Social media users' privacy against malicious data miners

No Thumbnail Available
File version
Author(s)
Reza, Khondker Jahid
Islam, Md Zahidul
Estivill-Castro, Vladimir
Griffith University Author(s)
Primary Supervisor
Other Supervisors
Editor(s)
Li, T
Lopez, LM
Li, Y
Date
2017
Size
File type(s)
Location
NanJing, PEOPLES R CHINA
License
Abstract

Sensitive information of an Online Social Network (OSN) user can be discovered through sophisticated data mining, even if the user does not directly reveal such information. Malicious data miners can build a decision tree/forest from a data set having information about a huge number of OSN users and thereby learn general patterns which they can then use to discover the sensitive information of a target user who has not revealed the sensitive information directly. An existing technique called 3LP suggests users shall suppress some information (such as hometown), add and/or shall delete some friendship links to protect their sensitive information (such as political view). In a previous study, 3LP was applied to a training data set to discover the general pattern. It was then applied on a testing data set to protect sensitive information of the users in the testing data set. Once the testing data set was modified following the suggestions made by 3LP the previous study then cross-checked the users' privacy level by using the same general pattern previously discovered from the training data set. However, in this paper, we argue that the general pattern of the training data set will be changed due to the modifications made in the testing data set and hence, the new general pattern should be used to test the privacy level of the users in the testing data set. Therefore, in this study, we use a different attack model where the training data set is different after the initial use of 3LP and an attacker can use any classifiers in addition to decision forests. We also argue that the data utility should be measured along with the privacy level to evaluate the effectiveness of a privacy technique. We also experimentally compare 3LP with another existing method.

Journal Title
Conference Title
2017 12TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND KNOWLEDGE ENGINEERING (IEEE ISKE)
Book Title
Edition
Volume
2018-January
Issue
Thesis Type
Degree Program
School
Publisher link
Patent number
Funder(s)
Grant identifier(s)
Rights Statement
Rights Statement
Item Access Status
Note
Access the data
Related item(s)
Subject
Pattern recognition
Data mining and knowledge discovery
Persistent link to this record
Citation