Skip to main content

Assessing the Disclosure of User Profile in Mobile-Aware Services

  • Conference paper
  • First Online:
Book cover Information Security and Cryptology (Inscrypt 2015)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 9589))

Included in the following conference series:

  • 785 Accesses

Abstract

Mobile-aware services can be regarded as data-sharing systems in nature. In these systems, users obtain personalized service at the cost of sharing their personal information. As a result, it will inevitably lead to the disclosure of users’ profiles and raise the serious privacy concerns. To assessing the privacy risk of sharing the user profile information items, in this paper we score and measure the potential risk of users caused by sharing information for the sake of personalization services. By adopted the 3-parameter logistic model, we explore information item’s sensitivity, influence and probability of proper setting as well as users’ potential attitudes to measure the privacy disclosure risk. The MMLE/EM algorithm is then adopted to estimate the above parameters. Finally, experiments on synthetic and real-world data sets are conducted and the results show that the obtained scores of our approach fit well with the real-world data.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    a leading real-name social networking internet platform in China.

  2. 2.

    a social network for dating.

References

  1. Fredrikson, M., Lantz, E., Jha, S., Madison, W., Lin, S., Clinic, M., Page, D., Ristenpart, T.: Privacy in pharmacogenetics: an end-to-end case study of personalized warfarin dosing (2014)

    Google Scholar 

  2. Lindamood, J., Heatherly, R., Kantarcioglu, M., et al.: Inferring private information using social network data. In: Proceedings of the 18th International Conference on World Wide Web, pp. 1145–1146. ACM (2009)

    Google Scholar 

  3. Zheleva, E., Getoor, L.: To join or not to join: the illusion of privacy in social networks with mixed public and private user profiles. In: Proceedings of the 18th International Conference on World Wide Web, pp. 531–540. ACM (2009)

    Google Scholar 

  4. Methodology for Privacy Risk Management: How to Implement the Data Protection Act[R/OL], 09 May 2012. http://www.piawatch.eu/node/1539

  5. Office of the Privacy Commissioner. Privacy impact assessment guide. Australian Government[R/OL], 16 July 2008. http://www.privacy.org.nz/news-and-publications/guidance-notes/privacy-impact-assesssment-handbook

  6. Clifton, C., Kantarcioglu, M., Vaidya, J., et al.: Tools for privacy preserving distributed data mining. ACM SIGKDD Explor. Newsl. 4(2), 28–34 (2002)

    Article  Google Scholar 

  7. Liu, K., Terzi, E.: A framework for computing the privacy scores of users in online social networks. ACM Trans. Knowl. Discovery Data (TKDD) 5(1), 6 (2010)

    Google Scholar 

  8. Mislove, A., Viswanath, B., Gummadi, K.P., et al.: You are who you know: inferring user profiles in online social networks. In: Proceedings of the Third ACM International Conference on Web Search and Data Mining, pp. 251–260. ACM (2010)

    Google Scholar 

  9. Ryu, E., Rong, Y., Li, J., et al.: Curso: protect yourself from curse of attribute inference: a social network privacy-analyzer. In: Proceedings of the ACM SIGMOD Workshop on Databases and Social Networks, pp. 13–18. ACM (2013)

    Google Scholar 

  10. Ypma, T.J.: Historical development of the Newton-Raphson method. SIAM Rev. 37(4), 531–551 (1995)

    Article  MathSciNet  MATH  Google Scholar 

  11. Su, H.: Parallel trust-region logistic regression over large scale mobile data. J. Comput. Res. Dev. 414–419 (2010) (in Chinese)

    Google Scholar 

  12. Fisher, R.A.: On the mathematical foundations of theoretical statistics. Philos. Trans. Roy. Soc. Lond. Series A Containing Pap. Math. Phys. Charact. 222, 309–368 (1922)

    Google Scholar 

  13. http://www.umass.edu/remp/software/simcata/wingen/downloadsF.html

  14. Woodruff, D.J., Hanson, B.A.: Estimation of item response models using the EM algorithm for finite mixtures (1996)

    Google Scholar 

  15. Zhu, Y., Xiong, L., Verdery, C.: Anonymizing user profiles for personalized web search. In: Proceedings of 19th International Conference on World Wide Web (WWW), pp. 1125–1126 (2010)

    Google Scholar 

  16. http://weibo.com/p/1001603866724062655904

Download references

Acknowledgements

This work was supported by the National High Technology Research and Development Program of China (2013AA014002) and “Strategic Priority Research Program” of the Chinese Academy of Sciences (XDA06030200).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lihuan Yin .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Quan, D., Yin, L., Guo, Y. (2016). Assessing the Disclosure of User Profile in Mobile-Aware Services. In: Lin, D., Wang, X., Yung, M. (eds) Information Security and Cryptology. Inscrypt 2015. Lecture Notes in Computer Science(), vol 9589. Springer, Cham. https://doi.org/10.1007/978-3-319-38898-4_26

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-38898-4_26

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-38897-7

  • Online ISBN: 978-3-319-38898-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics