[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/2661829.2661985acmconferencesArticle/Chapter ViewAbstractPublication PagescikmConference Proceedingsconference-collections
research-article

Controllable Information Sharing for User Accounts Linkage across Multiple Online Social Networks

Published: 03 November 2014 Publication History

Abstract

People have multiple accounts on Online Social Networks (OSNs) for various purposes. It is of great interest for third parties to collect more users' information by linking their accounts on different OSNs. Unfortunately, most users have not been aware of potential risks of such accounts linkage. Therefore, the design of a control methodology that allows users to share their information without the risk of being linked becomes an urgent need, yet still remains open.
In this paper, we first aim to raise the users' awareness by presenting an effective User Accounts Linkage Inference (UALI), which is shown to be more powerful to users than existing methods. In order to help users control the risks of UALI, we next propose the first Information Control Mechanism (ICM), in which users' information is still visible as intended and, in the meanwhile, the risk of their accounts linkage can be controlled. Using real-world datasets, the performance of ICM is validated, and we also show that it works well for various linkage inference approaches. Both UALI and ICM approaches, designed to take generic inputs, extend their ability to be widely applied into many practical social services.

References

[1]
R. Ajami, N. A. Qirim, and N. Ramadan. Privacy issues in mobile social networks. Procedia Computer Science, 10(0):672--679, 2012.
[2]
S. Bhagat, G. Cormode, B. Krishnamurthy, and D. Srivastava. Class-based graph anonymization for social network data. Proc. VLDB Endow., 2(1):766--777, Aug. 2009.
[3]
L. Bilge, T. Strufe, D. Balzarotti, and E. Kirda. All your contacts are belong to us: automated identity theft attacks on social networks. In Proceedings of the 18th international conference on World wide web, WWW '09, pages 551--560, New York, NY, USA, 2009. ACM.
[4]
R. Diestel. Graph Theory, 4th Edition, volume 173 of Graduate texts in mathematics. Springer, 2012.
[5]
T. N. Dinh, Y. Shen, and M. T. Thai. The walls have ears: optimize sharing for visibility and privacy in online social networks. In Proceedings of CIKM '12, pages 1452--1461, New York, NY, USA, 2012. ACM.
[6]
Geographical Distance. http://en.wikipedia.org/wiki/Geographical_distance, 2013.
[7]
O. Goga, H. Lei, S. H. K. Parthasarathi, G. Friedland, R. Sommer, and R. Teixeira. Exploiting innocuous activity for correlating users across sites. In Proceedings of WWW '13, pages 447--458, Republic and Canton of Geneva, Switzerland, 2013. International World Wide Web Conferences Steering Committee.
[8]
P. Gundecha, G. Barbier, and H. Liu. Exploiting vulnerability to secure user privacy on a social networking site. In Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining, KDD '11, pages 511--519, New York, NY, USA, 2011. ACM.
[9]
M. Hay, G. Miklau, D. Jensen, D. Towsley, and P. Weis. Resisting structural re-identification in anonymized social networks. Proc. VLDB Endow., 1(1):102--114, Aug. 2008.
[10]
K. Henderson, B. Gallagher, L. Li, L. Akoglu, T. Eliassi-Rad, H. Tong, and C. Faloutsos. It's who you know: graph mining using recursive structural features. In Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining, KDD '11, pages 663--671, New York, NY, USA, 2011. ACM.
[11]
F. S. Hillier and G. J. Lieberman. Introduction to operations research, 4th ed. Holden-Day, Inc., San Francisco, CA, USA, 1986.
[12]
D. Irani, S. Webb, K. Li, and C. Pu. Large online social footprints - an emerging threat. In Proceedings of the 2009 International Conference on Computational Science and Engineering - Volume 03, CSE '09, pages 271--276, Washington, DC, USA, 2009. IEEE Computer Society.
[13]
P. Kazienko, K. Musial, and T. Kajdanowicz. Multidimensional social network in the social recommender system. Systems, Man and Cybernetics, Part A: Systems and Humans, IEEE Transactions on, 41(4):746--759, July 2011.
[14]
A. Narayanan and V. Shmatikov. De-anonymizing social networks. In Security and Privacy, 2009 30th IEEE Symposium on, pages 173--187, 2009.
[15]
E. Novak and Q. Li. A survey of security and privacy in online social networks. Technical Report WM-CS-2012-2, Computer Science, College of William and Mary, 2012.
[16]
OnlineSocialNetworks. http://en.wikipedia.org/wiki/List_of_social_networking_websites, 2013.
[17]
OpenCV. http://opencv.org/, 2013.
[18]
D. Perito, C. Castelluccia, M. Kaafar, and P. Manils. How unique and traceable are usernames? In S. Fischer-Hlzbner and N. Hopper, editors, Privacy Enhancing Technologies, volume 6794 of Lecture Notes in Computer Science, pages 1--17. Springer Berlin Heidelberg, 2011.
[19]
W. Shen, J. Wang, P. Luo, and M. Wang. Linden: linking named entities with knowledge base via semantic knowledge. In Proceedings of the 21st international conference on World Wide Web, WWW '12, pages 449--458, New York, NY, USA, 2012. ACM.
[20]
Y. Shen, T. N. Dinh, H. Zhang, and M. T. Thai. Interest-matching information propagation in multiple online social networks. In Proceedings of the 21st ACM international conference on Information and knowledge management, CIKM '12, pages 1824--1828, New York, NY, USA, 2012. ACM.
[21]
Y. Shen, Y.-S. Syu, D. T. Nguyen, and M. T. Thai. Maximizing circle of trust in online social networks. In Proceedings of HT '12, pages 155--164, New York, NY, USA, 2012. ACM.
[22]
SocialIntelligenceCorp. http://www.socialintel.com/, 2013.
[23]
UserAccountStatistics. http://pewinternet.org/~/media//Files/Reports/2013/Social%20Networking%202013_PDF.pdf, 2013.
[24]
J. Vosecky, D. Hong, and V. Shen. User identification across multiple social networks. In Networked Digital Technologies, 2009. NDT '09. First International Conference on, pages 360--365, 2009.
[25]
W. E. Winkler. String comparator metrics and enhanced decision rules in the fellegi-sunter model of record linkage. In Proceedings of the Section on Survey Research, pages 354--359, 1990.
[26]
L. A. Wolsey. Integer Programming. John Wiley, New York, 1998.
[27]
X. Wu, X. Ying, K. Liu, and L. Chen. A Survey of Privacy-Preservation of Graphs and Social Networks. In A. Elmagarmid, C. Aggarwal, and H. Wang, editors, Managing and Mining Graph Data, volume 40 of Advances in Database Systems, chapter 14, pages 421--453. Springer US, Boston, MA, 2010.
[28]
R. Zafarani and H. Liu. Connecting users across social media sites: A behavioral-modeling approach. In Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining, KDD '13. ACM, 2013.
[29]
B. Zhou and J. Pei. Preserving privacy in social networks against neighborhood attacks. In Data Engineering, 2008. ICDE 2008. IEEE 24th International Conference on, pages 506--515, 2008.
[30]
B. Zhou and J. Pei. The k-anonymity and l-diversity approaches for privacy preservation in social networks against neighborhood attacks. Knowl. Inf. Syst., 28(1):47--77, July 2011.

Cited By

View all
  • (2022)HFUL: a hybrid framework for user account linkage across location-aware social networksThe VLDB Journal — The International Journal on Very Large Data Bases10.1007/s00778-022-00730-832:1(1-22)Online publication date: 5-Feb-2022
  • (2021)EEUPL: Towards effective and efficient user profile linkage across multiple social platformsWorld Wide Web10.1007/s11280-021-00882-724:5(1731-1748)Online publication date: 1-Sep-2021
  • (2021)A Semi-supervised Framework with Efficient Feature Extraction and Network Alignment for User Identity LinkageDatabase Systems for Advanced Applications10.1007/978-3-030-73197-7_46(675-691)Online publication date: 11-Apr-2021
  • Show More Cited By

Index Terms

  1. Controllable Information Sharing for User Accounts Linkage across Multiple Online Social Networks

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      CIKM '14: Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management
      November 2014
      2152 pages
      ISBN:9781450325981
      DOI:10.1145/2661829
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 03 November 2014

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. algorithms
      2. computational hardness
      3. experiments
      4. information control mechanism
      5. multiple online social networks
      6. user accounts linkage inference

      Qualifiers

      • Research-article

      Conference

      CIKM '14
      Sponsor:

      Acceptance Rates

      CIKM '14 Paper Acceptance Rate 175 of 838 submissions, 21%;
      Overall Acceptance Rate 1,861 of 8,427 submissions, 22%

      Upcoming Conference

      CIKM '25

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)8
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 09 Jan 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2022)HFUL: a hybrid framework for user account linkage across location-aware social networksThe VLDB Journal — The International Journal on Very Large Data Bases10.1007/s00778-022-00730-832:1(1-22)Online publication date: 5-Feb-2022
      • (2021)EEUPL: Towards effective and efficient user profile linkage across multiple social platformsWorld Wide Web10.1007/s11280-021-00882-724:5(1731-1748)Online publication date: 1-Sep-2021
      • (2021)A Semi-supervised Framework with Efficient Feature Extraction and Network Alignment for User Identity LinkageDatabase Systems for Advanced Applications10.1007/978-3-030-73197-7_46(675-691)Online publication date: 11-Apr-2021
      • (2021)Uncertainty‐aware network alignmentInternational Journal of Intelligent Systems10.1002/int.2261336:12(7895-7924)Online publication date: 26-Oct-2021
      • (2020)We Know Who You Are: Discovering Similar Groups Across Multiple Social NetworksIEEE Transactions on Systems, Man, and Cybernetics: Systems10.1109/TSMC.2018.282655550:7(2693-2704)Online publication date: Jul-2020
      • (2020)Fast Network Alignment via Graph Meta-LearningIEEE INFOCOM 2020 - IEEE Conference on Computer Communications10.1109/INFOCOM41043.2020.9155456(686-695)Online publication date: 6-Jul-2020
      • (2020)User Account Linkage Across Multiple Platforms with Location DataJournal of Computer Science and Technology10.1007/s11390-020-0250-735:4(751-768)Online publication date: 1-Jul-2020
      • (2020)Retrofitting Embeddings for Unsupervised User Identity LinkageAdvances in Knowledge Discovery and Data Mining10.1007/978-3-030-47426-3_30(385-397)Online publication date: 11-May-2020
      • (2019)Embedding Based Cross-network User Identity Association TechnologyProceedings of the 2019 3rd International Conference on Digital Signal Processing10.1145/3316551.3316571(138-143)Online publication date: 24-Feb-2019
      • (2019)Methods for User Profiling across Social Networks2019 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom)10.1109/ISPA-BDCloud-SustainCom-SocialCom48970.2019.00231(1572-1579)Online publication date: Dec-2019
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media