Abstract
We introduce the problem of information which become sensitive when combined, named shared secrets, and we propose a model based on Choquet integral to assess the risk that an actor in a social network is able to combine all information available. Some examples are presented and discussed and future directions are outlined.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Beach, A., Gartrell, M., Han, R.: Social-K: Real-time K-anonymity guarantees for social network applications. In: 2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), pp. 600–606. IEEE (March 2010)
Campan, A., Truta, T.M.: Data and Structural k-Anonymity in Social Networks. In: Bonchi, F., Ferrari, E., Jiang, W., Malin, B. (eds.) PinKDD 2008. LNCS, vol. 5456, pp. 33–54. Springer, Heidelberg (2009)
Faigle, U., Grabisch, M.: A discrete choquet integral for ordered systems. CoRR, abs/1102.1340 (2011)
Jung, Y., Kim, M., Masoumzadeh, A., Joshi, J.: A survey of security issue in multi-agent systems. Artificial Intelligence Review, 1–22 (2011), doi:10.1007/s10462-011-9228-8
Li, N., Li, T., Venkatasubramanian, S.: t-closeness: Privacy beyond k-anonymity and l-diversity. In: Proceedings of IEEE International Conference on Data Engineering, pp. 106–115 (2007)
Liu, K., Das, K., Grandison, T., Kargupta, H.: Privacy-preserving data analysis on graphs and social networks
Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M.: l-diversity: Privacy beyond k-anonymity. In: 22nd IEEE International Conference on Data Engineering (2006)
Mesiar, R.: Fuzzy measures and integrals. Fuzzy Sets and Systems 156(3), 365–370 (2005)
Samarati, P.: Protecting respondents’ identities in microdata release. IEEE Transactions on Knowledge and Data Engineering 13, 1010–1027 (2001)
Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)
Simmons, G.J.: How to (Really) Share a Secret. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 390–448. Springer, Heidelberg (1990)
Sugeno, M.: Theory of fuzzy integrals and its applications. PhD thesis, Tokyo Institute of Technology (1974)
Sweeney, L.: Achieving k-anonymity privacy protection using generalization and suppression. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 10(5), 571–588 (2002)
Torra, V., Domingo-Ferrer, J.: Disclosure control methods and information loss for microdata, pp. 91–110. Elsevier (2001)
Torra, V., Narukawa, Y.: Modeling decisions - information fusion and aggregation operators. Springer (2007)
Wong, R.C., Li, J., Fu, A.W., Wang, K.: (α,k) Anonymity: An Enhanced k -Anonymity Model for Privacy-Preserving Data Publishing, pp. 754–759. ACM (2006)
Ying, X., Wu, X.: On Link Privacy in Randomizing Social Networks. In: Theeramunkong, T., Kijsirikul, B., Cercone, N., Ho, T.-B. (eds.) PAKDD 2009. LNCS, vol. 5476, pp. 28–39. Springer, Heidelberg (2009)
Ying, X., Wu, X.: On link privacy in randomizing social networks. Knowl. Inf. Syst. 28(3), 645–663 (2011)
Zhou, B., Pei, J.: The k-anonymity and l-diversity approaches for privacy preservation in social networks against neighborhood attacks. Knowledge and Information Systems 28(1), 1–38 (2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Troiano, L., Díaz, I., Rodríguez-Muñiz, L.J. (2012). A Model for Assessing the Risk of Revealing Shared Secrets in Social Networks. In: Greco, S., Bouchon-Meunier, B., Coletti, G., Fedrizzi, M., Matarazzo, B., Yager, R.R. (eds) Advances in Computational Intelligence. IPMU 2012. Communications in Computer and Information Science, vol 300. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-31724-8_52
Download citation
DOI: https://doi.org/10.1007/978-3-642-31724-8_52
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-31723-1
Online ISBN: 978-3-642-31724-8
eBook Packages: Computer ScienceComputer Science (R0)