Critical parameters for privacy preservation through anonymisation in social networks

Author(s):  
Preeti Gupta ◽  
Sanur Sharma ◽  
Vishal Bhatnagar
2020 ◽  
Vol 2020 ◽  
pp. 1-14 ◽  
Author(s):  
Randa Aljably ◽  
Yuan Tian ◽  
Mznah Al-Rodhaan

Nowadays, user’s privacy is a critical matter in multimedia social networks. However, traditional machine learning anomaly detection techniques that rely on user’s log files and behavioral patterns are not sufficient to preserve it. Hence, the social network security should have multiple security measures to take into account additional information to protect user’s data. More precisely, access control models could complement machine learning algorithms in the process of privacy preservation. The models could use further information derived from the user’s profiles to detect anomalous users. In this paper, we implement a privacy preservation algorithm that incorporates supervised and unsupervised machine learning anomaly detection techniques with access control models. Due to the rich and fine-grained policies, our control model continuously updates the list of attributes used to classify users. It has been successfully tested on real datasets, with over 95% accuracy using Bayesian classifier, and 95.53% on receiver operating characteristic curve using deep neural networks and long short-term memory recurrent neural network classifiers. Experimental results show that this approach outperforms other detection techniques such as support vector machine, isolation forest, principal component analysis, and Kolmogorov–Smirnov test.


2012 ◽  
Vol 61 (7) ◽  
pp. 3209-3222 ◽  
Author(s):  
Xiaohui Liang ◽  
Xu Li ◽  
Tom H. Luan ◽  
Rongxing Lu ◽  
Xiaodong Lin ◽  
...  

2008 ◽  
Vol 22 (25n26) ◽  
pp. 4482-4494 ◽  
Author(s):  
F. V. KUSMARTSEV ◽  
KARL E. KÜRTEN

We propose a new theory of the human mind. The formation of human mind is considered as a collective process of the mutual interaction of people via exchange of opinions and formation of collective decisions. We investigate the associated dynamical processes of the decision making when people are put in different conditions including risk situations in natural catastrophes when the decision must be made very fast or at national elections. We also investigate conditions at which the fast formation of opinion is arising as a result of open discussions or public vote. Under a risk condition the system is very close to chaos and therefore the opinion formation is related to the order disorder transition. We study dramatic changes which may happen with societies which in physical terms may be considered as phase transitions from ordered to chaotic behavior. Our results are applicable to changes which are arising in various social networks as well as in opinion formation arising as a result of open discussions. One focus of this study is the determination of critical parameters, which influence a formation of stable mind, public opinion and where the society is placed “at the edge of chaos”. We show that social networks have both, the necessary stability and the potential for evolutionary improvements or self-destruction. We also show that the time needed for a discussion to take a proper decision depends crucially on the nature of the interactions between the entities as well as on the topology of the social networks.


Author(s):  
Ramanpreet Kaur ◽  
Tomaž Klobučar ◽  
Dušan Gabrijelčič

This chapter is concerned with the identification of the privacy threats to provide a feedback to the users so that they can make an informed decision based on their desired level of privacy. To achieve this goal, Solove's taxonomy of privacy violations is refined to incorporate the modern challenges to the privacy posed by the evolution of social networks. This work emphasizes on the fact that the privacy protection should be a joint effort of social network owners and users, and provides a classification of mitigation strategies according to the party responsible for taking these countermeasures. In addition, it highlights the key research issues to guide the research in the field of privacy preservation. This chapter can serve as a first step to comprehend the privacy requirements of online users and educate the users about their choices and actions in social media.


2019 ◽  
Vol 481 ◽  
pp. 616-634 ◽  
Author(s):  
Gang Sun ◽  
Liangjun Song ◽  
Dan Liao ◽  
Hongfang Yu ◽  
Victor Chang

10.29007/st23 ◽  
2018 ◽  
Author(s):  
Jaweher Zouari ◽  
Mohamed Hamdi ◽  
Tai-Hoon Kim

Interacting with geographically proximate users who present similar interests and preferences is a key service offered by mobile social networks which leads to the creation of new connections that combine physical and social closeness. Usually these interactions are based on social profile matching where users publish their preferences and attributes to enable the search for a similar profile. Such public search would result in the leakage of sensitive or identifiable information to strangers who are not always potential friends. As a consequence this promising feature of mobile social networking may cause serious privacy breaches if not addressed properly. Most existent work relies on homomorphic encryption for privacy preservation during profile matching, while we propose in this paper a novel approach based on the fuzzy extractor which performs private matching of two sets and reveals them only if they overlap considerably. Our scheme achieves a desirable trade off between security and complexity.


Sign in / Sign up

Export Citation Format

Share Document