Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1007/978-981-99-7254-8_17guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Priv-S: Privacy-Sensitive Data Identification in Online Social Networks

Published: 25 October 2023 Publication History
  • Get Citation Alerts
  • Abstract

    Privacy inference imposes a serious threat to user privacy in Online Social Networks (OSNs) as the vast amount of personal data and relationships in OSNs can be used not only to infer user privacy but also to enrich the training set of inference methods. Previous studies have mostly focused on privacy inference from the perspective of the adversary with the objective of tracking the accuracy of the inference results. However, countering privacy inference requires not only the analysis of the inference method but also the roles that data would play in the inference process, i.e., to determine the sensitivity of the data. To address this issue, in this paper, we propose a model for the identification of privacy-sensitive data in which we formulate the identification as an influence maximization problem to identify both the privacy-sensitive users and the privacy-sensitive attributes for privacy inference. In our model, a privacy-affected tree is first constructed based on the influence between users with respect to the concerned privacy. Then, privacy-sensitive users in the privacy-affected tree are identified along with their privacy-sensitive attributes based on their contribution to the inference result of the concerned privacy. Experiments show that the results of our proposed model can significantly affect the accuracy of privacy inference, which demonstrates that our model can identify the privacy-sensitive data. Meanwhile, the impact of privacy-sensitive users and privacy-sensitive attributes is analyzed to guide the design of effective privacy-enhancing technologies.

    References

    [1]
    Sun, Q., Xu, Y.: Research on privacy concerns of social network users. In: 2019 IEEE 5th International Conference on Computer and Communications (ICCC), pp. 1453–1460 (2019)
    [2]
    Wang Z, Zhu H, and Sun L Social engineering in cybersecurity: effect mechanisms, human vulnerabilities and attack methods IEEE Access 2021 9 11895-11910
    [3]
    Al-Dablan, D., Al-Hamad, A., Al-Bahlal, R., Badawi, M.A.: An analysis of various social engineering attack in social network using machine learning algorithm. Int. J. Distrib. Sens. Networks. 46 (2020)
    [4]
    Piao, Y., Ye, K., Cui, X.: Privacy inference attack against users in online social networks: a literature review. IEEE Access 9, 40417–40431 (2021)
    [5]
    Jia, J., Wang, B., Zhang, L., Gong, N.Z.: AttriInfer: inferring user attributes in online social networks using Markov random fields (2017)
    [6]
    Gong, N.Z., Liu, B.: Attribute inference attacks in online social networks. ACM Trans. Priv. Secur. 21, 3 (2018)
    [7]
    Mao J, Tian W, Yang Y, and Liu J An efficient social attribute inference scheme based on social links and attribute relevance IEEE Access 2019 7 153074-153085
    [8]
    Tian, Y., Niu, Y., Yan, J., Tian, F.: Inferring private attributes based on graph convolutional neural network in social networks. In: Proceedings of the 2019 International Conference on Networking and Network Applications. NaNA 2019, pp. 186–190 (2019)
    [9]
    Wu, Y., Lian, D., Jin, S., Chen, E.: Graph convolutional networks on user mobility heterogeneous graphs for social relationship inference. In: IJCAI International Joint Conference on Artificial Intelligence, 2019-August, pp. 3898–3904 (2019)
    [10]
    Luo X, Xie M, Zhang K, Zhou F, and Zhong T DeepAttr: inferring demographic attributes via social network embedding IEEE Access 2019 7 130270-130282
    [11]
    Sutton C and McCallum A An introduction to conditional random fields Found. Trends Mach. Learn. 2011 4 267-373
    [12]
    Heatherly R, Kantarcioglu M, and Thuraisingham B Preventing private information inference attacks on social networks IEEE Trans. Knowl. Data Eng. 2013 25 1849-1862
    [13]
    Qian J, Li XY, Zhang C, Chen L, Jung T, and Han J Social network de-anonymization and privacy inference with knowledge graph model IEEE Trans. Dependable Secur. Comput. 2019 16 679-692
    [14]
    Liu Y and Li N Retrieving hidden friends: a collusion privacy attack against online friend search engine IEEE Trans. Inf. Forensics Secur. 2019 14 833-847
    [15]
    Borgs, C., Brautbar, M., Chayes, J., Lucier, B.: Maximizing social influence in nearly optimal time. Soc. Ind. Appl. Math. (2014)
    [16]
    Wang X, Zhang Y, Zhang W, Lin X, and Chen C Bring order into the samples: a novel scalable method for influence maximization IEEE Trans. Knowl. Data Eng. 2017 29 243-256
    [17]
    Song, C., Hsu, W., Lee, M.L.: Targeted influence maximization in social networks. In: Proceedings of the 25th ACM International on Conference on Information and Knowledge Management, pp. 1683–1692 (2016)
    [18]
    McPherson M, Smith-Lovin L, and Cook JM Birds of a feather: homophily in social networks Annu. Rev. Sociol. 2001 27 415-444
    [19]
    Mcauley, J.: Learning to discover social circles in ego networks. In: NIPS2012, pp. 1–9 (2012)
    [20]
    Tang, J., Tang, X., Xiao, X., Yuan, J.: Online processing algorithms for influence maximization. In: Proceedings of the ACM SIGMOD International Conference on Management Data, pp. 991–1005 (2018)
    [21]
    Tang, J., Tang, X., Yuan, J.: Profit maximization for viral marketing in online social networks: algorithms and analysis. IEEE Trans. Knowl. Data Eng. 30(6), 1095–1108 (2017)

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image Guide Proceedings
    Web Information Systems Engineering – WISE 2023: 24th International Conference, Melbourne, VIC, Australia, October 25–27, 2023, Proceedings
    Oct 2023
    952 pages
    ISBN:978-981-99-7253-1
    DOI:10.1007/978-981-99-7254-8
    • Editors:
    • Feng Zhang,
    • Hua Wang,
    • Mahmoud Barhamgi,
    • Lu Chen,
    • Rui Zhou

    Publisher

    Springer-Verlag

    Berlin, Heidelberg

    Publication History

    Published: 25 October 2023

    Author Tags

    1. privacy protection
    2. privacy inference
    3. targeted influence maximization
    4. online social networks

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 0
      Total Downloads
    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 27 Jul 2024

    Other Metrics

    Citations

    View Options

    View options

    Get Access

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media