Follow But No Track: Privacy Preserved Profile Publishing in Cyber-Physical Social Systems

被引:111
作者
Zheng, Xu [1 ]
Cai, Zhipeng [1 ]
Yu, Jiguo [2 ]
Wang, Chaokun [3 ]
Li, Yingshu [1 ]
机构
[1] Georgia State Univ, Dept Comp Sci, Atlanta, GA 30303 USA
[2] Qufu Normal Univ, Sch Informat Sci & Engn, Jining 276826, Shandong, Peoples R China
[3] Tsinghua Univ, Sch Software, Beijing 100084, Peoples R China
来源
IEEE INTERNET OF THINGS JOURNAL | 2017年 / 4卷 / 06期
基金
中国国家自然科学基金; 高等学校博士学科点专项科研基金; 美国国家科学基金会;
关键词
Cyber-physical system (CPS); data publication; social networks; user profile; PROTECTION;
D O I
10.1109/JIOT.2017.2679483
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the close correlation with individual's physical features and status, the adoption of cyber-physical social systems (CPSSs) has been inevitably hindered by users' privacy concerns. Such concerns keep growing as our bile devices have more embedded sensors, while the existing countermeasures only provide incapable and limited privacy preservation for sensitive physical information. Therefore, we propose a novel privacy preservation framework for CPSSs. We formulate both the privacy concerns and user expectations in CPSSs based on real-world knowledge. We also design a corresponding data publishing mechanism for users. It regulates the publishing behaviors to hide sensitive physical profiles. Meanwhile, the published data retain comprehensive social profiles for users. Our analysis demonstrates that the mechanism achieves a local maximized performance on the aspect published data size. The experiment results toward real datasets reveals that the performance is comparable to the global optimal one.
引用
收藏
页码:1868 / 1878
页数:11
相关论文
共 31 条
  • [1] Your Location has been Shared 5,398 Times! A Field Study on Mobile App Privacy Nudging
    Almuhimedi, Hazim
    Schaub, Florian
    Sadeh, Norman
    Adjerid, Idris
    Acquisti, Alessandro
    Gluck, Joshua
    Cranor, Lorrie
    Agarwal, Yuvraj
    [J]. CHI 2015: PROCEEDINGS OF THE 33RD ANNUAL CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS, 2015, : 787 - 796
  • [2] [Anonymous], 2016, FUTURE GENER COMPUT
  • [3] Optimal Geo-Indistinguishable Mechanisms for Location Privacy
    Bordenabe, Nicolas E.
    Chatzikokolakis, Konstantinos
    Palamidessi, Catuscia
    [J]. CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, : 251 - 262
  • [4] Collective Data-Sanitization for Preventing Sensitive Information Inference Attacks in Social Networks
    Cai, Zhipeng
    He, Zaobo
    Guan, Xin
    Li, Yingshu
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2018, 15 (04) : 577 - 590
  • [5] Carlini N, 2016, PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM, P513
  • [6] Dwork C, 2008, LECT NOTES COMPUT SC, V4890, P1
  • [7] Fawaz K, 2015, PROCEEDINGS OF THE 24TH USENIX SECURITY SYMPOSIUM, P753
  • [8] Getoor, 2009, P 18 INT C WORLD WID, P531, DOI DOI 10.1145/1526709.1526781
  • [9] Gong NZ, 2016, PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM, P979
  • [10] Influence maximization by probing partial communities in dynamic online social networks
    Han, Meng
    Yan, Mingyuan
    Cai, Zhipeng
    Li, Yingshu
    Cai, Xingquan
    Yu, Jiguo
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2017, 28 (04):