We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Privacy Preserving Techniques in Social Networks Data Publishing - A Review

by Amardeep Singh, Divya Bansal, Sanjeev Sofat
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 87 - Number 15
Year of Publication: 2014
Authors: Amardeep Singh, Divya Bansal, Sanjeev Sofat
10.5120/15282-3880

Amardeep Singh, Divya Bansal, Sanjeev Sofat . Privacy Preserving Techniques in Social Networks Data Publishing - A Review. International Journal of Computer Applications. 87, 15 ( February 2014), 9-14. DOI=10.5120/15282-3880

@article{ 10.5120/15282-3880,
author = { Amardeep Singh, Divya Bansal, Sanjeev Sofat },
title = { Privacy Preserving Techniques in Social Networks Data Publishing - A Review },
journal = { International Journal of Computer Applications },
issue_date = { February 2014 },
volume = { 87 },
number = { 15 },
month = { February },
year = { 2014 },
issn = { 0975-8887 },
pages = { 9-14 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume87/number15/15282-3880/ },
doi = { 10.5120/15282-3880 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:05:59.004000+05:30
%A Amardeep Singh
%A Divya Bansal
%A Sanjeev Sofat
%T Privacy Preserving Techniques in Social Networks Data Publishing - A Review
%J International Journal of Computer Applications
%@ 0975-8887
%V 87
%N 15
%P 9-14
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Development of online social networks and publication of social network data has led to the risk of leakage of confidential information of individuals. This requires the preservation of privacy before such network data is published by service providers. Privacy in online social networks data has been of utmost concern in recent years. Hence, the research in this field is still in its early years. Several published academic studies have proposed solutions for providing privacy of tabular micro-data. But those techniques cannot be straight forwardly applied to social network data as social network is a complex graphical structure of vertices and edges. Techniques like k-anonymity, its variants, L-diversity have been applied to social network data. Integrated technique of K-anonymity & L-diversity has also been developed to secure privacy of social network data in a better way.

References
  1. Alexa 2013, The top 500 sites on the web, Available: http://www. alexa. com/topsites
  2. B. Zhou, Jian Pei, Wo-Shun Luk, "A brief survey on anonymization techniques for privacy preserving publishing of social network data," ACM SIGKDD Explorations Newsletter, Vol. 10, pp. 12?22, 2008.
  3. D. Rosenblum, "What anyone can know: The privacy risks of social networking sites," In: IEEE Security & Privacy, Vol. 5, Issue 3, pp 40?49, 2007.
  4. A. Narayanan, V. Shmatikov, "De?anonymizing social networks", In Proc of 30th IEEE Symposium on Security and Privacy, Berkeley, CA, pp 173?187, 2009.
  5. J. M. Kleinberg, "Challenges in mining social network data: processes, privacy, and paradoxes," In Proc. of 13th ACM SIGKDD International conference on Knowledge discovery and data mining, ACM New York, NY, USA, pp 4-5, 2007.
  6. L. Backstrom, Cynthia Dwork, Jon Kleinberg, "Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography," In Proc. of 16th International conference on World Wide Web, ACM, New York, NY, USA , pp 181-190, 2007.
  7. Jaideep Srivastava, Muhammad A. Ahmad, Nishith Pathak, David Kuo-Wei Hsu, "Data mining based social network analysis from online behavior," SIAM conference on Data Mining, 2008.
  8. A. F. Westin, Privacy and freedom vol. 97: London, 1967.
  9. Kun Liu, Kamalika Das, Tyrone Grandison, Hillol Kargupta, "Privacy?preserving data analysis on graphs and social networks," In: Next Generation of Data Mining, pp. 419?437, 2008.
  10. E. Zheleva, L. Getoor, "Preserving the privacy of sensitive relationships in graph data," In: Privacy, Security, and Trust in KDD, Lecture Notes in Computer Science, Vol. 4890, pp 153?171, 2008.
  11. S. Hansell, "AOL removes search data on vast group of web users," New York Times, 2006.
  12. Facebook (2013, Facebook Statistic. Available: http://www. facebook. com/press/info. php/statistics
  13. Benjamin C. M. Fung, Ke Wang, Rui Chen, Philip S. Yu, "Privacy?preserving data publishing: A survey of recent developments," In: ACM Computing Surveys (CSUR), Vol. 42, pp 1?53, 2010.
  14. P. Samarati, L. Sweeney, "Protecting privacy when disclosing information: k?anonymity and its enforcement through generalization and suppression," In: IEEE Transactions on Knowledge and Data Engineering, 2001.
  15. Ashwin Machanavajjhala, Daniel Kifer, Johannes Gehrke, "l?diversity: Privacy beyond k?anonymity," In: ACM Transactions on Knowledge Discovery from Data (TKDD), vol. 1, 2007.
  16. Ninghui Li, Tiancheng Li, Suresh Venkatasubramanian, "t?closeness: Privacy beyond k?anonymity and l?diversity," In Proc. of 23rd International Conference on Data Engineering ICDE 2007, IEEE, Istanbul, pp 106?115, 2007.
  17. Xiaoxun Sun, Hua Wang, Jiuyong Li, Traian Marius Truta, "Enhanced P?sensitive K?anonymity models for privacy preserving data publishing," In: Transactions on Data Privacy, vol. 1, pp 53?66, 2008.
  18. X. Xiao, Y. Tao, "M?invariance: towards privacy preserving re?publication of dynamic datasets," In Proc. of International conference on Management of data SIGMOD '07, ACM, New York, NY, USA, pp 689-700, 2007.
  19. Bee-Chung Chen, Kristen LeFevre, Raghu Ramakrishnan, "Privacy skyline: Privacy with multidimensional adversarial knowledge," In Proc. of 33rd International conference on Very large data bases VLDB '07, pp 770-781, 2007.
  20. L. Sweeney, "k?anonymity: A model for protecting privacy," In: International Journal of Uncertainty Fuzziness and Knowledge Based Systems, Vol. 10, pp. 557?570, 2002.
  21. Qiong Wei, Yansheng Lu, "Preservation of Privacy in Publishing Social Network Data", In Proc. of International Symposium on Electronic Commerce and Security, Guangzhou City, pp 421 - 425, 2008.
  22. L. Zou, L. Chen, M. T. Ä Ozsu, "K-automorphism: A general framework for privacy preserving network publication", In Proc. of 35th International Conference on Very Large Data Base, Vol. 2, pp 946-957, 2009.
  23. B. K. Tripathy, G. K. Panda, "A New Approach to Manage Security against Neighborhood Attacks in Social Networks", In Proc. of International Conference on Advances in Social Networks Analysis and Mining (ASONAM), Odense, pp 264 – 269, 2010.
  24. J. Cheng, AdaWai-cheeFu, Jia Liu, "K?isomorphism: privacy preserving network publication against structural attacks," In Proc. of the 2010 ACM SIGMOD International Conference on Management of data, pp. 459?470, 2010.
  25. W. Wu, Yanghua Xiao, Wei Wang, Zhenying He, Zhihui Wang "k?symmetry model for identity anonymization in social networks," In Proc. of the 13th International Cojucbybgnference on Extending Database Technology, ACM, New York, USA, pp 111-122, 2010.
  26. Lihui Lan, Hua Jin, Yang Lu, "Personalized anonymity in social networks data publication", In Proc. of IEEE International Conference on Computer Science and Automation Engineering (CSAE), Shanghai, pp 479 - 482, 2011.
  27. Maria Eleni Skarkala, Manolis Maragoudakis, Stefanos Gritzalis, Lilian Mitrou, Hannu Toivonen, Pirjo Moen, " Privacy Preservation by K-Anonymization of weighted Social Networks", ASONAM, pp 423-428. In IEEE Computer Society, 2012.
  28. K. Liu, E. Terzi, "Towards identity anonymization on graphs," In Proc. of 2008 ACM SIGMOD International conference on Management of data, Vancouver, Canada, 2008
  29. G. K. Panda, A. Mitra, Ajay Prasad, Arjun Singh, Deepak Gour, "Applying l-Diversity in anonymizing collaborative social network" In: International Journal of Computer Science and Information Security, Vol 8, Issue 2, pp 324 - 329, 2010.
  30. Na Li, Nan Zhang, Sajal K. Das, "Relationship Privacy Preservation in Publishing Online Social Networks", In Proc. of IEEE International Conference on Privacy, Security, Risk, and Trust, Boston, MA, pp 443-450, 2011.
  31. Sanaz Kavianpour, Zuraini Ismail, and Amirhossein Mohtaseb, "Preserving Identity Of Users In Social Network Sites By Integrating Anonymization And Diversification Algorithms", In: International Journal of Digital Information and Wireless Communications (IJDIWC), Hongkong, Vol. 1, Issue 1, pp 32-40, 2011.
  32. B. K. Tripathy, Anirban Mitra, "An Algorithm to achieve k-anonymity and l-diversity anonymisation in Social Networks", In Proc. of Fourth International Conference on Computational Aspects of Social Networks (CASoN), Sao Carlos, pp 126 – 131, 2012.
  33. Mingxuan Yuan, Lei Chen, Philip S. Yu, Ting Yu, "Protecting Sensitive Labels in Social Network Data Anonymization", In: IEEE Transactions On Knowledge And Data Engineering, Vol. 25, No. 3, pp 633-647, 2013.
  34. B. Zhou, Jian Pei, Wo-Shun Luk, "A brief survey on anonymization techniques for privacy preserving publishing of social network data," ACM SIGKDD Explorations Newsletter, Vol. 10, pp. 12?22, 2008.
  35. Saikat Guha, Kevin Tang, Paul Francis, "NOYB: Privacy in Online Social Networks", in Proc. of first workshop on Online social networks WOSN'08, ACM New York, NY, USA, pp 49-54, 2008.
  36. Gary Blosser, Justin Zhan, "Privacy Preserving Collaborative Social Network", In Proc. of International Conference on Information Security and Assurance ISA 2008, Busan, pp, 543 - 548, 2008.
  37. Alina Campan, Traian Marius Truta, Nicholas Cooper, "P-Sensitive K-Anonymity with Generalization Constraints", In: Transactions on Data Privacy archive, Vol. 3 Issue 2, pp 65-89, 2010.
  38. Elena Zheleva, Lise Getoor, "Privacy in Social Networks: A Survey", In: Social Network Data Analytics, Springer US, pp 277-306, 2011.
  39. Roy Ford, Traian Marius Truta, and Alina Campan, "P-Sensitive K-Anonymity for Social Networks".
  40. A. Narayanan, V. Shmatikov, "De?anonymizing social networks", In Proc of 30th IEEE Symposium on Security and Privacy, Berkeley, CA, pp 173?187, 2009.
  41. Z. Lijie and Z. Weining, "Edge Anonymity in Social Network Graphs," in Proc. of International Conference on Computational Science and Engineering CSE '09, pp 1?8, 2009.
  42. X. Ying and X. Wu, "On link privacy in randomizing social networks," In: Advances in Knowledge Discovery and Data Mining, pp. 28?39, 2009.
  43. Amin Tootoonchian, Stefan Saroiu, Yashar Ganjali, Alec Wolman, "Lockr: Better Privacy for Social Networks", in Proc. of the 5th ACM International Conference on Emerging Networking Experiments and Technologies (CoNEXT), 2009.
  44. Philip W. L. Fong, Mohd Anwar, and Zhen Zhao, "A Privacy Preservation Model for Facebook-Style Social Network Systems", In: Computer Security - ESORICS 2009, Lecture Notes in Computer Science, Vol. 5789, 2009, pp 303-320, 2009.
  45. X. Tang and C. C. Yang, "Generalizing Terrorist Social Networks with K-Nearest Neighbor and Edge Betweenness for Social Network Integration and Privacy Preservation," In Proc. of IEEE International Conference on Intelligence and Security Informatics, 2010.
  46. Lihui Lan, Shiguang Ju Hua Jin, "Anonymizing Social Network using Bipartite Graph", In Proc. of International Conference on Computational and Information Sciences (ICCIS), Chengdu, pp 993 - 996, 2010.
  47. Xuan Ding, Lan Zhang, Zhiguo Wan, and Ming Gu, "A Brief Survey on De-anonymization Attacks in Online Social Networks", In Proc. of International Conference on Computational Aspects of Social Networks, Taiyuan, pp 611 - 615, 2010.
  48. Jinyuan Sun, Xiaoyan Zhu, and Yuguang Fang, "A Privacy-Preserving Scheme for Online Social Networks with Efficient Revocation", In Proc. of INFOCOM, IEEE, San Diego, CA, pp 1-9, 2010.
  49. Aaron Beach, Mike Gartrell, Richard Han, "q-Anon: Rethinking Anonymity for Social Networks", In Proc. of IEEE Second International Conference on Social Computing (SocialCom), Minneapolis, MN, pp 185 – 192, 2010.
  50. Yan Zhu, Zexing Hu, Huaixi Wang, Hongxin Hu, Gail-Joon Ahn, "A Collaborative Framework: for Privacy Protection in Online Social Networks", In Proc. of 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), Chicago, IL, pp 1 – 10, 2010.
  51. Xintao Wu, Xiaowei Ying, Kun Liu, ,Lei Chen, "A Survey of Privacy-Preservation of Graphs and Social Networks", In : Managing and Mining Graph Data, Advances in Database Systems, Vol. 40, pp 421-453, 2010.
  52. Christopher C. Yang , "Preserving privacy in social network integration with ?-tolerance", In Proc. of IEEE International Conference on Intelligence and Security Informatics (ISI), Beijing, pp 198 – 200, 2011 .
  53. Elena Zheleva, Lise Getoor, "Privacy in Social Networks: A Survey", In: Social Network Data Analytics, Springer US, pp 277-306, 2011.
  54. Michael Fire, Dima Kagan, Aviad Elishar, and Yuval Elovici, "Social Privacy Protector - Protecting Users' Privacy in Social Networks,",In Proc. of the Second International Conference on Social Eco-Informatics (SOTICS), Venice, Italy, 2012.
  55. Amirreza Masoumzadeh, James Joshi, "Preserving Structural Properties in Edge-Perturbing Anonymization Techniques for Social Networks", In: IEEE Transactions On Dependable And Secure Computing, Vol. 9, No. 6, pp 877-889, 2012.
  56. Tamir Tassa, Dror J. Cohen, "Anonymization of Centralized and Distributed Social Networks by Sequential Clustering", In: IEEE Transactions On Knowledge And Data Engineering, Vol. 25, No. 2, pp 311- 324, 2013.
  57. Raymond Heatherly, Murat Kantarcioglu, and Bhavani Thuraisingham, "Preventing Private Information Inference Attacks on Social Networks", In: IEEE Transactions On Knowledge And Data Engineering, Vol. 25, No. 8, pp 1849-1862, 2013.
  58. Yuan Cheng, Ravi Sandhu, "Preserving User Privacy from Third-party Applications in Online Social Networks, In Proc. of 22nd international conference on World Wide Web companion, Geneva, Switzerland, pp 723-728, 2013.
  59. Y. Lindell and B. Pinkas, "Privacy preserving data mining" In: Advances in Cryptology CRYPTO'00, Springer-Verlag, pp 36-53, 2000.
Index Terms

Computer Science
Information Sciences

Keywords

Privacy models K-anonymity L-diversity t-closeness.