Privacy Threat Analysis of Mobile Social Network Data Publishing

With mobile phones becoming integral part of modern life, the popularity of mobile social networking has tremendously increased over the past few years, bringing with it many benefits but also new trepidations. In particular, privacy issues in mobile social networking has recently become a significant concern. In this paper we present our study on the privacy vulnerability of the mobile social network data publication with emphases on a re-identification and disclosure attacks. We present a new technique for uniquely identifying a targeted individual in the anonymized social network graph and empirically demonstrate the capability of the proposed approach using a very large social network datasets. The results show that the proposed approach can uniquely re-identify a target on anonymized social network data with high success rate.

[1]  Jemal H. Abawajy,et al.  Utility-aware social network graph anonymization , 2015, J. Netw. Comput. Appl..

[2]  Jemal H. Abawajy,et al.  Vertex re‐identification attack using neighbourhood‐pair properties , 2016, Concurr. Comput. Pract. Exp..

[3]  Jemal H. Abawajy,et al.  Attack Vector Analysis and Privacy-Preserving Social Network Data Publishing , 2011, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications.

[4]  Jemal H. Abawajy,et al.  Privacy Preserving Social Network Data Publication , 2016, IEEE Communications Surveys & Tutorials.

[5]  Jemal H. Abawajy,et al.  Privacy-preserving multi-hop profile-matching protocol for proximity mobile social networks , 2017, Future Gener. Comput. Syst..

[6]  Arun Kumar Sangaiah,et al.  CenLocShare: A centralized privacy-preserving location-sharing system for mobile online social networks , 2017, Future Gener. Comput. Syst..

[7]  Markus Endler,et al.  Situation-based privacy autonomous management for mobile social networks , 2017, Comput. Commun..

[8]  Jemal H. Abawajy,et al.  A trajectory privacy-preserving scheme based on query exchange in mobile social networks , 2018, Soft Comput..

[9]  K. Liu,et al.  Towards identity anonymization on graphs , 2008, SIGMOD Conference.

[10]  Jian Pei,et al.  The k-anonymity and l-diversity approaches for privacy preservation in social networks against neighborhood attacks , 2011, Knowledge and Information Systems.

[11]  Jemal H. Abawajy,et al.  Privacy Threat Analysis of Social Network Data , 2011, ICA3PP.

[12]  Jemal H. Abawajy,et al.  Preserving Utility in Social Network Graph Anonymization , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.