Skip to main content
Log in

A machine learning based approach for user privacy preservation in social networks

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

With the development of Internet technology, service providers can provide users with personalized services to enrich user experience, however, this often requires a large number of users’ private data. Meanwhile, the protection of their private data and the evaluation of the risk of leaked datasets become a matter of great concern to many people. To resolve these issues, in this paper, we develop a machine learning-based approach in online social networks (OSNs) to efficiently correlate the leaked datasets and accurately learn millions of users’ confidential information. Moreover, a trust evaluation model is developed in OSNs to identify malicious service providers and secure users’ social activities via direct trust computing and indirect trust computing. Extensive experiments are conducted by using real-world leaked datasets, and the results show that the efficiency and effectiveness of the proposed approach in terms of user privacy protection and accuracy of privacy leakage evaluation.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Bell R, Koren Y, Volinsky C (2007) Modeling relationships at multiple scales to improve accuracy of large recommender systems. In: Proceedings of ACM SIGKDD

  2. Bonneau J (2012) The science of guessing: analyzing an anonymized corpus of 70 million passwords. In: IEEE Symposium on security and privacy

  3. Bonneau J, Herley C, Oorschot PCv, Stajano F (2012) The quest to replace passwords: a framework for comparative evaluation of web authentication schemes. In: IEEE Symposium on security and privacy

  4. de Carné de Carnavalet X, Mannan M (2014) From very weak to very strong: analyzing password-strength meters. In: Proceedings of NDSS

  5. Castelluccia C, Abdelberi C, Dürmuth M, Perito D (2013) When privacy meets security: leveraging personal information for password cracking. arXiv:1304.6584

  6. Wang Y, Su Z, Xu Q, Yang T, Zhang N (2019) A novel charging scheme for electric vehicles with smart communities in vehicular networks. In: IEEE Transactions on Vehicular Technology

  7. Castelluccia C, Dürmuth M., Perito D (2012) Adaptive password-strength meters from markov models. In: Proceedings of NDSS

  8. Das A, Bonneau J, Caesar M, Borisov N, Wang X (2014) The tangled web of password reuse. In: Proceedings of NDSS

  9. Li Z, Han W, Xu W (2014) A large-scale empirical analysis on chinese web passwords. In: Proceedings of USENIX security symposium

  10. You Z, Han X, Lü L., Yeung CH (2015) Empirical studies on the network of social groups: the case of tencent QQ. PLoS ONE 10(7)

  11. Gu Y, Zhang X, Liu Z, Ren F (2019) BeSense: leveraging WiFi channel data and computational intelligence for behavior analysis. In: IEEE Computational intelligence magazine

  12. Hu H, Liu Z, An J (2020) Mining mobile intelligence for wireless systems: a deep neural network approach. In: IEEE Computational intelligence magazine

  13. Dey R, Tang C, Ross KW, Saxena N (2012) Estimating age privacy leakage in online social networks. In: Proceedings of IEEE INFOCOM

  14. Gundecha P, Barbier G, Liu H (2011) Exploiting vulnerability to secure user privacy on a social networking site. In: Proceedings of ACM SIGKDD

  15. Su Z, Wang Y, Xu Q, Fei M, Tian Y, Zhang N (2019) A secure charging scheme for electric vehicles with smart communities in energy blockchain. In: IEEE Internet of things journal

  16. Liu Y, Gummadi KP, Krishnamurthy B, Mislove A (2011) Analyzing facebook privacy settings: user expectations vs. reality. In: Proceedings of ACM SIGCOMM IMC

  17. Zheleva E, Getoor L (2009) To join or not to join: the illusion of privacy in social networks with mixed public and private user profiles. In: Proceedings of WWW

  18. Wang Y, Su Z, Zhang N, Benslimane A (2020) Learning in the air: secure federated learning for UAV-assisted crowdsensing. In: IEEE Transactions on network science and engineering

  19. Wang Y, Su Z, Zhang N (2019) BSIS: blockchain-based secure incentive scheme for energy delivery in vehicular energy network. In: IEEE Transactions on industrial informatics

  20. Li Y, Peng Y, Zhang Z, Yin H, Xu Q. (2019) Matching user accounts across social networks based on username and display name. In: Proceedings of WWW

  21. Oktay H, Firat A, Ertem Z (2014) Demographic breakdown of twitter users: an analysis based on names. In: Proceedings of ASE BIGDATA/SOCIALCOM/CYBERSECURITY

  22. Nguyen D, Gravel R, Trieschnigg D, Meder T (2013) How old do you think i am?; a study of language and age in twitter. In: Proceedings of ICWSM

  23. Liao L, Jiang J, Lim E-P, Huang H (2014) A study of age gaps between online friends. In: Proceedings of HT

  24. Chen X, et al. (2020) Age of information aware radio resource management in vehicular networks: a proactive deep reinforcement learning perspective. In: IEEE Transactions on wireless communications

  25. Zhang J, Hu X, Zhang Y, Liu H (2016) Your age is no secret: inferring microbloggers’ ages via content and interaction analysis. In: Proceedings of AAAI

  26. Ma H, King I, Lyu MR (2009) Learning to recommend with social trust ensemble. In: Proceedings of ACM SIGIR

  27. Yang X, Steck H, Liu Y (2012) Circle-based recommendation in online social networks. In: Proceedings of ACM SIGKDD

  28. Wang X, Donaldson R, Nell C, Gorniak P, Ester M, Bu J (2016) Recommending groups to users using user-group engagement and time-dependent matrix factorization. In: AAAI

  29. Wang X, Hoi SCH, Ester M, Bu J, Chen C (2017) Learning personalized preference of strong and weak ties for social recommendation. In: WWW

  30. Wang X, Zhu W, Liu C (2019) Social recommendation with optimal limited attention. In: ACM SIGKDD

  31. Zhu L, Galstyan A, Cheng J, Lerman K (2014) Tripartite graph clustering for dynamic sentiment analysis on social media. In: Proceedings of ACM SIGMOD

  32. Iyer RR, Chen J, Sun H, Xu K (2019) A heterogeneous graphical model to understand user-level sentiments in social media. arXiv:https://arxiv.org/abs/1912.07911

  33. Deng H, Han J, Ji H, Li H, Lu Y, Wang H (2013) Exploring and inferring user-user pseudo-friendship for sentiment analysis with heterogeneous networks. In: Proceedings of SIAM ICDM

  34. Tan C, Lee L, Tang J, Jiang L, Zhou M, Li P (2011) User-level sentiment analysis incorporating social networks. In: Proceedings of ACM SIGKDD

  35. Wang D, Zhang Z, Wang P, Yan J, Huang X (2016) Targeted online password guessing: an underestimated threat. In: Proc ACM CCS

  36. Liu B, Sun X, Ni Z, Cao J, Luo J, Liu B, Fu X. (2020) Co-Detection of crowdturfing microblogs and spammers in online social networks. In: Proceedings of WWW

  37. Hu X, Tang J, Gao H, Liu H (2014) Social spammer detection with sentiment information. In: Proceedings of IEEE ICDM

  38. Song Y, Lu Z, Leung CW, Yang Q (2013) Collaborative boosting for activity classification in microblogs. In: Proceedings of ACM SIGKDD

  39. Ma J, Yang W, Luo M, Li N (2014) A study of probabilistic password models. In: IEEE Symposium on security and privacy

  40. Narayanan A, Shmatikov V (2005) Fast dictionary attacks on passwords using time-space tradeoff. In: Proceedings of ACM CCS

  41. Veras R, Collins C, Thorpe J (2014) On semantic patterns of passwords and their security impact. In: Proceedings of NDSS

  42. Han W, Li Z, Yuan L, Xu W (2016) Regional patterns and vulnerability analysis of chinese web passwords. IEEE Transactions on Information Forensics and Security

  43. Weir M, Aggarwal S, Medeiros B.d., Glodek B. (2009) Password cracking using probabilistic context-free grammars. In: IEEE Symposium on security and privacy

  44. Dell’Amico M, Michiardi P, Roudier Y (2010) Password strength: an empirical analysis. In: Conference on information communications

  45. Ji S, Yang S, Wang T, Liu C, Lee WH, Beyah R (2015) Pars: a uniform and open-source password analysis and research system. In: Proceedings of ACM WSDM

  46. Kelley PG, Komanduri S, Mazurek ML, Shay R, Vidas T, Bauer L, Christin N, Cranor LF, Lopez J (2012) Guess again (and again and again): measuring password strength by simulating password-cracking algorithms. In: IEEE Symposium on security and privacy

  47. Mazurek ML, Komanduri S, Vidas T, Bauer L, Christin N, Cranor LF, Kelley PG, Shay R, Ur B (2013) Measuring password guessability for an entire university. In: Proceedings of ACM CCS

  48. Ur B, Kelley PG, Komanduri S, Lee J, Maass M, Mazurek ML, Passaro T, Shay R, Vidas T, Bauer L, Christin N, Cranor LF (2012) How does your password measure up? The effect of strength meters on password creation. In: USENIX Conference on security symposium

  49. Florêncio D, Herley C (2010) Where do security policies come from?. In: Symposium on usable privacy and security

  50. Wang D, Wang P (2015) The emperor’s new password creation policies: an evaluation of leading web services and the effect of role in resisting against online guessing. In: Proceedings of ESORICS

  51. Weir M, Aggarwal S, Collins M, Stern H (2010) Testing metrics for password creation policies by attacking large sets of revealed passwords. In: Proceedings of ACM CCS

  52. Ji S, Yang S, Hu X, Han W, Li Z, Beyah R (2017) Zero-sum password cracking game a large-scale empirical study on the crackability, correlation, and security of passwords. IEEE TDSC

  53. Wang D, Cheng H, Wang P, Huang X, Jian G (2017) Zipf’s law in passwords. IEEE TIFS.

  54. Li Y, Wang H, Sun K (2016) A study of personal information in human-chosen passwords and its security implications. In: Proc. IEEE INFOCOM

  55. Wang D, Wang P, He D, Tian Y (2019) Birthday, name and bifacial-security: understanding passwords of chinese web users. In: Proceedings of USENIX security symposium

  56. Liu L, Jia H (2015) Trust evaluation via large-scale complex service-oriented online social networks. In: IEEE Transactions on systems, man and cybernetics: systems

  57. Bradbury TN, Karney BR (2019) Intimate relationships

  58. Su Z, Wang Y, Xu Q, Zhang N (2020) LVBS: lightweight vehicular blockchain for secure data sharing in disaster rescue. In: IEEE Transactions on dependable and secure computing

  59. Pearman S, Thomas J, Naeini PE, Habib H, Bauer L, Christin N, Cranor LF, Egelman S, Forget A (2017) Let’s go in for a closer look: observing passwords in their natural habitat. In: ACM CCS

Download references

Acknowledgements

The preliminary version of this article has been published in CyberSciTech 2019. This research is supported in part by National Key R&D Program of China (2018YFC0830500), National Natural Science Foundation of China (U1736205, 61603290), Shenzhen Basic Research Grant (JCYJ20170816100819428), Natural Science Basic Research Plan in Shaanxi Province of China (2019JM-159), and Natural Science Basic Research in Zhejiang Province of China (LGG18F020016).

Open Access

This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yuanming Zhang.

Ethics declarations

Conflict of Interests

The authors declare that they have no competing interests.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Yuanming Zhang and Jing Tao contributed equally to this work.

This article belongs to the Topical Collection: Special Issue on Privacy-Preserving Computing

Guest Editors: Kaiping Xue, Zhe Liu, Haojin Zhu, Miao Pan and David S.L. Wei

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhang, Y., Tao, J., Zhang, S. et al. A machine learning based approach for user privacy preservation in social networks. Peer-to-Peer Netw. Appl. 14, 1596–1607 (2021). https://doi.org/10.1007/s12083-020-01068-0

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-020-01068-0

Keywords

Navigation