SPCSS: Social Network Based Privacy-Preserving Criminal Suspects Sensing

被引:9
作者
Xu, Jian [1 ]
Wang, Andi [1 ]
Wu, Jun [2 ,3 ]
Wang, Chen [1 ]
Wang, Ruijin [4 ]
Zhou, Fucai [1 ]
机构
[1] Northeastern Univ, Software Coll, Shenyang 110169, Peoples R China
[2] Shanghai Jiao Tong Univ, Sch Cyber Secur, Shanghai 200240, Peoples R China
[3] Shanghai Key Lab Integrated Adm Technol Informat, Shanghai 200240, Peoples R China
[4] Univ Elect Sci & Technol China, Sch Informat & Software Engn, Chengdu 610054, Peoples R China
基金
中国国家自然科学基金;
关键词
Classifier; criminal suspects analysis; decision tree; privacy-preserving; social network; SECURE;
D O I
10.1109/TCSS.2019.2960857
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With development of online social networks, many criminal suspects use social network to communicate with each other. In order to obtain valuable criminal clues, considerable research works have been done to analyze criminal suspects' social data. However, most of them did not pay much attention on privacy-preserving problems, which may leak some sensitive data in the analysis process. To solve this problem, we propose a novel analysis approach of criminal suspects by exploiting social data and crime data that are collected by social network and police information systems. We enable the social cloud server and public security cloud server to exchange social information of criminal suspects and user's public information in a privacy-preserving way. Specifically, we propose a privacy-preserving data retrieving method based on oblivious transfer to guarantee that only the authorized entities can perform queries on suspects' social data, while the social cloud server cannot infer anything during the query. Moreover, several building blocks, such as encrypted data comparing, secure classification and regression tree (CART) model are also proposed. Based on these building blocks, we designed a privacy-preserving criminal suspects sensing scheme. Finally, we demonstrate a performance evaluation which shows that our scheme can enhance analysis of criminal suspects without privacy leakage, while with low overhead.
引用
收藏
页码:261 / 274
页数:14
相关论文
共 27 条
[1]   Deep Learning with Differential Privacy [J].
Abadi, Martin ;
Chu, Andy ;
Goodfellow, Ian ;
McMahan, H. Brendan ;
Mironov, Ilya ;
Talwar, Kunal ;
Zhang, Li .
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, :308-318
[2]  
[Anonymous], METRIKA
[3]   Evidence collection and forensics on social networks: Research challenges and directions [J].
Arshad, Humaira ;
Jantan, Aman ;
Omolara, Esther .
DIGITAL INVESTIGATION, 2019, 28 :126-138
[4]  
Bost R., 2015, P NDSS
[5]   Online suicide prevention through optimised text classification [J].
Desmet, Bart ;
Hoste, Veronique .
INFORMATION SCIENCES, 2018, 439 :61-78
[6]   A PUBLIC KEY CRYPTOSYSTEM AND A SIGNATURE SCHEME BASED ON DISCRETE LOGARITHMS [J].
ELGAMAL, T .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1985, 31 (04) :469-472
[7]  
Goldwasser Shafi., P 14 ANN ACM S THEOR, P365, DOI DOI 10.1145/800070.802212
[8]   A review of data mining applications in crime [J].
Hassani, Hossein ;
Huang, Xu ;
Silva, Emmanuel S. ;
Ghodsi, Mansi .
STATISTICAL ANALYSIS AND DATA MINING, 2016, 9 (03) :139-154
[9]   Crime rate prediction in the urban environment using social factors [J].
Ingilevich, Varvara ;
Ivanov, Sergey .
7TH INTERNATIONAL YOUNG SCIENTISTS CONFERENCE ON COMPUTATIONAL SCIENCE, YSC2018, 2018, 136 :472-478
[10]   Toward Privacy-Preserving Symptoms Matching in SDN-Based Mobile Healthcare Social Networks [J].
Jiang, Shunrong ;
Duan, Mengjie ;
Wang, Liangmin .
IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (03) :1379-1388