期刊文献+

Background knowledge based privacy metric model for online social networks

Background knowledge based privacy metric model for online social networks
原文传递
导出
摘要 The data of online social network (OSN) is collected currently by the third party for various purposes. One of the problems in such practices is how to measure the privacy breach to assure users. The recent work on OSN privacy is mainly focus on privacy-preserving data publishing. However, the work on privacy metric is not systematic but mainly focus on the traditional datasets. Compared with the traditional datasets, the attribute types in OSN are more diverse and the tuple is relevant to each other. The retweet and comment make the graph character of OSN notably. Furthermore, the open application programming interfaces (APIs) and lower register barrier make OSN open environment, in which the background knowledge is more easily achieved by adversaries. This paper analyzes the background knowledge in OSN and discusses its characteristics in detail. Then a privacy metric model faces OSN background knowledge based on kernel regression is proposed. In particular, this model takes the joint attributes and link knowledge into consideration. The effect of different data distributions is discussed. The real world data set from weibo.com has been adopted. It is demonstrated that the privacy metric algorithm in this article is effective in OSN privacy evaluation. The prediction error is 30% lower than that of the work mentioned above The data of online social network (OSN) is collected currently by the third party for various purposes. One of the problems in such practices is how to measure the privacy breach to assure users. The recent work on OSN privacy is mainly focus on privacy-preserving data publishing. However, the work on privacy metric is not systematic but mainly focus on the traditional datasets. Compared with the traditional datasets, the attribute types in OSN are more diverse and the tuple is relevant to each other. The retweet and comment make the graph character of OSN notably. Furthermore, the open application programming interfaces (APIs) and lower register barrier make OSN open environment, in which the background knowledge is more easily achieved by adversaries. This paper analyzes the background knowledge in OSN and discusses its characteristics in detail. Then a privacy metric model faces OSN background knowledge based on kernel regression is proposed. In particular, this model takes the joint attributes and link knowledge into consideration. The effect of different data distributions is discussed. The real world data set from weibo.com has been adopted. It is demonstrated that the privacy metric algorithm in this article is effective in OSN privacy evaluation. The prediction error is 30% lower than that of the work mentioned above
出处 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2014年第2期75-82,共8页 中国邮电高校学报(英文版)
基金 supported by the Social Network Based Cloud Service Technology for TV Content and Application(202BAH41F03)
关键词 privacy metric social network background knowledge kernel regression privacy metric, social network, background knowledge, kernel regression
  • 相关文献

参考文献21

  • 1Sweeney L. K-anonymity: a model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowlege-based Systems, 2002, 10(5): 557-570.
  • 2Machanavajjnala A, Kifer D, Gehrke J, et al. L-diversity: privacy beyond k-anonymity. Proceedings of the International Conference on Data Engineering (ICDE'06), Apr 3-7, 2006, Atlanta, GA, USA. Piscataway, NJ, USA: IEEE, 2006: 24.
  • 3Ruppert D, Wand M P. Multivariate locally weighted least squares regression. Annals of Statistics, 1994, 22(3): 1346-1370.
  • 4Narayanan A, Shmatikov V. De-anonymizing social networks. Proceedings of the IEEE 30th Symposium on Security and Privacy, May 17-20, 2009, Berkeley, CA, USA. Piscataway, NJ, USA: IEEE, 2009: 173-187.
  • 5Zhou B, Pei 1. Preserving privacy in social networks against neighborhood attacks. Proceedings of the IEEE 24th International Conference on Data Engineering (ICDE'08), Apr 7-12,2008, Cancun, Mexico. Piscataway, NJ, USA: IEEE, 2008: 506-515.
  • 6Rechert K, Wohlgemuth S, Echizen I, et al. User centric privacy in mobile communication scenarios. Proceedings of the IEEEIIPSJ II th International Symposium on Applications and the Internet (SAINT'II), JuI18-21, 2011, Munich, Germany. Piscataway, NJ, USA: IEEE, 20 II: 202-207.
  • 7Machanavajjhala A, Kifer D, Abowd J, et al. Privacy: theory meets practice on the map. Proceedings of the 24th IEEE International Conference on Data Engineering (ICDE'08), Apr 7-12, 2008, Cancun, Mexico. Piscataway, NJ, USA: IEEE, 2008: 277-286.
  • 8Li T C, Li N H, Zhang J. Modeling and integrating background knowledge in data anonymization. Proceedings of the 25th IEEE International Conference on Data Engineering (ICDE'09), Mar 29-Apr 2, 2009, Shanghai, China. Piscataway, NJ, USA: IEEE, 2009: 6-17.
  • 9Atzmueller M, Puppe F. A methodological view on knowledge-intensive subgroup discovery. Proceedings of the 15th International Conference on Managing Knowledge in a World of Networks (EKA W'06), Oct 2-6, 2006, Podebrady, Czech Republic. 2006: 318-325.
  • 10Agrawal D, Kesdogan D. Measuring anonymity: the disclosure attack. IEEE Security and Privacy, 2003, 1(6): 27-34.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部