Providing Group Anonymity in Social Networks

Chapter

Abstract

In today’s world, there are almost no borders between people. Using Internet technologies, especially social networks, people can communicate and share different information regardless of where they live or work. However, giving out any sensitive information can pose significant security threats for the owner of the information. As more privacy challenges arise, people become concerned about their security. Many social networking websites provide various types of privacy policies, but this proves to be insufficient. All existing security methods aim at gaining individual anonymity. Nevertheless, information about user groups, which could be determined inside social networks, is not protected. Still, this information might occur to be security-intensive information is present in this data set. In this chapter, the task we have set is providing group anonymity in social networks. By group anonymity we understand the property of a group of people to be indistinguishable within a particular dataset. We also propose a technique to solve the task using wavelet transforms.

References

  1. 1.
    Gross, R., Acquisti, A.: Information revelation and privacy in online social networks. In: Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, pp. 71–80. ACM, New York (2005)Google Scholar
  2. 2.
    Acquisti, A., Gross, R.: Imagined communities: awareness, information sharing, and privacy on the Facebook. In: International Workshop on Privacy Enhancing Technologies. Lecture Notes in Computer Science, vol. 4258, pp. 36–58. Springer, Berlin/Heidelberg (2006)Google Scholar
  3. 3.
    Krishnamurthy, B., Wills, C.E.: Characterizing privacy in online social networks. In: Proceedings of the First Workshop on Online Social Networks, pp. 37–42. ACM, New York (2008)Google Scholar
  4. 4.
    Augie, R., Jennifer, W., Emily, R.: Fight social media stagnation. Build trust and advocacy with targeted content and engagement strategies. Forrester Research report (2010)Google Scholar
  5. 5.
    Squicciarini, A.C., Shehab, M., Paci, F.: Collective privacy management in social networks. In: Proceedings of the 18th International Conference on World Wide Web, pp. 521–530. ACM, New York (2009)Google Scholar
  6. 6.
    Panda, G.K., Mitra, A., Prasad, A., Singh, A., Tour, D.: Applying l-diversity in anonymizing collaborative social network. Int. J. Comput. Sci. Inf. Secur. 8(2), 324–329 (2010)Google Scholar
  7. 7.
    Chew, M., Balfanz, D., Laurie, B.: (Under)mining privacy in social networks. In: Proceedings of Web 2.0 Security and Privacy Workshop, Oakland (2008)Google Scholar
  8. 8.
    Felt, A., Evans, D.: Privacy protection for social networking platforms. In: Proceedings of Web 2.0 Security and Privacy Workshop, Oakland (2008)Google Scholar
  9. 9.
    Guha, S., Tang, K., Francis, P.: NOYB: privacy in online social networks. In: Proceedings of the First Workshop on Online Social Networks, pp. 49–54. ACM, New York (2008)Google Scholar
  10. 10.
    Tootoonchian, A., Saroiu, S., Ganjali, Y., Wolman, A.: Lockr: better privacy for social networks. In: Proceedings of the 5th International Conference on Emerging Networking Experiments and Technologies, pp. 169–180. ACM, New York (2009)Google Scholar
  11. 11.
    Narayanan, A., Shmatikov, V.: Robust de-anonymization of large sparse datasets. In: Proceedings of the 2008 IEEE Symposium on Security and Privacy, pp. 111–125. IEEE Computer Society, Washington (2008)Google Scholar
  12. 12.
    Barbaro, M., Zeller Jr., T.: A face is exposed for AOL searcher no. 4417749. New York Times Aug 9, p. C4 (2006).Google Scholar
  13. 13.
    Buddy Media. “Corporate Brand Manager Poll—Reaching Customers in Local Markets” conducted by Harris Interactive, Aug 3 (2010)Google Scholar
  14. 14.
    Chertov, O., Tavrov, D.: Group anonymity. In: Hüllermeier, E., Kruse, R. (eds.) IPMU-2010. Communications in Computer and Information Science, vol. 81, pp. 592–601. Springer, Heidelberg (2010)Google Scholar
  15. 15.
    Chertov, O., Tavrov, D.: Data group anonymity: general approach. Int. J. Comput. Sci. Inf. Secur. 8(7), 1–8 (2010)Google Scholar
  16. 16.
    Mallat, S.A.: Wavelet Tour of Signal Processing. Academic, New York (1999)MATHGoogle Scholar
  17. 17.
    Chertov, O.: Group Methods of Data Processing. Lulu.com, Raleigh (2010)Google Scholar
  18. 18.
    Alexa Internet. Vkontakte.ru, http://www.alexa.com/siteinfo/vkontakte.ru (2012)

Copyright information

© Springer-Verlag London 2012

Authors and Affiliations

  1. 1.Kyiv Polytechnic InstituteNational Technical University of UkraineKyivUkraine

Personalised recommendations