Social Networks Privacy Preservation: A Novel Framework

被引:1
作者
Singh, Amardeep [1 ]
Singh, Monika [2 ]
机构
[1] IKGPTU, Dept CSE, SVIET, Kapurthala, Punjab, India
[2] Chandigarh Univ, Apex Inst Technol CSE, Mohali, Punjab, India
关键词
Anonymization; online social networks; privacy; security; utility; K-DEGREE ANONYMITY; INFERENCE ATTACKS; ANONYMIZATION; UTILITY; MODEL;
D O I
10.1080/01969722.2022.2151966
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The development of several popular social networks and the publication of social networks' data have led to the risk of leakage of sensitive and confidential information of individuals. This requires the preservation of privacy before the publication of a user's data available from his Online Social Network (OSN) presence. Numerous algorithms have been proposed in the area of preserving the privacy of social network users' information such as K-anonymity and L-diversity. Previous work has shown good results based on the concept of adding edges and noise nodes for achieving K-anonymity and L-diversity. K-anonymization techniques are able to prevent identity disclosure of users but are not sufficient to prevent the disclosure of sensitive information of users. In this direction, a number of techniques for preserving the sensitive information of social network users have been proposed. Although these techniques have shown reasonably good results to achieve anonymity, but they also lead to a substantial change in the original structure of the OSNs. In this article, the problems of preventing sensitive attribute disclosure and reducing the noisy nodes have been addressed by perturbing the sensitive attributes. Existing research uses L-diversity for preventing sensitive attribute disclosure resulting in skewness and similarity attacks. We have addressed the skewness attacks by removing the duplicate noisy nodes from the final dataset to be published for stakeholders by the OSN service providers. All the information of duplicate nodes has been stored in a table named Reference Attribute Table (RAT). This table will be accessible only to the service providers for the purpose of de-anonymizing the data of users. The proposed technique has been extensively evaluated using five metrics viz. APL, ACSPL, RRTI, number of noisy nodes, and information loss using four real-time datasets collected for OSNs namely CORA, ARNET, DBLP, and Twitter. Results of evaluation parameters viz. APL and RRTI show that there is less change in the structure of datasets after anonymization. Results of ACSPL show that our proposed technique is able to preserve sensitive attributes in the datasets. The maximum number of noisy nodes amongst all four datasets is 5.4% and the maximum information loss is 2.2%. Evaluation results make it evident that our proposed technique ensures privacy preservation with less loss of information and thus preserving the utility of published data.
引用
收藏
页码:2356 / 2387
页数:32
相关论文
共 50 条
[21]   Privacy of Organization in Online Social Networks [J].
Singh, Priyanja ;
Shrivastava, Sarang .
RECENT FINDINGS IN INTELLIGENT COMPUTING TECHNIQUES, VOL 3, 2018, 709 :141-152
[22]   Privacy preservation in e-health cloud: taxonomy, privacy requirements, feasibility analysis, and opportunities [J].
Kanwal, Tehsin ;
Anjum, Adeel ;
Khan, Abid .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2021, 24 (01) :293-317
[23]   Toward Privacy Preservation Using Clustering Based Anonymization: Recent Advances and Future Research Outlook [J].
Majeed, Abdul ;
Khan, Safiullah ;
Hwang, Seong Oun .
IEEE ACCESS, 2022, 10 :53066-53097
[24]   A novel blockchain-based privacy-preserving framework for online social networks [J].
Zhang, Shiwen ;
Yao, Tingting ;
Sandor, Voundi Koe Arthur ;
Weng, Tien-Hsiung ;
Liang, Wei ;
Su, Jinshu .
CONNECTION SCIENCE, 2021, 33 (03) :555-575
[25]   Framework of data privacy preservation and location obfuscation in vehicular cloud networks [J].
Al-Balasmeh, Hani ;
Singh, Maninder ;
Singh, Raman .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (05)
[26]   A privacy preservation framework for feedforward-designed convolutional neural networks [J].
Li, De ;
Wang, Jinyan ;
Li, Qiyu ;
Hu, Yuhang ;
Li, Xianxian .
NEURAL NETWORKS, 2022, 155 :14-27
[27]   Privacy Threat Modeling Framework for Online Social Networks [J].
Wang, Yong ;
Nepali, Raj Kumar .
PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON COLLABORATION TECHNOLOGIES AND SYSTEMS, 2015, :358-363
[28]   Efficiently Anonymizing Social Networks with Reachability Preservation [J].
Liu, Xiangyu ;
Wang, Bin ;
Yang, Xiaochun .
PROCEEDINGS OF THE 22ND ACM INTERNATIONAL CONFERENCE ON INFORMATION & KNOWLEDGE MANAGEMENT (CIKM'13), 2013, :1613-1618
[29]   User Motivation Based Privacy Preservation in Location Based Social Networks [J].
Sai, Akshita Maradapu Vera Venkata ;
Zhang, Kainan ;
Li, Yingshu .
2021 IEEE SMARTWORLD, UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTING, SCALABLE COMPUTING & COMMUNICATIONS, INTERNET OF PEOPLE, AND SMART CITY INNOVATIONS (SMARTWORLD/SCALCOM/UIC/ATC/IOP/SCI 2021), 2021, :471-478
[30]   A negative survey based privacy preservation method for topology of social networks [J].
Jiang, Hao ;
Liao, Yuerong ;
Zhao, Dongdong ;
Li, Yiheng ;
Mu, Kehang ;
Yu, Qianwei .
APPLIED SOFT COMPUTING, 2023, 146