Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

A privacy‐sensitive data identification model in online social networks

Published: 15 January 2024 Publication History

Abstract

Privacy protection in online social networks (OSNs) has received a great deal of attention in recent years. One way of circumventing conventional privacy protection is privacy inference based on data that can be easily obtained in OSNs. Previous work on privacy inference has studied the issue mostly from the viewpoint of the attackers and methods thus designed were mostly aimed at pursuing the accuracy of the inference results with little regard on the causes of privacy breaches. To develop more effective privacy protection mechanisms that takes privacy inference into consideration, it is necessary to identify the information that plays a more important role in privacy breaches. In this paper, we propose a privacy‐sensitive data identification model in OSNs, which can identify key pieces of data that are most sensitive as far the privacy of the user is concerned. Firstly, a privacy inference method is proposed based on conditional random fields to infer the privacy of the target users. Then, a privacy‐sensitive data identification method is proposed by using the intermediate data of the proposed privacy inference method based on the targeted influence maximization algorithm. Thus, the key pieces of data in the form of user attributes and relationships on which the privacy of the target user depends can be determined to facilitate the implementation of privacy protection mechanisms. The effectiveness as well as the advantages of the proposed model is verified and demonstrated through experiment using real datasets. The impact of the key factors on privacy inference is also analyzed to guide the design of effective privacy protection strategies.

Graphical Abstract

A model for privacy‐sensitive data identification is presented, in which the key pieces of data in the form of user attributes and relationships on which the privacy of the target user depends can be determined to facilitate the implementation of privacy protection mechanisms.

References

[1]
Atzori L, Iera A, Morabito G, Nitti M. The social internet of things (SIoT)—when social networks meet the internet of things: concept, architecture and network characterization. Comput Netw. 2012;56:3594‐3608.
[2]
Vegni AM, Loscrí V. A survey on vehicular social networks. IEEE Commun Surv Tutor. 2015;17:2397‐2419.
[3]
Cadwalladr C. Emma Graham‐Harrison, Revealed: 50 Million Fackbook Profiles Harvested for Cambridge Analytica in Major Data Breach, Guardian. 2018 https://www.theguardian.com/news/2018/mar/17/cambridge‐analytica‐facebook‐influence‐us‐election
[4]
Wang C, Wu X, Liu G, Deng T, Peng K, Wan S. Safeguarding cross‐silo federated learning with local differential privacy. Digit Commun Netw. 2022;8:446‐454.
[5]
Peng K, Li M, Huang H, Wang C, Wan S, Choo K‐KR. Security challenges and opportunities for smart contracts in internet of things: a survey. IEEE Internet Things J. 2021;8:12004‐12020.
[6]
Wang Z, Zhu H, Sun L. Social engineering in cybersecurity: effect mechanisms, human vulnerabilities and attack methods. IEEE Access. 2021;9:11895‐11910.
[7]
Al‐Dablan D, Al‐Hamad A, Al‐Bahlal R, Badawi MA. An analysis of various social engineering attack in social network using machine learning algorithm. Int J Compu Sci Netw Sec Netw Secu. 2020;20:46‐49.
[8]
Piao Y, Ye K, Cui X. Privacy inference attack against users in online social networks: a literature review. IEEE Access. 2021;9:40417‐40431.
[9]
Zhang T, Wang Y, Ding Y, Jiang X, Liang H, Wang H. Privacy‐preserving blockchain‐based contract signing with multi‐party supervision. Trans Emerg Telecommun Technol. 2022;n/a:e4710.
[10]
Heatherly R, Kantarcioglu M, Thuraisingham B. Preventing private information inference attacks on social networks. IEEE Trans Knowl Data Eng. 2013;25:1849‐1862.
[11]
Cai Z, He Z, Guan X, Li Y. Collective data‐sanitization for preventing sensitive information inference attacks in social networks. IEEE Trans Dependable Secur Comput. 2018;15:577‐590.
[12]
Jia J, Wang B, Zhang L, Gong NZ. AttriInfer: inferring user attributes in online social networks using Markov random fields. 26th Int World Wide Web Conf WWW 2017, pp. 1561–1569.
[13]
Gong NZ, Liu B. Attribute inference attacks in online social networks. ACM Trans Priv Secur. 2018;21:1‐30.
[14]
Mao J, Tian W, Yang Y, Liu J. An efficient social attribute inference scheme based on social links and attribute relevance. IEEE Access. 2019;7:153074‐153085.
[15]
Xian X, Wu T, Liu Y, et al. Towards link inference attack against network structure perturbation. Knowl‐Based Syst. 2021;218:106674.
[16]
Wu Y, Lian D, Jin S, Chen E. Graph convolutional networks on user mobility heterogeneous graphs for social relationship inference. IJCAI Int Jt Conf Artif Intell. 2019;2019:3898‐3904.
[17]
Huang Y, Yu L, Wang X, Cui B. A multi‐source integration framework for user occupation inference in social media systems. World Wide Web. 2015;18:1247‐1267.
[18]
Kang Z, Li X, Cao Y, Shang Y, Liu Y, Guo L. Hierarchical attention networks for user profile inference in social media systems. Artif Neural Netw Mach Learn ‐ ICANN 2018, PT III. 2018; 11141:805‐816.
[19]
Tian Y, Niu Y, Yan J, Tian F. Inferring private attributes based on graph convolutional neural network in social networks. Proc 2019 Int Conf Netw Netw Appl NaNA. 2019;2019:186‐190.
[20]
Luo X, Xie M, Zhang K, Zhou F, Zhong T. DeepAttr: inferring demographic attributes via social network embedding. IEEE Access. 2019;7:130270‐130282.
[21]
Qian J, Li XY, Zhang C, Chen L, Jung T, Han J. Social network De‐anonymization and privacy inference with knowledge graph model. IEEE Trans Dependable Secur Comput. 2019;16:679‐692.
[22]
Liu Y, Li N. Retrieving hidden friends: a collusion privacy attack against online friend search engine. IEEE Trans Inf Forensics Secur. 2019;14:833‐847.
[23]
Yao S, Zhang D. BPRT: a blockchain‐based privacy‐preserving transaction scheme based on an efficient broadcast encryption with personalized messages. Trans Emerg Telecommun Technol. 2023;34:e4675.
[24]
Mouton F, Leenen L, Venter HS. Social engineering attack examples, templates and scenarios. Comput Secur. 2016;59:186‐209.
[25]
Thakur K, Hayajneh T, Tseng J. Cyber security in social media: challenges and the way forward. IT Prof. 2019;21:41‐49.
[26]
McPherson M, Smith‐Lovin L, Cook JM. Birds of a feather: homophily in social networks. Annu Rev Sociol. 2001;27:415‐444.
[27]
Sutton C, McCallum A. An introduction to conditional random fields, found. Trends Mach Learn. 2011;4:267‐373.
[28]
Murphy KP. Loopy belief propagation for approximate inference: an empirical study. Proc Uncertain AI. 1999;1999:467–475.
[29]
Song C, Hsu W, Lee ML. Targeted influence maximization in social networks. CIKM'16: Proc 2016 ACM Conf Inf Knowl Manag. 2016; 24‐28:1683‐1692.
[30]
Tang J, Tang X, Yuan J. Profit maximization for viral Marketing in Online social networks: algorithms and analysis. IEEE Trans Knowl Data Eng. 2018;30:1095–1108.
[31]
Borgs C, Brautbar M, Chayes J, Lucier B. Maximizing social influence in nearly optimal time. Proc Annu ACM‐SIAM Symp Discr Algor. 2014;946–957.
[32]
NetworkX‐Network Analysis in Python. n.d. https://networkx.org
[33]
Mcauley J. Learning to discover social circles in ego networks, NIPS2012; 2012, pp. 1–9.
[34]
Rozemberczki B, Sarkar R. Characteristic functions on graphs: birds of a feather, from statistical descriptors to parametric models. In: Proc. 29th ACM Int. Conf. Inf. Knowl. Manag. (CIKM '20), 2020: pp. 1325–1334.
[35]
scikit‐learn: Machine Learning in Python, (n.d.). https://scikit‐learn.org/stable/index.html
[36]
Tang J, Tang X, Xiao X, Yuan J. Online processing algorithms for influence maximization. Proc ACM SIGMOD Int Conf Manag Data. 2018;991‐1005.
[37]
Watts DJ, Strogatz SH. Collective dynamics of ‘small‐world’ networks. Nature. 1998;393:440‐442.

Index Terms

  1. A privacy‐sensitive data identification model in online social networks
        Index terms have been assigned to the content through auto-classification.

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image Transactions on Emerging Telecommunications Technologies
        Transactions on Emerging Telecommunications Technologies  Volume 35, Issue 1
        January 2024
        1099 pages
        EISSN:2161-3915
        DOI:10.1002/ett.v35.1
        Issue’s Table of Contents

        Publisher

        John Wiley & Sons, Inc.

        United States

        Publication History

        Published: 15 January 2024

        Qualifiers

        • Research-article

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • 0
          Total Citations
        • 0
          Total Downloads
        • Downloads (Last 12 months)0
        • Downloads (Last 6 weeks)0
        Reflects downloads up to 02 Sep 2024

        Other Metrics

        Citations

        View Options

        View options

        Get Access

        Login options

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media