Protecting online social networks profiles by hiding sensitive data attributes

被引:2
作者
AbdulKader, Hatem [1 ]
ElAbd, Emad [1 ]
Ead, Waleed [2 ]
机构
[1] Menoufia Univ, Fac Comp & Informat, Shibin Al Kawm, Menofia Governo, Egypt
[2] Beni Suef Univ, Fac Comp & Informat, Bani Suwayf, Beni Suef Gover, Egypt
来源
4TH SYMPOSIUM ON DATA MINING APPLICATIONS (SDMA2016) | 2016年 / 82卷
关键词
online social networks; user's profiles; privacy preserving; profiles attacks;
D O I
10.1016/j.procs.2016.04.004
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Online Social Networks (OSNs) have become a mainstream cultural phenomenon for millions of Internet users. More importantly, OSNs expose now information from multiple social spheres e.g. personal information or professional activity. We identify two stakeholders in online social networks: the OSN users and the OSN itself. On one hand, OSN users share an astonishing amount of information ranging from personal to professional. On the other hand, OSN services handle users' information and manage all users' activities in the network, being responsible for the correct functioning of its services and maintaining a profitable business model. Indirectly, this translates into ensuring that their users continue to happily use their services without becoming victims of malicious actions. We thus classify online social networks privacy and security issues into two categories of attacks on users and OSN. In this paper we propose a utility based association rule hiding algorithm for privacy preserving user profiles data against attacks from OSN users or even OSN applications. Experimental has been conducted on samples of real datasets. Experimental has been showed less attribute modification in the released user's profiles datasets. Published by Elsevier B.V.
引用
收藏
页码:20 / 27
页数:8
相关论文
共 20 条
[1]  
Aggarwal C.C., 2015, Data Mining: The Textbook, DOI [10.1007/978-3-319-14142-8, DOI 10.1007/978-3-319-14142-8]
[2]   Dare to share: Protecting sensitive knowledge with data sanitization [J].
Amiri, Ali .
DECISION SUPPORT SYSTEMS, 2007, 43 (01) :181-191
[3]  
[Anonymous], 2011, Fifth International AAAI Conference on Weblogs and Social Media, DOI 10.1609/icwsm.v5i1.14127
[4]  
[Anonymous], 2015, ARXIV150403342, DOI DOI 10.1016/J.OSNEM.2017.09.001
[5]  
[Anonymous], 2014, INT S FDN PRACT SEC
[6]  
Bonneau J., 2009, SOCIAL NETWORK ANAL
[7]  
Felt A., 2008, 2008 WEB 2 0 SECURIT
[8]  
Fiesler C., 2014, CHI 14 HUM FACT COMP
[9]   Socialbots: Voices from the fronts [J].
Hwang, Tim ;
Pearce, Ian ;
Nanis, Max .
Interactions, 2012, 19 (02) :38-45
[10]  
Levine B., 2013, SURVEY SOLUTIONS SYB