Privacy protection of online social network users, against attribute inference attacks, through the use of a set of exhaustive rules

被引:8
作者
Reza, Khondker Jahid [1 ]
Islam, Md Zahidul [1 ]
Estivill-Castro, Vladimir [2 ]
机构
[1] Charles Sturt Univ, Sch Comp & Math, Panorama Ave, Bathurst, NSW 2795, Australia
[2] Univ Pompeu Fabra, Dept Tecnol Informac & Comunicac, Roc Boronat 138, Barcelona 08018, Spain
关键词
Attribute inference attack; Data mining; Online social networks; Privacy preserving technique; COMPUTATIONAL INTELLIGENCE; ALGORITHM;
D O I
10.1007/s00521-021-05860-8
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A malicious data miner can infer users' private information in online social networks (OSNs) by data mining the users' disclosed information. By exploring the public information about a target user (i.e. an individual or a group of OSN users whose privacy is under attack), attackers can prepare a training data set holding similar information about other users who openly disclosed their data. Using a machine learning classifier, the attacker can input released information about users under attack as non-class attributes and extract the private information as a class attribute. Some techniques offer some privacy protection against specific classifiers;, however, the provided privacy can be under threat if an attacker uses a different classifier (rather than the one used by the privacy protection techniques) to infer sensitive information. In reality, it is difficult to predict the classifiers involved in a privacy attack. In this study, we propose a privacy-preserving technique which first prepares a training data set in a similar way that an attacker can prepare and then takes an approach independent of the classifiers to extract patterns (or logic rules) from the training data set. Based on the extracted rule set, it then suggests the target users to hide some non-class attribute values and/or modify some friendship links for protecting their privacy. We apply our proposed technique on two OSN data sets containing users' attribute values and their friendship links For evaluating the performance of the proposed technique, we use conventional classifiers such as Naive Bayes, Support Vector Machine and Random Forest on the privacy-protected data sets. The experimental results show that our proposed technique outperforms the existing privacy-preserving algorithms in terms of securing privacy while maintaining the data utility.
引用
收藏
页码:12397 / 12427
页数:31
相关论文
共 51 条
[1]   Friends and neighbors on the Web [J].
Adamic, LA ;
Adar, E .
SOCIAL NETWORKS, 2003, 25 (03) :211-230
[2]   Forest PA: Constructing a decision forest by penalizing attributes used in previous trees [J].
Adnan, Md Nasim ;
Islam, Md Zahidul .
EXPERT SYSTEMS WITH APPLICATIONS, 2017, 89 :389-403
[3]  
Al-Saggaf Y., 2012, ETHICAL SPACE INT J, V9, P32
[4]   Data Mining and Privacy of Social Network Sites' Users: Implications of the Data Mining Problem [J].
Al-Saggaf, Yeslam ;
Islam, Md Zahidul .
SCIENCE AND ENGINEERING ETHICS, 2015, 21 (04) :941-966
[5]  
[Anonymous], 1974, The Design and Analysis of Computer Algorithms
[6]  
[Anonymous], 2010, Privacy-Aware Knowledge Discovery, Novel Applications and New Techniques
[7]   Computational intelligence approach for modeling hydrogen production: a review [J].
Ardabili, Sina Faizollahzadeh ;
Najafi, Bahman ;
Shamshirband, Shahaboddin ;
Bidgoli, Behrouz Minaei ;
Deo, Ravinesh Chand ;
Chau, Kwok-wing .
ENGINEERING APPLICATIONS OF COMPUTATIONAL FLUID MECHANICS, 2018, 12 (01) :438-458
[8]  
Australia YB, 2008, AUSTR BUREAU STAT, P161
[9]   Random forests [J].
Breiman, L .
MACHINE LEARNING, 2001, 45 (01) :5-32
[10]   Use of Meta-Heuristic Techniques in Rainfall-Runoff Modelling [J].
Chau, Kwok-wing .
WATER, 2017, 9 (03)