[go: up one dir, main page]

Skip to main content

Priv-S: Privacy-Sensitive Data Identification in Online Social Networks

  • Conference paper
  • First Online:
Web Information Systems Engineering – WISE 2023 (WISE 2023)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 14306))

Included in the following conference series:

  • 1433 Accesses

Abstract

Privacy inference imposes a serious threat to user privacy in Online Social Networks (OSNs) as the vast amount of personal data and relationships in OSNs can be used not only to infer user privacy but also to enrich the training set of inference methods. Previous studies have mostly focused on privacy inference from the perspective of the adversary with the objective of tracking the accuracy of the inference results. However, countering privacy inference requires not only the analysis of the inference method but also the roles that data would play in the inference process, i.e., to determine the sensitivity of the data. To address this issue, in this paper, we propose a model for the identification of privacy-sensitive data in which we formulate the identification as an influence maximization problem to identify both the privacy-sensitive users and the privacy-sensitive attributes for privacy inference. In our model, a privacy-affected tree is first constructed based on the influence between users with respect to the concerned privacy. Then, privacy-sensitive users in the privacy-affected tree are identified along with their privacy-sensitive attributes based on their contribution to the inference result of the concerned privacy. Experiments show that the results of our proposed model can significantly affect the accuracy of privacy inference, which demonstrates that our model can identify the privacy-sensitive data. Meanwhile, the impact of privacy-sensitive users and privacy-sensitive attributes is analyzed to guide the design of effective privacy-enhancing technologies.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 99.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 129.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Sun, Q., Xu, Y.: Research on privacy concerns of social network users. In: 2019 IEEE 5th International Conference on Computer and Communications (ICCC), pp. 1453–1460 (2019)

    Google Scholar 

  2. Wang, Z., Zhu, H., Sun, L.: Social engineering in cybersecurity: effect mechanisms, human vulnerabilities and attack methods. IEEE Access 9, 11895–11910 (2021)

    Article  Google Scholar 

  3. Al-Dablan, D., Al-Hamad, A., Al-Bahlal, R., Badawi, M.A.: An analysis of various social engineering attack in social network using machine learning algorithm. Int. J. Distrib. Sens. Networks. 46 (2020)

    Google Scholar 

  4. Piao, Y., Ye, K., Cui, X.: Privacy inference attack against users in online social networks: a literature review. IEEE Access 9, 40417–40431 (2021)

    Google Scholar 

  5. Jia, J., Wang, B., Zhang, L., Gong, N.Z.: AttriInfer: inferring user attributes in online social networks using Markov random fields (2017)

    Google Scholar 

  6. Gong, N.Z., Liu, B.: Attribute inference attacks in online social networks. ACM Trans. Priv. Secur. 21, 3 (2018)

    Google Scholar 

  7. Mao, J., Tian, W., Yang, Y., Liu, J.: An efficient social attribute inference scheme based on social links and attribute relevance. IEEE Access 7, 153074–153085 (2019)

    Article  Google Scholar 

  8. Tian, Y., Niu, Y., Yan, J., Tian, F.: Inferring private attributes based on graph convolutional neural network in social networks. In: Proceedings of the 2019 International Conference on Networking and Network Applications. NaNA 2019, pp. 186–190 (2019)

    Google Scholar 

  9. Wu, Y., Lian, D., Jin, S., Chen, E.: Graph convolutional networks on user mobility heterogeneous graphs for social relationship inference. In: IJCAI International Joint Conference on Artificial Intelligence, 2019-August, pp. 3898–3904 (2019)

    Google Scholar 

  10. Luo, X., Xie, M., Zhang, K., Zhou, F., Zhong, T.: DeepAttr: inferring demographic attributes via social network embedding. IEEE Access 7, 130270–130282 (2019)

    Article  Google Scholar 

  11. Sutton, C., McCallum, A.: An introduction to conditional random fields. Found. Trends Mach. Learn. 4, 267–373 (2011)

    Article  MATH  Google Scholar 

  12. Heatherly, R., Kantarcioglu, M., Thuraisingham, B.: Preventing private information inference attacks on social networks. IEEE Trans. Knowl. Data Eng. 25, 1849–1862 (2013)

    Article  Google Scholar 

  13. Qian, J., Li, X.Y., Zhang, C., Chen, L., Jung, T., Han, J.: Social network de-anonymization and privacy inference with knowledge graph model. IEEE Trans. Dependable Secur. Comput. 16, 679–692 (2019)

    Article  Google Scholar 

  14. Liu, Y., Li, N.: Retrieving hidden friends: a collusion privacy attack against online friend search engine. IEEE Trans. Inf. Forensics Secur. 14, 833–847 (2019)

    Article  Google Scholar 

  15. Borgs, C., Brautbar, M., Chayes, J., Lucier, B.: Maximizing social influence in nearly optimal time. Soc. Ind. Appl. Math. (2014)

    Google Scholar 

  16. Wang, X., Zhang, Y., Zhang, W., Lin, X., Chen, C.: Bring order into the samples: a novel scalable method for influence maximization. IEEE Trans. Knowl. Data Eng. 29, 243–256 (2017)

    Article  Google Scholar 

  17. Song, C., Hsu, W., Lee, M.L.: Targeted influence maximization in social networks. In: Proceedings of the 25th ACM International on Conference on Information and Knowledge Management, pp. 1683–1692 (2016)

    Google Scholar 

  18. McPherson, M., Smith-Lovin, L., Cook, J.M.: Birds of a feather: homophily in social networks. Annu. Rev. Sociol. 27, 415–444 (2001)

    Article  Google Scholar 

  19. Mcauley, J.: Learning to discover social circles in ego networks. In: NIPS2012, pp. 1–9 (2012)

    Google Scholar 

  20. Tang, J., Tang, X., Xiao, X., Yuan, J.: Online processing algorithms for influence maximization. In: Proceedings of the ACM SIGMOD International Conference on Management Data, pp. 991–1005 (2018)

    Google Scholar 

  21. Tang, J., Tang, X., Yuan, J.: Profit maximization for viral marketing in online social networks: algorithms and analysis. IEEE Trans. Knowl. Data Eng. 30(6), 1095–1108 (2017)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jingsha He .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Yi, Y., Zhu, N., He, J., Ma, X., Luo, Y. (2023). Priv-S: Privacy-Sensitive Data Identification in Online Social Networks. In: Zhang, F., Wang, H., Barhamgi, M., Chen, L., Zhou, R. (eds) Web Information Systems Engineering – WISE 2023. WISE 2023. Lecture Notes in Computer Science, vol 14306. Springer, Singapore. https://doi.org/10.1007/978-981-99-7254-8_17

Download citation

  • DOI: https://doi.org/10.1007/978-981-99-7254-8_17

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-99-7253-1

  • Online ISBN: 978-981-99-7254-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics