5 Citations (Scopus)

Abstract

Sensitive information of an Online Social Network (OSN) user can be discovered through sophisticated data mining, even if the user does not directly reveal such information. Malicious data miners can build a decision tree/forest from a data set having information about a huge number of OSN users and thereby learn general patterns which they can then use to discover the sensitive information of a target user who has not revealed the sensitive information directly. An existing technique called 3LP suggests users shall suppress some information (such as hometown), add and/or shall delete some friendship links to protect their sensitive information (such as political view). In a previous study, 3LP was applied to a training data set to discover the general pattern. It was then applied on a testing data set to protect sensitive information of the users in the testing data set. Once the testing data set was modified following the suggestions made by 3LP the previous study then cross-checked the users’ privacy level by using the same general pattern previously discovered from the training data set. However, in this paper, we argue that the general pattern of the training data set will be changed due to the modifications made in the testing data set and hence, the new general pattern should be used to test the privacy level of the users in the testing data set. Therefore, in this study, we use a different attack model where the training data set is different after the initial use of 3LP and an attacker can use any classifiers in addition to decision forests. We also argue that the data utility should be measured along with the privacy level to evaluate the effectiveness of a privacy technique. We also experimentally compare 3LP with another existing method.
Original languageEnglish
Title of host publicationProceedings of the 2017 12th international conference on intelligent systems and knowledge engineering (ISKE)
Subtitle of host publicationIEEE ISKE 2017
EditorsTianrui Li, Luis Martínez López, Yun Li
Place of PublicationUnited States
PublisherIEEE, Institute of Electrical and Electronics Engineers
Pages1-8
Number of pages8
ISBN (Electronic)9781538618295
ISBN (Print)9781538618301 (Print on demand)
DOIs
Publication statusPublished - 15 Jan 2018
Event12th International Conference on Intelligent Systems and Knowledge Engineering : ISKE 2017 - Nanjing University of Posts and Telecommunications (NUPT), Nanjing Jiangsu, China
Duration: 24 Nov 201726 Nov 2017
https://web.archive.org/web/20180222034524/http://iske2017.njupt.edu.cn/index (Conference website)
https://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=8246022 (Conference proceedings)

Conference

Conference12th International Conference on Intelligent Systems and Knowledge Engineering
Country/TerritoryChina
CityNanjing Jiangsu
Period24/11/1726/11/17
OtherThe 2017 International Conference on Intelligent Systems and Knowledge Engineering (ISKE 2017) is the 12th in a series of ISKE conferences. ISKE 2017 follows the successful ISKE 2006 in Shanghai (China), ISKE 2007 in Chengdu (China), ISKE 2008 in Xiamen (China), ISKE 2009 in Hasselt (Belgium), ISKE 2010 in Hangzhou (China), ISKE 2011 in Shanghai (China), ISKE 2012 in Beijing (China), ISKE 2013 in Shenzhen (China), ISKE 2014 in Joao Pessoa, (Brazil), ISKE 2015 in Taibei, Taiwan (China), ISKE2016 in Roubaix (France). ISKE 2017 will take place in Nanjing (China). ISKE 2017 emphasizes current practice, experience and promising new ideas in the broad area of intelligent systems and knowledge engineering.
Internet address

Fingerprint

Dive into the research topics of 'Social media users' privacy against malicious data miners'. Together they form a unique fingerprint.

Cite this