Skip to main content

Predicting User Visibility in Online Social Networks Using Local Connectivity Properties

  • Conference paper
Distributed Computing and Internet Technology (ICDCIT 2015)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 8956))

Abstract

Recent developments in Online Social Network (OSN) technologies and services, added with availability of wide range of applications has paved the way towards popularity of several social network platforms. These OSNs have evolved as a major communication and interaction platform for millions of users worldwide. The users interact with their social contacts by using various types of available services like messaging, sharing pictures /videos, and many more. However, a major drawback of these platforms is that these activities might reveal certain private information about the users unintentionally. Whenever a user shares any information on OSN with his friends, the information is prone to leakage to other users. The probability of leakage increases with the visibility of the user himself (i.e. the number of users who would be interested on the information of the user) as well as the visibility of his/her friends. Therefore, it is important to measure the visibility of a user in the OSN community. This paper proposes a measure for the visibility of a user, by considering the connectivity properties of the users present in the network. The characteristics of the proposed measure is studied on a real Twitter network as well as a generated Erdős-Rényi network, where we observe the relation between visibility and certain topological parameters of the network. The results show that visibility of a user is determined by his/her direct social contacts, i.e. the number of followers in case of Twitter. However, evaluating the visibility of an user is practically difficult considering the immensely large size of the OSN’s. These findings help us to generate simple mechanisms to estimate the visibility of a user using only its local connectivity properties.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Baker, F.B., Kim, S.H.: Item Response Theory: Parameter Estimation Techniques. CRC Press, Marcel Dekker (2004)

    Google Scholar 

  2. Becker, J., Chen, H.: Measuring privacy risk in online social networks. In: Proceedings of W2SP 2009: Web 2.0 Security and Privacy, Oakland, CA, USA (May 2009)

    Google Scholar 

  3. Statistics Brain. Statistics brain, facebook statistics (June 2013)

    Google Scholar 

  4. Statistics Brain. Statistics brain, twitter statistics (June 2013)

    Google Scholar 

  5. Pew Research Center. Global publics embrace social networking, pew research center (2010)

    Google Scholar 

  6. Chaabane, A., Acs, G., Kaafar, M.A.: You are what you like! information leakage through user’s interests. In: NDSS (2012)

    Google Scholar 

  7. Cutillo, L.A., Molva, R., Strufe, T.: Safebook: A privacy-preserving online social network leveraging on real-life trust. IEEE Communications Magazine 47(12), 94–101 (2009)

    Article  Google Scholar 

  8. Erdös, P., Rényi, A.: On random graphs, i. Publicationes Mathematicae (Debrecen) 6, 290–297 (1959)

    MATH  MathSciNet  Google Scholar 

  9. Gundecha, P., Barbier, G., Liu, H.: Exploiting vulnerability to secure user privacy on a social networking site. In: Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2011, pp. 511–519. ACM, New York (2011)

    Google Scholar 

  10. Lumsdaine, A., Siek, J., Lee, L.Q.: Boost graph library (2000)

    Google Scholar 

  11. Kempe, D., Kleinberg, J., Tardos, É.: Maximizing the spread of influence through a social network. In: Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2003, pp. 137–146. ACM, New York (2003)

    Google Scholar 

  12. Krishnamurthy, B.: Privacy and online social networks: can colorless green ideas sleep furiously? IEEE Security Privacy 11(3), 14–20 (2013)

    Article  MathSciNet  Google Scholar 

  13. Leskovec, J., Krevl, A.: SNAP Datasets: Stanford large network dataset collection (June 2014), http://snap.stanford.edu/data

  14. Liu, K., Terzi, E.: A framework for computing the privacy scores of users in online social networks. ACM Trans. Knowl. Discov. Data 5(1), 6:1–6:30 (2010)

    Google Scholar 

  15. Mislove, A., Viswanath, B., Gummadi, K.P., Druschel, P.: You are who you know: Inferring user profiles in online social networks. In: Proceedings of the Third ACM International Conference on Web Search and Data Mining, WSDM 2010, pp. 251–260. ACM, New York (2010)

    Google Scholar 

  16. Newman, M.E.J.: Mixing patterns in networks. Phys. Rev. E 67, 026126 (2003)

    Google Scholar 

  17. Internet World Stats. Internet world stats, usage and population statistics (January 2014)

    Google Scholar 

  18. Talukder, N., Ouzzani, M., Elmagarmid, A.K., Elmeleegy, H., Yakout, M.: Privometer: Privacy protection in social networks. In: 2010 IEEE 26th International Conference on Data Engineering Workshops (ICDEW), pp. 266–269 (March 2010)

    Google Scholar 

  19. Yu, H., Kaminsky, M., Gibbons, P.B., Flaxman, A.: Sybilguard: Defending against sybil attacks via social networks. SIGCOMM Comput. Commun. Rev. 36(4), 267–278 (2006)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Rathore, N.C., Tripathy, S., Chandra, J. (2015). Predicting User Visibility in Online Social Networks Using Local Connectivity Properties. In: Natarajan, R., Barua, G., Patra, M.R. (eds) Distributed Computing and Internet Technology. ICDCIT 2015. Lecture Notes in Computer Science, vol 8956. Springer, Cham. https://doi.org/10.1007/978-3-319-14977-6_46

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-14977-6_46

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-14976-9

  • Online ISBN: 978-3-319-14977-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics