 - 410
  • [10] Privacy Preservation in Online Social Networks Using Multiple-Graph-Properties-Based Clustering to Ensure k-Anonymity, l-Diversity, and t-Closeness
    Gangarde, Rupali
    Sharma, Amit
    Pawar, Ambika
    Joshi, Rahul
    Gonge, Sudhanshu
    ELECTRONICS, 2021, 10 (22)