Skip to main content
Log in

A check-in shielding scheme against acquaintance inference in location-based social networks

  • Published:
World Wide Web Aims and scope Submit manuscript

Abstract

Location-based social services such as Foursquare and Facebook Place allow users to perform check-ins at places and interact with each other in geography (e.g. check-in together). While existing studies have exhibited that the adversary can accurately infer social ties based on check-in data, the traditional check-in mechanism cannot protect the acquaintance privacy of users. In this work, therefore, we propose a novel shielding check-in system, whose goal is to guide users to check-in at secure places. We accordingly propose a novel research problem, Check-in Shielding against Acquaintance Inference (CSAI), which aims at recommending a list of secure places when users intend to check-ins so that the potential that the adversary correctly identifies the friends of users can be significantly reduced. We develop the Check-in Shielding Scheme (CSS) framework to solve the CSAI problem. CSS consists of two steps, namely estimating the social strength between users and generating a list of secure places. Experiments conducted on Foursquare and Gowalla check-in datasets show that CSS is able to not only outperform several competing methods under various scenario settings, but also lead to the check-in distance preserving and ensure the usability of the new check-in data in Point-of-Interest (POI) recommendation.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Figure 1
Figure 2
Figure 3
Figure 4
Figure 5
Figure 6
Figure 7
Figure 8
Figure 9
Figure 10
Figure 11
Figure 12
Figure 13
Figure 14
Figure 15
Figure 16
Figure 17
Figure 18

Similar content being viewed by others

References

  1. Acs, G., Castelluccia, C.: A case study: privacy preserving release of spatio-temporal density in paris. In: Proceedings of ACM SIGKDD (2014)

  2. Andrés, M.E., Bordenabe, N.E., Chatzikokolakis, K., Palamidessi, C.: Geo-indistinguishability: Differential privacy for location-based systems. In: Proceedings of ACM CCS (2013)

  3. Backes, M., Humbert, M., Pang, J., Zhang, Y.: walk2friends: inferring social links from mobility profiles. In: Proceedings of ACM CCS (2017)

  4. Bordenabe, N.E., Chatzikokolakis, K., Palamidessi, C.: Optimal geo-indistinguishable mechanisms for location privacy. In: Proceedings of ACM CCS (2014)

  5. Cheng, R., Pang, J., Zhang, Y.: Inferring friendship from check-in data of location-based social networks. In: Proceedings of ASONAM (2015)

  6. Cho, E., Myers, S.A., Leskovec, J.: Friendship and mobility: user movement in location-based social networks. In: Proceedings of ACM KDD (2011)

  7. Cranshaw, J., Toch, E., Hong, J.I., Kittur, A., Sadeh, N.M.: Bridging the gap between physical location and online social networks. In: Proceedings of UbiComp (2010)

  8. Dey, R., Jelveh, Z., Ross, K.W.: Facebook users have become much more private: a large-scale study. In: Proceedings of PerCom Workshops (2012)

  9. Fire, M., Goldschmidt, R., Elovici, Y.: Online social networks: threats and solutions. IEEE Communications Surveys and Tutorials (2014)

  10. Grover, A., Leskovec, J.: Scalable feature learning for networks. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, San Francisco, CA, USA, August 13-17, 2016, pp. 855–864 (2016)

  11. Hay, M., Miklau, G., Jensen, D.D., Towsley, D.F., Li, C.: Resisting structural re-identification in anonymized social networks. VLDB J (2010)

  12. Hsieh, H.-P., Yan, R., Li, C.-T.: Where you go reveals who you know: Analyzing social ties from millions of footprints. In: Proceedings of ACM CIKM (2015)

  13. Likhyani, A., Bedathur, S., Deepak, P.: Locate: influence quantification for location promotion in location-based social networks. In: Proceedings of IJCAI (2017)

  14. Liu, K., Terzi, E.: Towards identity anonymization on graphs. In: Proceedings of ACM SIGMOD (2008)

  15. Mir, D.J., Isaacman, S., Cáceres, R., Martonosi, M., Wright, R.N.: Dp-where: Differentially private modeling of human mobility. In: Proceedings of IEEE Big Data (2013)

  16. Njoo, G.S., Kao, M.-C., Hsu, K.-W., Peng, W.-C.: Exploring check-in data to infer social ties in location based social networks. In: Proceedings of PAKDD (2017)

  17. Noulas, A., Scellato, S., Lathia, N., Mascolo, C.: A random walk around the city New venue recommendation in location-based social networks. In: SocialCom/PASSAT, pp. 144–153 (2012)

  18. Pham, H., Hu, L., Shahabi, C.: Towards integrating real-world spatiotemporal data with social networks. In: Proceedings of ACM SIGSPATIAL (2011)

  19. Pham, H., Shahabi, C., Liu, Y.: EBM: an entropy-based model to infer social strength from spatiotemporal data. In: Proceedings of ACM SIGMOD (2013)

  20. Pisinger, D.: Upper bounds and exact algorithms for p-dispersion problems. Computers & OR (2006)

  21. Puttaswamy, K.P.N., Wang, S., Steinbauer, T., Agrawal, D., El Abbadi, A., Kruegel, C., Zhao, B.Y.: Preserving location privacy in geosocial applications. IEEE Transactions on Mobile Computing (2014)

  22. Sun, C., Philip, S.Y., Kong, X., Fu, Y.: Privacy preserving social network publication against mutual friend attacks. In: Proceedings of ICDM Workshops (2013)

  23. Tai, C.-H., Yu, P.S., Yang, D.-N., Chen, M.-S.: Privacy-preserving social network publication against friendship attacks. In: Proceedings of ACM SIGKDD (2011)

  24. Wang, H., Li, Z., Lee, W.-C.: PGT: measuring mobility relationship using personal, global and temporal factors. In: Proceedings of IEEE ICDM (2014)

  25. Wang, Y., Zheng, B.: Preserving privacy in social networks against connection fingerprint attacks. In: Proceedings of ICDE (2015)

  26. Zhou, B., Pei, J., Luk, W.-S: A brief survey on anonymization techniques for privacy preserving publishing of social network data. SIGKDD Explorations (2008)

Download references

Acknowledgments

This work was supported in part by Ministry of Science and Technology, R.O.C., under Contract 107-2221-E-006-165-MY2, 107-2218-E-006-040, 107-2321-B-006-017, 107-2636-E-006-002 (MOST Young Scholar Fellowship) and 107-2221-E-006-199. In addition, we also thank the support from Academia Sinica under the Grant AS-107-TP-A05. Also, we would like to thank anonymous reviewers and the editor for their very useful comments and suggestions.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kun-Ta Chuang.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chen, BH., Li, CT. & Chuang, KT. A check-in shielding scheme against acquaintance inference in location-based social networks. World Wide Web 22, 2321–2354 (2019). https://doi.org/10.1007/s11280-018-0653-3

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11280-018-0653-3

Keywords

Navigation