Preventing Identity Disclosure in Social Networks Using Intersected Node

Preventing Identity Disclosure in Social Networks Using Intersected Node

Amardeep Singh, Divya Bansal, Sanjeev Sofat
Copyright: © 2016 |Pages: 17
DOI: 10.4018/IJISP.2016070103
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Social networks like Facebook, Twitter, Pinterest etc. provide data of its users to the demanding organizations to better comprehend the quality of their potential clients. Publishing confidential data of social network users in its raw form raises several privacy and security concerns. Recently, some anonymization techniques have been developed to address these issues. In this paper, a technique to prevent identity disclosure through structure attacks has been proposed which not only prevents identity disclosure but also preserves utility of data published by online social networks. Algorithms have been developed by using noise nodes/edges with the consideration of introducing minimum change in the original graphical structure of social networks. The authors' work is unique in the sense that previous works are based on edge editing only but their proposed work protects against structure attacks using mutual nodes in the social network and the effectiveness of the proposed technique has been proved using APL (Average Path Length) and information loss as parameters.
Article Preview
Top

Introduction

A social network is a community consisting of a number of entities like individuals or organizations and ties among these entities (Backstrom et al., 2007). The growth of social networking sites such as Facebook, Twitter, MySpace etc. leads to an exponential increase in the number of registered users on these sites (Statistics of Social Media Sites by Digital Media Ramblings, 2015). In various situations social network providers publish the acquired user’s information to different customers like researchers, community behavior analysts, advertisers etc. (Rosenblum, 2007). However, it is very important that published social networks data should not disclose the sensitive information of users.

In tabular micro data, an individual can be identified using quasi identifiers which in turn can disclose their sensitive information (Samarati & Sweeney, 2001). In one of the attack scenarios individuals can be identified by relating the published tabular data with some external data sources which are publically available (Samarati & Sweeney, 2001). Similar is the case with social networks data.

A social network is a graph consisting of nodes as vertices and edges as labels of relationship between them. When data of social network users is published then the entire graphical structure which contains sensitive information of users is also published. Privacy can be breached via a social network graph if the involved vertices or edges leak private information (Liu & Terzi, 2008). Lot of work has been done in preserving privacy of micro data (Samarati & Sweeney, 2001; Machanavajjhala et. al, 2007; Ninghui et. al, 2007; Sun et. al, 2008; Xiao & Tao, 2007; Chung et. al, 2007). Recently, a number of distinct models and anonymization algorithms have been developed to preserve the privacy of social network data (Blosser & Zhan, 2008; Wei & Lu, 2008; Campan & Truta, 2008; Zou et. al, 2009; Panda et. al, 2010). Attackers can use structure information like degree of nodes, subgraphs to identify the nodes in the network. To prevent node identification through structure attacks, graph should be K-anonymized (Samarati & Sweeney, 2001).

Complete Article List

Search this Journal:
Reset
Volume 18: 1 Issue (2024)
Volume 17: 1 Issue (2023)
Volume 16: 4 Issues (2022): 2 Released, 2 Forthcoming
Volume 15: 4 Issues (2021)
Volume 14: 4 Issues (2020)
Volume 13: 4 Issues (2019)
Volume 12: 4 Issues (2018)
Volume 11: 4 Issues (2017)
Volume 10: 4 Issues (2016)
Volume 9: 4 Issues (2015)
Volume 8: 4 Issues (2014)
Volume 7: 4 Issues (2013)
Volume 6: 4 Issues (2012)
Volume 5: 4 Issues (2011)
Volume 4: 4 Issues (2010)
Volume 3: 4 Issues (2009)
Volume 2: 4 Issues (2008)
Volume 1: 4 Issues (2007)
View Complete Journal Contents Listing