Skip to main content

Crowdsourcing Leakage of Personally Identifiable Information via Sina Microblog

  • Conference paper
Internet of Vehicles – Technologies and Services (IOV 2014)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 8662))

Included in the following conference series:

Abstract

Since Edward Snowden’s leaks about the scale and scope of US electronic surveillance, it has become apparent that security services are just as fascinating as what they might learn from our data exhaust. At the time, cybercrime is becoming a global threat now. Cybercriminals may engage in criminal activities with personal privacy data from microblog. Identity theft is probably an example. In this paper we examine the characteristics of privacy leakage in microblog and its potential threats to the Internet community. Research found that a large number of privacy information in social network space was leaked unintentionally. Users often share too much significant personal information. Our study found that the accumulated privacy information may bring huge spam into Internet space. We examined over 20 million nodes profile information and extracted the name, location, gender, and email from these nodes profiles. After basic analysis and processing, we shown that all these personal information is enough to launch spam storm or other criminal activities. The result suggests that each node in the microblog should protect its privacy information carefully.

Supported by the National Natural Science Foundation of China under Grant No.61170209,61370132;Program for New Century Excellent Talents in University No.NCET-13-0676; Shenzhen strategic emerging industry development funds Grant No.JCYJ20120821162230172; Guangdong Natural Science Foundation Grant No. S2013040012895, Foundation for Distinguished Young Talents in Higher Education of Guangdong, China, Grant No. 2013LYM_0076, the Major Fundamental Research Project in the Science and Technology Plan of Shenzhen Grant No. JCYJ2013032910203205.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. http://www.interpol.int/Crime-areas/Cybercrime/Cybercrime

  2. http://www.dataprivacymonitor.com/information-governance-2/the-sedona-conference-hails-the-advent-of-value-based-information-governance/

  3. Johnson III, C.: Protection of Sensitive Agency Information, US Office of Management and Budget (2006), http://www.whitehouse.gov/sites/default/files/omb/assets/omb/memoranda/fy2006/m06-16.pdf

  4. Irani, D., Webb, S., Pu, C., Li, K.: Modeling Unintended Personal-Information Leakage from Multiple Online Social Networks. IEEE Internet Computing 15(3), 13–19 (2011)

    Article  Google Scholar 

  5. Debatin, B., Lovejoy, J.P., Horn, A.-K., Hughes, B.N.: Facebook and Online Privacy: Attitudes, Behaviors, and Unintended Consequences. Journal of Computer-Mediated Communication 15, 83–108 (2009)

    Article  Google Scholar 

  6. Boyd, D.: Facebook’s privacy trainwreck: Exposure, invasion, and social convergence. Convergence: The International Journal of Research into Media Technologies 14(1), 13–20 (2008)

    Google Scholar 

  7. Krishnamurthy, B., Naryshkin, K., Wills, C.: Privacy leakage vs. Protection measures: the growing disconnect. Web 2.0 Security and Privacy Workshop (May 2011), Is it really about me message content in social awareness streams

    Google Scholar 

  8. Beach, A., Gartrell, M., Han, R.: Solutions to Security and Privacy Issues in Mobile Social Networking. In: 2009 International Conference on Computational Science and Engineering, CSE, vol. 4, pp. 1036–1042 (2009)

    Google Scholar 

  9. Balduzzi, M., Platzer, C., Holz, T., Kirda, E., Balzarotti, D., Kruegel, C.: Abusing Social Networks for Automated User Profiling. In: Jha, S., Sommer, R., Kreibich, C. (eds.) RAID 2010. LNCS, vol. 6307, pp. 422–441. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  10. Parra-Arnau, J., Rebollo-Monedero, D., Forné, J.: Measuring the Privacy of User Profiles in Personalized Information Systems. (Elsevier) Future Gen. Comput. Sys. (FGCS), Special Issue Data Knowl. Eng. 33, 53–63 (2014)

    Google Scholar 

  11. http://www.ft.com/cms/s/2/21a6e7d8-b479-11e3-a09a-00144feabdc0.html#axzz2xifNsxvT

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Fu, C., Shaobin, Z., Guangjun, S., Mengyuan, G. (2014). Crowdsourcing Leakage of Personally Identifiable Information via Sina Microblog. In: Hsu, R.CH., Wang, S. (eds) Internet of Vehicles – Technologies and Services. IOV 2014. Lecture Notes in Computer Science, vol 8662. Springer, Cham. https://doi.org/10.1007/978-3-319-11167-4_26

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-11167-4_26

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-11166-7

  • Online ISBN: 978-3-319-11167-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics