Disclose More and Risk Less: Privacy Preserving Online Social Network Data Sharing

被引:13
作者
Chen, Jiayi [1 ]
He, Jianping [2 ,3 ]
Cai, Lin [1 ]
Pan, Jianping [4 ]
机构
[1] Univ Victoria, Dept Elect & Comp Engn, Victoria, BC V8P 5C2, Canada
[2] Shanghai Jiao Tong Univ, Dept Automat, Shanghai 200000, Peoples R China
[3] Minist Educ China, Key Lab Syst Control & Informat Proc, Shanghai 100816, Peoples R China
[4] Univ Victoria, Dept Comp Sci, Victoria, BC V8P 5C2, Canada
基金
加拿大自然科学与工程研究理事会; 加拿大创新基金会;
关键词
Privacy; Data privacy; Authorization; Servers; Feature extraction; Facebook; Inference attack; online social network; privacy; data sharing; INFERENCE; KNOWLEDGE;
D O I
10.1109/TDSC.2018.2861403
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Many third-party services and applications have integrated the login services of popular Online Social Networks, such as Facebook and Google+, and acquired user information to enrich their services by requesting user's permission. Although users can control the information disclosed to the third parties in a certain granularity, there are still serious privacy risks due to the inference attack. Even if users conceal their sensitive information, attackers can infer their secrets by exploiting the correlations among private and public information with background knowledge. To defend against such attacks, we formulate the social network data sharing problem through an optimization-based approach, which maximizes the users' self-disclosure utility while preserving their privacy. We propose two privacy-preserving social network data sharing methods to counter the inference attack. One is the efficiency-based privacy-preserving disclosure algorithm (EPPD) targeting the high utility, and the other is to convert the original problem into a multi-dimensional knapsack problem (d-KP) using greedy heuristics with a low computational complexity. We use real-world social network datasets to evaluate the performance. From the results, the proposed methods achieve a better performance when compared with the existing ones.
引用
收藏
页码:1173 / 1187
页数:15
相关论文
共 38 条
[1]   Friends and neighbors on the Web [J].
Adamic, LA ;
Adar, E .
SOCIAL NETWORKS, 2003, 25 (03) :211-230
[2]  
Carminati B., 2013, SYNTHESIS LECT INFOR, V4, P1, DOI DOI 10.2200/S00549ED1V01Y201311SPT008
[3]   Enforcing Access Control in Web-Based Social Networks [J].
Carminati, Barbara ;
Ferrari, Elena ;
Perego, Andrea .
ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2009, 13 (01)
[4]   Facial Expression Recognition in Video with Multiple Feature Fusion [J].
Chen, Junkai ;
Chen, Zenghai ;
Chi, Zheru ;
Fu, Hong .
IEEE TRANSACTIONS ON AFFECTIVE COMPUTING, 2018, 9 (01) :38-50
[5]   An Access Control Model for Online Social Networks Using User-to-User Relationships [J].
Cheng, Yuan ;
Park, Jaehong ;
Sandhu, Ravi .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2016, 13 (04) :424-436
[6]   Publishing Graph Degree Distribution with Node Differential Privacy [J].
Day, Wei-Yen ;
Li, Ninghui ;
Lyu, Min .
SIGMOD'16: PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON MANAGEMENT OF DATA, 2016, :123-138
[7]   Inferring User Demographics and Social Strategies in Mobile Social Networks [J].
Dong, Yuxiao ;
Yang, Yang ;
Tang, Jie ;
Yangt, Yang ;
Chawla, Nitesh, V .
PROCEEDINGS OF THE 20TH ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING (KDD'14), 2014, :15-24
[8]   Differential privacy: A survey of results [J].
Dwork, Cynthia .
THEORY AND APPLICATIONS OF MODELS OF COMPUTATION, PROCEEDINGS, 2008, 4978 :1-19
[9]  
Dwyer Catherine., 2007, AMCIS, P339
[10]   Relational User Attribute Inference in Social Media [J].
Fang, Quan ;
Sang, Jitao ;
Xu, Changsheng ;
Hossain, M. Shamim .
IEEE TRANSACTIONS ON MULTIMEDIA, 2015, 17 (07) :1031-1044