Advertisement

3LP: Three Layers of Protection for Individual Privacy in Facebook

  • Khondker Jahid RezaEmail author
  • Md Zahidul Islam
  • Vladimir Estivill-Castro
Conference paper
Part of the IFIP Advances in Information and Communication Technology book series (IFIPAICT, volume 502)

Abstract

The possibility that an unauthorised agent is able to infer a user’s hidden information (an attribute’s value) is known as attribute inference risk. It is one of the privacy issues for Facebook users in recent times. An existing technique [1] provides privacy by suppressing users’ attribute values from their profiles. However, suppression of an attribute value sometimes is not enough to secure a user’s confidential information. In this paper, we experimentally demonstrate that (after taking necessary steps on attribute values) a user’s sensitive information can still be inferred through his/her friendship information. We evaluated our approach experimentally on two datasets. We propose 3LP, a new three layers protection technique, to provide privacy protection to users of on-line social networks.

Keywords

Privacy enhancing technologies Attribute inference 

References

  1. 1.
    Estivill-Castro, V., Hough, P., Islam, M.Z.: Empowering users of social networks to assess their privacy risks. In: 2014 IEEE International Conference on Big Data, pp. 644–649 (2014)Google Scholar
  2. 2.
    Facebook stats. newsroom.fb.com/company-info/. Accessed 03 June 2016
  3. 3.
    The top 500 sites on the web. //www.alexa.com/topsites. Accessed 03 June 2016
  4. 4.
    Ho, A., Maiga, A., Aimeur, E.: Privacy protection issues in social networking sites. In: IEEE/ACS International Conference on Computer Systems and Applications, pp. 271–278 (2009)Google Scholar
  5. 5.
    Tavani, H.T.: Ethics and Technology: Controversies, Questions, and Strategies for Ethical Computing, 3rd edn. Wiley Publishing, Hoboken (2011)Google Scholar
  6. 6.
    Rachels, J.: Why privacy is important. Philos. Publ. Affairs 4(4), 323–333 (1975)Google Scholar
  7. 7.
    Heatherly, R., Kantarcioglu, M., Thuraisingham, B.M.: Preventing private information inference attacks on social networks. IEEE Trans. Knowl. Data Eng. 25(8), 1849–1862 (2013)CrossRefGoogle Scholar
  8. 8.
    Ryu, E., Rong, Y., Li, J., Machanavajjhala, A.: Curso: protect yourself from curse of attribute inference: a social network privacy-analyzer. In: SIGMOD Workshop on Databases and Social Networks (DBSocial 2013), pp. 13–18, NY. ACM (2013)Google Scholar
  9. 9.
    Al-Saggaf, Y., Islam, M.Z.: Privacy in social network sites (SNS): the threats from data mining. Ethical Space Int. J. Commun. Ethics 9(4), 32–40 (2012)Google Scholar
  10. 10.
    Guha, S., Tang, K., Francis, P.: NOYB: privacy in online social networks. In: First Workshop on Online Social Networks (WOSN 2008), pp. 49–54, NY, USA. ACM (2008)Google Scholar
  11. 11.
    Gong, N.Z., Talwalkar, A., Mackey, L.W., Huang, L., Shin, E.C.R., Stefanov, E., Shi, E., Song, D.: Joint link prediction and attribute inference using a social-attribute network. ACM Trans. Intell. Syst. Technol. 5(2), 27 (2014)CrossRefGoogle Scholar
  12. 12.
    Estivill-Castro, V., Nettleton, D.F.: Can on-line social network users trust that what they designated as confidential data remains so? In: 2015 IEEE Trustcom/BigDataSE/ISPA, pp. 966–973, Washington. IEEE Computer Society (2015)Google Scholar
  13. 13.
    Adamic, L., Adar, E.: Friends and neighbors on the web. Soc. Netw. 25(3), 211–230 (2003)CrossRefGoogle Scholar
  14. 14.
    La Fond, T., Neville, J.: Randomization tests for distinguishing social influence and homophily effects. In: 19th International Conference on World Wide Web (WWW 2010), pp. 601–610, NY. ACM (2010)Google Scholar
  15. 15.
    Nettleton, D.F.: Generating synthetic online social network graph data and topologies. In: 3rd Workshop on Graph-Based Technologies and Applications (Graph-TA 2015). UPC, Barcelona (2015)Google Scholar
  16. 16.
    Islam, Z., Giggins, H.: Knowledge discovery through SysFor: a systematically developed forest of multiple decision trees. In: 9th Australasian Data Mining Conference, vol. 121, pp. 195–204, Darlinghurst. Australian Computer Society (2011)Google Scholar

Copyright information

© IFIP International Federation for Information Processing 2017

Authors and Affiliations

  • Khondker Jahid Reza
    • 1
    Email author
  • Md Zahidul Islam
    • 1
  • Vladimir Estivill-Castro
    • 2
  1. 1.School of Computing and MathematicsCharles Sturt UniversityBathurstAustralia
  2. 2.DTIC Universitat Pompeu FabraBarcelonaSpain

Personalised recommendations