Abstract
With the popularity of social networks, publishing social network data is necessary for research purposes, which causes privacy leakage undoubtedly. Therefore, many methods are proposed to deal with different attack models. This paper focuses on a novel privacy attack model and refers it as a label pair attack. In the label pair attacks, the adversary can re-identify a pair of friends by using the labels of two vertices connected by an edge. We present a new anonymity concept, called Label Pair k 2-anonymity which ensures that there exists at least k – 1 other vertices such that each of the k – 1 vertices also has an incident edge of the same label pair and reduces the probability of a vertex being re-identified to less than 1/k. The experimental results demonstrate that the approach can preserve the privacy and utility of social networks effectively.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Cai, Z., He, Z., Guan, X., Li, Y.: Collective data-sanitization for preventing sensitive information inference attacks in social networks, p. 1 (2016)
Tai, C.H., Yu, P.S., Yang, D.N., Chen, M.S.: Privacy preserving social network publication against friendship attacks. In: Proceedings of KDD, San Diego, CA, pp. 1262–1270 (2011)
Campan, A., Truta, T., Cooper, N.: P-sensitive k-anonymity with generalization constraints. Trans. Data Priv. 2, 65–89 (2010)
Fung, B.C.M., Wang, K., Yu, P.S.: Top-down specialization for information and privacy preservation. In: International Conference on Data Engineering, pp. 205–216 (2005)
He, Z., Cai, Z., Han, Q., Tong, W., Sun, L., Li, Y.: An energy efficient privacy-preserving content sharing scheme in mobile social networks. Pers. Ubiquit. Comput. 20(5), 833–846 (2016)
He, Z., Cai, Z., Sun, Y., Li, Y., Cheng, X.: Customized privacy preserving for inherent data and latent data. Pers. Ubiquit. Comput. 21(1), 1–12 (2016)
Hay, M., Miklau, G., Jensen, D., Towsley, D., Weis, P.: Resisting structural re-identification in anonymized social networks. VLDB J. 19(6), 797–823 (2010)
Liu, K., Terzi, E.: Towards identity anonymization on graphs. In: Proceedings of SIGMOD, Vancouver, BC, pp. 93–106 (2008)
Liu, L., Wang, J., Liu, J., Zhang, J.: Privacy preserving in social networks against sensitive edge disclosure (2008)
Liu, X., Yang, X.: Protecting sensitive relationships against inference attacks in social networks. In: Lee, S.-g., Peng, Z., Zhou, X., Moon, Y.-S., Unland, R., Yoo, J. (eds.) DASFAA 2012. LNCS, vol. 7238, pp. 335–350. Springer, Heidelberg (2012). doi:10.1007/978-3-642-29038-1_25
Sun, C., Yu, P., Kong, X., Fu, Y.: Privacy preserving social network publication against mutual friend attacks. Trans. Data Priv. 7, 71–97 (2013)
Wang, K., Yu, P.S., Chakraborty, S.: Bottom-up generalization: a data mining solution to privacy protection. In: ICDM, pp. 249–256 (2004)
Yuan, M., Chen, L., Yu, P.: Personalized privacy protection in social networks. VLDB 4, 141–150 (2010)
Yuan, M., Chen, L., Yu, P., Yu, T.: Protecting sensitive labels in social network data anonymization. IEEE Trans. Knowl. Data Eng. 25, 633–647 (2013)
Zheng, X., Cai, Z., Li, J.Z., Gao, H.: Location-privacy-aware review publication mechanism for local business service systems. In: The 36th Annual IEEE International Conference on Computer Communications (2017)
Zou, L., Chen, L., Zsu, M.T.: K-automorphism: a general framework for privacy preserving network publication. Proc. VLDB Endow. 2(1), 946–957 (2009)
Zhang, L., Cai, Z., Wang, X.: Fakemask: a novel privacy preserving approach for smartphones. IEEE Trans. Netw. Serv. Manag. 13(2), 1 (2016)
Zhou, B., Pei, J.: Preserving privacy in social networks against neighborhood attacks. In: ICDE, pp. 506–515 (2008)
Zhou, B., Pei, J., Luk, W.S.: A brief survey on anonymization techniques for privacy preserving publishing of social network data. ACM SIGKDD Explor. Newsl. 10(2), 12–22 (2008)
Zheng, X., Cai, Z., Yu, J.Z, Wang, C.K., Li, Y.S.: Follow but no track privacy preserved profile publishing in cyber-physical social systems. IEEE Internet Things (2017)
Zhang, J., Sun, J., Zhang, R., Zhang, Y., Hu, X.: Privacy-preserving social media data publishing (2017)
Zhang, L., Zhang, W.: Edge anonymity in social network graphs. In: International Conference on Computational Science and Engineering, pp. 1–8 (2009)
Zhang, L., Wang, X., Lu, J., Li, P., Cai, Z.: An efficient privacy preserving data aggregation approach for mobile sensing. Secur. Commun. Netw. 9(16), 3844–3853 (2016)
The Web Environment at U-M. http://www-personal.umich.edu
Stanford Network Analysis Project. https://snap.stanford.edu
Acknowledgement
This work is supported by National Natural Science Foundation of China under Grant 61572459, 61672180 and 61602129. The paper is funded by the International Exchange Program of Harbin Engineering University for Innovation-oriented Talents Cultivation.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Liu, C., Yin, D., Li, H., Wang, W., Yang, W. (2017). Preserving Privacy in Social Networks Against Label Pair Attacks. In: Ma, L., Khreishah, A., Zhang, Y., Yan, M. (eds) Wireless Algorithms, Systems, and Applications. WASA 2017. Lecture Notes in Computer Science(), vol 10251. Springer, Cham. https://doi.org/10.1007/978-3-319-60033-8_34
Download citation
DOI: https://doi.org/10.1007/978-3-319-60033-8_34
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-60032-1
Online ISBN: 978-3-319-60033-8
eBook Packages: Computer ScienceComputer Science (R0)