Skip to main content
Log in

Semantics-based sensitive topic diffusion detection framework towards privacy aware online social networks

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

The advent of sharing sensitive information via Online Social Networks (OSN) has jeopardized the user to the extent that the privacy of millions of OSN users could well be compromised, with their data openly available in the public domain. Evidently, users lack in data privacy and the access control mechanisms available to avoid the risk of disclosure. Therefore a framework that automatically preserves the user privacy to detect sensitive topic and minimize the risk of sensitive information disclosure risk beyond the current privacy sceneries offered by OSN service providers is required. In this paper, we present a three-fold sanitization framework which precisely detects sensitive topics semantically using statistical topic model scheme which incorporates standard knowledge bases for tagging the sensitive topics discovered. The interaction documents from location-of-interest are subjected to SSAR–LDA using Gibbs Sampling to identify sensitive topic clusters with high location entropy. The experimental result shows, (i) the sensitive topic clusters are identified with very high accuracy, (ii) despite the redaction approach, which eliminate the sensitive term, our proposed scheme enhance the privacy preserving policy by replacing the sensitive terms with suitable hierarchical generalization fetched from knowledge bases (iii) the probability of Kullback–Leibler (KL) divergence between sensitive and generalized sanitization terms on Twitter, with negligible information disclosure risk is acceptable, and (iv) the sanitization carried out for 10 sensitive topics, from 4500 user posts of 790 Twitter users, demonstrated high precision and recall, which can be correlated with advanced privacy settings for OSN users in the near future.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  1. Fire, M., Goldschmidt, R., Elovici, Y.: Online social networks: threats and solutions. IEEE Commun. Surv. Tutor. 16(4), 2019–2036 (2014)

    Article  Google Scholar 

  2. Arpitha, B., Deepika, M.: My privacy my decision: control communication media on online social networks. Int. J. Eng. Comput. Sci. 5(5), 16492–16503 (2016)

    Google Scholar 

  3. Baruh, L., Secinti, E., Cemalcilar, Z.: Online privacy concerns and privacy management: a meta-analytical review. J. Commun. 67(1), 26–53 (2017)

    Article  Google Scholar 

  4. Tsou, M.H., Jung, C.T., Allen, C., Yang, J.A., Han, S.Y., Spitzberg, B.H., Dozier, J.: Building a real-time geo-targeted event observation (Geo) viewer for disaster management and situation awareness. In: International Cartographic Conference. Springer, Cham, pp. 85–98 (2017)

  5. Di Martino, S., Romano, S., Bertolotto, M., Kanhabua, N., Mazzeo, A., Nejdl, W.: Towards exploiting social networks for detecting epidemic outbreaks. Glob. J. Flex. Syst. Manag. 18(1), 61–71 (2017)

    Article  Google Scholar 

  6. Bode, L., Vraga, E.K., Borah, P., Shah, D.V.: A new space for political behavior: political social networking and its democratic consequences. J. Comput. Med. Commun. 19(3), 414–429 (2014)

    Article  Google Scholar 

  7. Vihavainen, S., Lampinen, A., Oulasvirta, A., Silfverberg, S., Lehmuskallio, A.: The clash between privacy and automation in social media. IEEE Pervasive Comput. 13(1), 56–63 (2014)

    Article  Google Scholar 

  8. Lin, C.Y., Wu, L., Zhen, Wen Z., Tong, H.: Social network analysis in enterprise. Proc. IEEE 100(9), 2759–2776 (2012)

    Article  Google Scholar 

  9. Gomez Marmol, F., Gil Perez, M., Martinez Perez, G.: Reporting offensive content in social networks: toward a reputation-based assessment approach. IEEE Internet Comput. 18(2), 32–40 (2014)

    Article  Google Scholar 

  10. Samanta, M., Pal, P., Mukherjee, A.: A novel scheme for abatement of privacy concern by controlling the reachability in online social network. In: International Conference on Soft Computing and Pattern Recognition. Springer, Cham, pp. 686–697 (2016)

  11. Jiang, W., Wu, J., Li, F., Wang, G., Zheng, H.: Trust evaluation in online social networks using generalized network flow. IEEE Trans. Comput. 65(3), 952–963 (2016)

    Article  MathSciNet  MATH  Google Scholar 

  12. Xu, L., Ma, Y., Lei, K.: A novel trust model for activity social network based on PeerTrust. In: 17th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT), Guangzhou, pp. 274–279 (2016)

  13. Hu, H., Ahn, G., Jorgensen, J.: Multiparty access control for online social networks: model and mechanisms. IEEE Trans. Knowl. Data Eng. 25(7), 1614–1627 (2013)

    Article  Google Scholar 

  14. Tomy, S., Pardede, E.: Controlling privacy disclosure of third party applications in online social networks. Int. J. Web Inf. Syst. 12(2), 215–241 (2016)

    Article  Google Scholar 

  15. Yanagimoto H., Yoshioka, M.: Relationship strength estimation for social media using Folksonomy and network analysis. In: IEEE International Conference on Fuzzy Systems, Brisbane, QLD, pp. 1–8 (2012)

  16. Abawajy, J.H., Ninggal, M.I.H., Herawan, T.: Privacy preserving social network data publication. IEEE Commun. Surv. Tutor. 18(3), 1974–1997 (2016)

    Article  Google Scholar 

  17. Hong, Y., Vaidya, J., Lu, H., Karras, P., Goel, S.: Collaborative search log sanitization: toward differential privacy and boosted utility. IEEE Trans. Dependable Secur. Comput. 12(5), 504–518 (2015)

    Article  Google Scholar 

  18. Torra, V.: Privacy models and disclosure risk measures. In: Data Privacy: Foundations, New Developments and the Big Data Challenge . Springer International Publishing, pp. 111–189 (2017)

  19. Ranjbar, A., Maheswaran, M.: Using community structure to control information sharing in online social networks. Comput. Commun. 41, 11–21 (2014)

    Article  Google Scholar 

  20. Wong, K., Wong, A., Yeung, A., Fan, W., Tang, S.: Trust and privacy exploitation in online social networks. IT Prof. 16(5), 28–33 (2014)

    Article  Google Scholar 

  21. Bergström, A.: Online privacy concerns: a broad approach to understanding the concerns of different groups for different uses. Comput. Hum. Behav. 53, 419–426 (2015)

    Article  Google Scholar 

  22. Atrash, A., Abel, M., Moulin, C.: Notes and annotations as information resources in a social networking platform. Comput. Hum. Behav. 51, 1261–1267 (2015)

    Article  Google Scholar 

  23. Wang, Y., Min, Q., Han, S.: Understanding the effects of trust and risk on individual behavior toward social media platforms: a meta-analysis of the empirical evidence. Comput. Hum. Behav. 56, 34–44 (2016)

    Article  Google Scholar 

  24. Veltri, G.A., Ivchenko, A.: The impact of different forms of cognitive scarcity on online privacy disclosure. Comput. Hum. Behav. 73, 238–246 (2017)

    Article  Google Scholar 

  25. Bartsch, M., Dienlin, T.: Control your Facebook: an analysis of online privacy literacy. Comput. Hum. Behav. 56, 147–154 (2016)

    Article  Google Scholar 

  26. Bouakkaz, M., Loudcher, S., Ouinten, Y.: OLAP textual aggregation approach using the Google similarity distance. Int. J. Bus. Intell. Data Min. 11(1), 31 (2016)

    Article  Google Scholar 

  27. Criado, N., Such, J.: Implicit contextual integrity in online social networks. Inf. Sci. 325, 48–69 (2015)

    Article  MathSciNet  Google Scholar 

  28. Chen, J., Ping, J., Xu, Y., Tan, B.: Information privacy concern about peer disclosure in online social networks. IEEE Trans. Eng. Manage. 62(3), 311–324 (2015)

    Article  Google Scholar 

  29. Buccafurri, F., Fotia, L., Lax, G., Saraswat, V.: Analysis-preserving protection of user privacy against information leakage of social-network Likes. Inf. Sci. 328, 340–358 (2016)

    Article  Google Scholar 

  30. Johnston, A., Wilson, S.: ’Privacy compliance risks for facebook’. IEEE Technol. Soc. Mag. 31(2), 59–64 (2012)

    Article  Google Scholar 

  31. James, T., Warkentin, M., Collignon, S.: A dual privacy decision model for online social networks. Inf. Manage. 52(8), 893–908 (2015)

    Article  Google Scholar 

  32. Schwittmann, L., Wander, M., Boelmann, C., Weis, T.: Privacy preservation in decentralized online social networks. IEEE Internet Comput. 18(2), 16–23 (2014)

    Article  Google Scholar 

  33. Montoya, O., Villa, L., Muñoz, S., Arenas, A., Bastidas, M.: Information retrieval on documents methodology based on entropy filtering methodologies. Int. J. Bus. Intell. Data Min. 10(3), 280 (2015)

    Article  Google Scholar 

  34. Zhou, J., Cao, Z., Dong, X., Lin, X., Vasilakos, A.: Securing m-healthcare social networks: challenges, countermeasures and future directions. IEEE Wirel. Commun. 20(4), 12–21 (2013)

    Article  Google Scholar 

  35. Steyvers, M., Griffiths, T.: Handbook of latent semantic analysis. Probab. Top. Models 427, 424–440 (2007)

    Google Scholar 

  36. Auer, S., Bizer, C., Kobilarov, G., Lehmann, J., Cyganiak, R., Ives, Z.: Dbpedia: A nucleus for a web of open data. The Semantic Web, pp. 722–735 (2007)

  37. Hrycej, T.: Gibbs sampling in Bayesian networks. Artif. Intell. 46(3), 351–363 (1990)

    Article  MathSciNet  MATH  Google Scholar 

  38. Fellbaum, C.: WordNet: An Electronic Lexical Database. MIT Press, Cambridge, Massachusetts (1998)

    Book  MATH  Google Scholar 

  39. Wikipedia DBpedia Project. https://en.wikipedia.org/wiki/DBpedia (Accessed 10 Sept 2017)

  40. Twitter API. http://twitter4j.org/en/ (Accessed 7 Sept 2017)

  41. Stanford NLP Project. [online] http://nlp.stanford.edu/ (Accessed 10 Sept 2017)

  42. DuCharme, D.B.: Learning SPARQL: Querying and Updating with Sparql 1.1, O’Reilly Media (2013)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chinnaiah Valliyammai.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Valliyammai, C., Bhuvaneswari, A. Semantics-based sensitive topic diffusion detection framework towards privacy aware online social networks. Cluster Comput 22 (Suppl 1), 407–422 (2019). https://doi.org/10.1007/s10586-018-2142-y

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-018-2142-y

Keywords

Navigation