Unified Metric for Measuring Anonymity and Privacy with Application to Online Social Network

Online social networks are used by more and more people. While they enable rich communication, posting information on such networks can degrade one’s privacy and anonymity. A metric based on probability and entropy has been developed for measuring the degree of information revelation caused by posting to social networks. It can be used to measure the loss of privacy as well as the loss of anonymity.

[1]  Marco Gruteser,et al.  USENIX Association , 1992 .

[2]  Yehuda Lindell,et al.  Privacy Preserving Data Mining , 2002, Journal of Cryptology.

[3]  John Krumm,et al.  A survey of computational location privacy , 2009, Personal and Ubiquitous Computing.

[4]  Charu C. Aggarwal,et al.  On the design and quantification of privacy preserving data mining algorithms , 2001, PODS.

[5]  Lars Kulik,et al.  Simulation of Obfuscation and Negotiation for Location Privacy , 2005, COSIT.

[6]  Rakesh Agrawal,et al.  Privacy-preserving data mining , 2000, SIGMOD 2000.

[7]  Marco Gruteser,et al.  Protecting Location Privacy Through Path Confusion , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[8]  Ashwin Machanavajjhala,et al.  l-Diversity: Privacy Beyond k-Anonymity , 2006, ICDE.

[9]  E. Michael Maximilien,et al.  Privacy-asa-Service : Models , Algorithms , and Results on the Facebook Platform , 2009 .

[10]  Ninghui Li,et al.  t-Closeness: Privacy Beyond k-Anonymity and l-Diversity , 2007, 2007 IEEE 23rd International Conference on Data Engineering.

[11]  Elisa Bertino,et al.  A Survey of Quantification of Privacy Preserving Data Mining Algorithms , 2008, Privacy-Preserving Data Mining.

[12]  Philip S. Yu,et al.  Privacy-Preserving Data Mining - Models and Algorithms , 2008, Advances in Database Systems.

[13]  Tanzima Hashem,et al.  Safeguarding Location Privacy in Wireless Ad-Hoc Networks , 2007, UbiComp.

[14]  Hui Xiong,et al.  Preserving privacy in gps traces via uncertainty-aware path cloaking , 2007, CCS '07.

[15]  ASHWIN MACHANAVAJJHALA,et al.  L-diversity: privacy beyond k-anonymity , 2006, 22nd International Conference on Data Engineering (ICDE'06).

[16]  Lars Kulik,et al.  Location privacy and location-aware computing , 2006 .