A check-in shielding scheme against acquaintance inference in location-based social networks

Location-based social services such as Foursquare and Facebook Place allow users to perform check-ins at places and interact with each other in geography (e.g. check-in together). While existing studies have exhibited that the adversary can accurately infer social ties based on check-in data, the traditional check-in mechanism cannot protect the acquaintance privacy of users. In this work, therefore, we propose a novel shielding check-in system, whose goal is to guide users to check-in at secure places. We accordingly propose a novel research problem, Check-in Shielding against Acquaintance Inference (CSAI), which aims at recommending a list of secure places when users intend to check-ins so that the potential that the adversary correctly identifies the friends of users can be significantly reduced. We develop the Check-in Shielding Scheme (CSS) framework to solve the CSAI problem. CSS consists of two steps, namely estimating the social strength between users and generating a list of secure places. Experiments conducted on Foursquare and Gowalla check-in datasets show that CSS is able to not only outperform several competing methods under various scenario settings, but also lead to the check-in distance preserving and ensure the usability of the new check-in data in Point-of-Interest (POI) recommendation.

[1]  Catuscia Palamidessi,et al.  Geo-indistinguishability: differential privacy for location-based systems , 2012, CCS.

[2]  Margaret Martonosi,et al.  DP-WHERE: Differentially private modeling of human mobility , 2013, 2013 IEEE International Conference on Big Data.

[3]  Wen-Chih Peng,et al.  Exploring Check-in Data to Infer Social Ties in Location Based Social Networks , 2017, PAKDD.

[4]  Srikanta J. Bedathur,et al.  LoCaTe: Influence Quantification for Location Promotion in Location-based Social Networks , 2017, IJCAI.

[5]  Yazhe Wang,et al.  Preserving privacy in social networks against connection fingerprint attacks , 2015, 2015 IEEE 31st International Conference on Data Engineering.

[6]  Aniket Kittur,et al.  Bridging the gap between physical location and online social networks , 2010, UbiComp.

[7]  Jian Pei,et al.  A brief survey on anonymization techniques for privacy preserving publishing of social network data , 2008, SKDD.

[8]  Claude Castelluccia,et al.  Study : Privacy Preserving Release of Spatio-temporal Density in Paris , 2014 .

[9]  Yuval Elovici,et al.  Online Social Networks: Threats and Solutions , 2013, IEEE Communications Surveys & Tutorials.

[10]  Yang Zhang,et al.  Inferring friendship from check-in data of location-based social networks , 2015, 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM).

[11]  Cecilia Mascolo,et al.  A Random Walk around the City: New Venue Recommendation in Location-Based Social Networks , 2012, 2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing.

[12]  Jure Leskovec,et al.  Friendship and mobility: user movement in location-based social networks , 2011, KDD.

[13]  Wang-Chien Lee,et al.  PGT: Measuring Mobility Relationship Using Personal, Global and Temporal Factors , 2014, 2014 IEEE International Conference on Data Mining.

[14]  Philip S. Yu,et al.  Privacy Preserving Social Network Publication against Mutual Friend Attacks , 2013, 2013 IEEE 13th International Conference on Data Mining Workshops.

[15]  Keith W. Ross,et al.  Facebook users have become much more private: A large-scale study , 2012, 2012 IEEE International Conference on Pervasive Computing and Communications Workshops.

[16]  David Pisinger,et al.  Upper bounds and exact algorithms for p-dispersion problems , 2006, Comput. Oper. Res..

[17]  Ben Y. Zhao,et al.  Preserving Location Privacy in Geosocial Applications , 2014, IEEE Transactions on Mobile Computing.

[18]  Cheng-Te Li,et al.  Where You Go Reveals Who You Know: Analyzing Social Ties from Millions of Footprints , 2015, CIKM.

[19]  Donald F. Towsley,et al.  Resisting structural re-identification in anonymized social networks , 2010, The VLDB Journal.

[20]  K. Liu,et al.  Towards identity anonymization on graphs , 2008, SIGMOD Conference.

[21]  Cyrus Shahabi,et al.  Towards integrating real-world spatiotemporal data with social networks , 2011, GIS.

[22]  Catuscia Palamidessi,et al.  Optimal Geo-Indistinguishable Mechanisms for Location Privacy , 2014, CCS.

[23]  Philip S. Yu,et al.  Privacy-preserving social network publication against friendship attacks , 2011, KDD.

[24]  Yang Zhang,et al.  walk2friends: Inferring Social Links from Mobility Profiles , 2017, CCS.

[25]  Yan Liu,et al.  EBM: an entropy-based model to infer social strength from spatiotemporal data , 2013, SIGMOD '13.