Abstract
Social networks are getting more and more attention in recent years. People join social networks to share their information with others. However, due to the different cultures and backgrounds, people have different requirements on what kind of information should be published. Currently, when social network websites publish data, they just leave the information that a user feels sensitive blank. This is not enough due to the existence of the label-structure relationship. A group of analyzing algorithms can be used to learn the blank information with high accuracy. In this paper, we propose a personalized model to protect private information in social networks. Specifically, we break the label-structure association by slightly changing the edges in some users’ neighborhoods. More importantly, in order to increase the usability of the published graph, we also preserve the influence value of each user during the privacy protection. We verify the effectiveness of our methods through extensive experiments. The results show that the proposed methods can protect sensitive labels against learning algorithms and at the same time, preserve certain graph utilities.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Liu L, Wang J, Liu J, Zhang J. Privacy preserving in social networks against sensitive edge disclosure. Technical Report, CMIDA-HiPSCCS 006-08, Department of Computer Science, University of Kentucky, Lexington, USA, 2008.
Das S, Egecioglu Ö, El Abbadi A. Anonymizing weighted social network graphs. In Proc. the 26th ICDE, March 2010, pp.904–907.
Zheleva E, Getoor L. To join or not to join: The illusion of privacy in social networks with mixed public and private user profiles. In Proc. the 18th International Conference on World Wide Web, April 2009, pp.531–540.
Mo M, King I. Exploit of online social networks with community-based graph semi-supervised learning. In Proc. the 17th International Conference on Neural Information Processing: Theory and Algorithms - Volume Part I, November 2010, pp.669–678.
Lu Q, Getoor L. Link-based classification. In Proc. the 20th International Conference on Machine Learning (ICML), August 2003, pp.496–503.
Neville J, Jensen D. Relational dependency networks. Journal of Machine Learning Research, 2007, 8(Mar): 653–692.
Tang L, Liu H. Relational learning via latent social dimensions. In Proc. the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, June 28–July 1, 2009, pp.817–826.
Bhagat S, Cormode G, Krishnamurthy B, Srivastava D. Class-based graph anonymization for social network data. Proc. VLDB Endow., 2009, 2(1): 766–777.
Cheng J, Fu A W, Liu J. K-isomorphism: Privacy preserving network publication against structural attacks. In Proc. the 2010 International Conference on Management of Data, June 2010, pp.459–470.
Hay M, Miklau G, Jensen D, Towsley D, Weis P. Resisting structural re-identification in anonymized social networks. Proc. VLDB Endow., 2008, 1(1): 102–114.
Liu K, Terzi E. Towards identity anonymization on graphs. In Proc. the 2008 International Conference on Management of Data, June 2008, pp.93–106.
Zhou B, Pei J. Preserving privacy in social networks against neighborhood attacks. In Proc. the 24th ICDE, April 2008, pp.506–515.
Liu X, Wang B, Yang X. Efficiently anonymizing social networks with reachability preservation. In Proc. the 22nd ACM International Conference on Information & Knowledge Management, October 27-November 1, 2013, pp.1613–1618.
Campbell C S, Maglio P P, Cozzi A, Dom B. Expertise identification using email communications. In Proc. the 12th International Conference on Information and Knowledge Management, November 2003, pp.528–531.
Zhang J, Tang J, Li J. Expert finding in a social network. In Proc. the 12th Int. Conf. Database Systems for Advanced Applications, April 2007, pp.1066–1069.
Ying X, Wu X. Randomizing social networks: A spectrum preserving approach. In Proc. SDM, April 2008, pp.739–750.
Zhang J, Tang J, Liu L, Li J. A mixture model for expert finding. In Proc. the 12th Pacific-Asia Conference on Advances in Knowledge Discovery and Data Mining, May 2008, pp.466–478.
Zheleva E, Getoor L. Preserving the privacy of sensitive relationships in graph data. In Proc. the 1st PinKDD, August 2007, pp.153–171.
Campan A, Truta T M. Data and structural k-anonymity in social networks. In Proc. the 2nd PinKDD, August 2008, pp.33–54.
Zou L, Chen L, Özsu M T. k-automorphism: A general framework for privacy preserving network publication. Proc. VLDB Endow., 2009, 2(1): 946–957.
Cormode G, Srivastava D, Yu T, Zhang Q. Anonymizing bipartite graph data using safe groupings. Proc. VLDB Endow., 2008, 1(1): 833–844.
Wu W, Xiao Y, Wang W, He Z, Wang Z. k-symmetry model for identity anonymization in social networks. In Proc. the 13th International Conference on Extending Database Technology, March 2010, pp.111–122.
He X, Vaidya J, Shafiq B, Adam N, Atluri V. Preserving privacy in social networks: A structure-aware approach. In Proc. the 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology, Sept. 2009, pp.647–654.
Yuan M, Chen L, Yu P S. Personalized privacy protection in social networks. Proc. VLDB Endow., 2010, 4(2): 141–150.
Lindamood J, Heatherly R, Kantarcioglu M, Thuraisingham B. Inferring private information using social network data. In Proc. the 18th International Conference on World Wide Web, April 2009, pp.1145–1146.
Machanavajjhala A, Korolova A, Sarma A D. Personalized social recommendations: Accurate or private? Proc. VLDB Endow., 2011, 4(7): 440–450.
Dwork C. Differential privacy. In Proc. the 33rd ICALP Part II, July 2006, pp.1–12.
Xu J, Zhang Z, Xiao X, Yang Y, Yu G. Differentially private histogram publication. In Proc. the 28th IEEE International Conference on Data Engineering, April 2012, pp.32–43.
Qardaji W, Yang W, Li N. Differentially private grids for geospatial data. In Proc. the 29th IEEE International Conference on Data Engineering (ICDE), April 2013, pp.757–768.
To H, Ghinita G, Shahabi C. A framework for protecting worker location privacy in spatial crowdsourcing. Proc. VLDB Endow., 2014, 7(10): 919–930.
Li N, Qardaji W, Su D, Cao J. PrivBasis: Frequent itemset mining with differential privacy. Proc. VLDB Endow., 2012, 5(11): 1340–1351.
Zeng C, Naughton J F, Cai J Y. On differentially private frequent itemset mining. Proc. VLDB Endow., 2012, 6(1): 25–36.
Akcora C, Carminati B, Ferrari E. Privacy in social networks: How risky is your social graph? In Proc. the 28th IEEE International Conference on Data Engineering, April 2012, pp.9–19.
Author information
Authors and Affiliations
Corresponding author
Additional information
This work is supported in part by the Research Grants Council (RGC) of Hong Kong, China, under Grant No. NHKUST612/09, the National Basic Research 973 Program of China under Grant No. 2012CB316200, and the National Natural Science Foundation of China under Grant No. 60931160444.
Electronic supplementary material
Below is the link to the electronic supplementary material.
ESM 1
(PDF 95 kb)
Rights and permissions
About this article
Cite this article
Yuan, M., Chen, L., Yu, P.S. et al. Protect You More Than Blank: Anti-Learning Sensitive User Information in the Social Networks. J. Comput. Sci. Technol. 29, 762–776 (2014). https://doi.org/10.1007/s11390-014-1466-1
Received:
Revised:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11390-014-1466-1