[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1109/ICDE.2009.158guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

On Protecting Private Information in Social Networks: A Proposal

Published: 29 March 2009 Publication History

Abstract

As online social networks get more popular, it becomes increasingly critical to preserve user privacy in such networks. In this paper, we propose our preliminary results on defining and tackling information aggregation attacks over online social networks. We first introduce three major threats towards private information in online social networks. We conceptually model private information into multilevel and discretionary models. Then, we articulate information aggregation attacks under discretionary model. Finally, we present our preliminary design of "privacy monitor," a framework that allows users to define their own privacy scheme, and track their actual privacy disclosure to check for any unwanted leakage.

Cited By

View all
  • (2018)A vulnerability evaluation framework for online social network profilesInternational Journal of Internet Technology and Secured Transactions10.1504/IJITST.2012.0479614:2/3(198-206)Online publication date: 13-Dec-2018
  • (2018)Secure collaborative social networksIEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews10.1109/TSMCC.2010.205087940:6(682-689)Online publication date: 25-Dec-2018
  • (2014)Automatic Social Circle Detection Using Multi-View ClusteringProceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management10.1145/2661829.2661973(1019-1028)Online publication date: 3-Nov-2014
  • Show More Cited By
  1. On Protecting Private Information in Social Networks: A Proposal

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image Guide Proceedings
      ICDE '09: Proceedings of the 2009 IEEE International Conference on Data Engineering
      March 2009
      1772 pages
      ISBN:9780769535456

      Publisher

      IEEE Computer Society

      United States

      Publication History

      Published: 29 March 2009

      Author Tags

      1. information aggregation attack
      2. privacy
      3. social network

      Qualifiers

      • Article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 09 Jan 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2018)A vulnerability evaluation framework for online social network profilesInternational Journal of Internet Technology and Secured Transactions10.1504/IJITST.2012.0479614:2/3(198-206)Online publication date: 13-Dec-2018
      • (2018)Secure collaborative social networksIEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews10.1109/TSMCC.2010.205087940:6(682-689)Online publication date: 25-Dec-2018
      • (2014)Automatic Social Circle Detection Using Multi-View ClusteringProceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management10.1145/2661829.2661973(1019-1028)Online publication date: 3-Nov-2014
      • (2012)Stalking onlineProceedings of the second ACM conference on Data and Application Security and Privacy10.1145/2133601.2133607(37-48)Online publication date: 7-Feb-2012
      • (2011)Preserving privacy in online social networksProceedings of the 4th Canada-France MITACS conference on Foundations and Practice of Security10.1007/978-3-642-27901-0_1(1-13)Online publication date: 12-May-2011

      View Options

      View options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media