Can on-line social network users trust that what they designated as confidential data remains so?
File version
Version of Record (VoR)
Author(s)
Nettleton, David F
Griffith University Author(s)
Primary Supervisor
Other Supervisors
Editor(s)
Zheng Yan, Peter Mueller
Date
Size
File type(s)
Location
Aalto Univ, Helsinki, FINLAND
License
Abstract
Internet users in general and on-line social net- works users in particular are becoming more savvy about masking data they consider private. However, some of this masked data may be inferable from other data the user has not masked. Furthermore, even if a user masks all its data, it may still be inferable from the unmasked data of its friends, due to affinities in likes and personal attributes. In contrast to the conventional data mining approach, in which a model is built for all users, we build a rule set which is individualized for each user. In this paper we propose a novel rule induction approach (that incorporates predictive metrics) which enable a user to evaluate the potential risk incurred by unmasked attributes, friends' attributes and also the risk of befriending new users. We find that all of these risks are quantifiable and a risk ranking of attributes and friends/potential friends can be individualized for each user. We give examples and use cases and confirm the effectiveness of the approach, using a sophisticated synthetic OSN-data to define risk attribute and user combinations which coincide with the risk ranking produced by our algorithm.
Journal Title
Conference Title
2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1
Book Title
Edition
Volume
1
Issue
Thesis Type
Degree Program
School
Publisher link
Patent number
Funder(s)
Grant identifier(s)
Rights Statement
Rights Statement
© 2015 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
Item Access Status
Note
Access the data
Related item(s)
Subject
Pattern Recognition and Data Mining