Disclose More and Risk Less: Privacy Preserving Online Social Network Data Sharing

被引:13
作者
Chen, Jiayi [1 ]
He, Jianping [2 ,3 ]
Cai, Lin [1 ]
Pan, Jianping [4 ]
机构
[1] Univ Victoria, Dept Elect & Comp Engn, Victoria, BC V8P 5C2, Canada
[2] Shanghai Jiao Tong Univ, Dept Automat, Shanghai 200000, Peoples R China
[3] Minist Educ China, Key Lab Syst Control & Informat Proc, Shanghai 100816, Peoples R China
[4] Univ Victoria, Dept Comp Sci, Victoria, BC V8P 5C2, Canada
基金
加拿大自然科学与工程研究理事会; 加拿大创新基金会;
关键词
Privacy; Data privacy; Authorization; Servers; Feature extraction; Facebook; Inference attack; online social network; privacy; data sharing; INFERENCE; KNOWLEDGE;
D O I
10.1109/TDSC.2018.2861403
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Many third-party services and applications have integrated the login services of popular Online Social Networks, such as Facebook and Google+, and acquired user information to enrich their services by requesting user's permission. Although users can control the information disclosed to the third parties in a certain granularity, there are still serious privacy risks due to the inference attack. Even if users conceal their sensitive information, attackers can infer their secrets by exploiting the correlations among private and public information with background knowledge. To defend against such attacks, we formulate the social network data sharing problem through an optimization-based approach, which maximizes the users' self-disclosure utility while preserving their privacy. We propose two privacy-preserving social network data sharing methods to counter the inference attack. One is the efficiency-based privacy-preserving disclosure algorithm (EPPD) targeting the high utility, and the other is to convert the original problem into a multi-dimensional knapsack problem (d-KP) using greedy heuristics with a low computational complexity. We use real-world social network datasets to evaluate the performance. From the results, the proposed methods achieve a better performance when compared with the existing ones.
引用
收藏
页码:1173 / 1187
页数:15
相关论文
共 38 条
[21]  
Kellerer H., 2004, INTRO NP COMPLETENES
[22]  
Leskovec J, 2014, SNAP datasets: Stanford large network dataset collection
[23]   Privacy Leakage of Location Sharing in Mobile Social Networks: Attacks and Defense [J].
Li, Huaxin ;
Zhu, Haojin ;
Du, Suguo ;
Liang, Xiaohui ;
Shen, Xuemin .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2018, 15 (04) :646-660
[24]  
Liu JF, 2013, TRANS DATA PRIV, V6, P185
[25]  
Machanavajjhala A., 2007, ACM T KNOWL DISCOV D, V1, P3, DOI [10.1145/1217299.1217302, DOI 10.1145/1217299.1217302]
[26]  
Macskassy SA, 2007, J MACH LEARN RES, V8, P935
[27]  
Martin DJ, 2007, PROC INT CONF DATA, P101
[28]  
Mislove A., 2010, P 3 ACM INT C WEB SE, P251
[29]  
Qian JW, 2016, 2016 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL ELECTROMAGNETICS (ICCEM), P1, DOI 10.1109/COMPEM.2016.7588593
[30]   Social Network De-Anonymization and Privacy Inference with Knowledge Graph Model [J].
Qian, Jianwei ;
Li, Xiang-Yang ;
Zhang, Chunhong ;
Chen, Linlin ;
Jung, Taeho ;
Han, Junze .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2019, 16 (04) :679-692