Securing Social Media User Data - An Adversarial Approach

被引:14
作者
Beigi, Ghazaleh [1 ]
Zhang, Yanchao [1 ]
Shu, Kai [1 ]
Liu, Huan [1 ]
机构
[1] Arizona State Univ, Tempe, AZ 85287 USA
来源
HT'18: PROCEEDINGS OF THE 29TH ACM CONFERENCE ON HYPERTEXT AND SOCIAL MEDIA | 2018年
关键词
DE-ANONYMIZATION; PRIVACY;
D O I
10.1145/3209542.3209552
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Social media users generate tremendous amounts of data. To better serve users, it is required to share the user-related data among researchers, advertisers and application developers. Publishing such data would raise more concerns on user privacy. To encourage data sharing and mitigate user privacy concerns, a number of anonymization and de-anonymization algorithms have been developed to help protect privacy of social media users. In this work, we propose a new adversarial attack specialized for social media data. We further provide a principled way to assess effectiveness of anonymizing different aspects of social media data. Our work sheds light on new privacy risks in social media data due to innate heterogeneity of user-generated data which require striking balance between sharing user data and protecting user privacy.
引用
收藏
页码:165 / 173
页数:9
相关论文
共 37 条
  • [1] Privacy Preserving Social Network Data Publication
    Abawajy, Jemal H.
    Ninggal, Mohd Izuan Hafez
    Herawan, Tutut
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (03): : 1974 - 1997
  • [2] [Anonymous], 2016, SIGKDD Explorations, DOI 10.1145/3068777.3068781
  • [3] Backstrom Lars, 2007, P INT C WORLD WID WE
  • [4] Beigi G., 2016, P 2016 SIAM INT C DA, P81, DOI DOI 10.1137/1.9781611974348.10
  • [5] Beigi G., 2018, INT C SOC COMP BEH C
  • [6] Beigi Ghazaleh, 2014, ASE INT C SOC COMP P
  • [7] Beigi Ghazaleh, 2016, 10 INT C WEB SOC MED
  • [8] Beretta Valentina, 2015, P 26TH ACM C HYPERTE
  • [9] A non-local algorithm for image denoising
    Buades, A
    Coll, B
    Morel, JM
    [J]. 2005 IEEE COMPUTER SOCIETY CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION, VOL 2, PROCEEDINGS, 2005, : 60 - 65
  • [10] Crandall DavidJ., 2008, KDD, P160