New Approach to Quantification of Privacy on Social Network Sites

Users may unintentionally reveal private information to the world on their blogs on social network sites (SNSs). Information hunters can exploit such disclosed sensitive information for the purpose of advertising, marketing, spamming, etc. We present a new metric to quantify privacy, based on probability and entropy theory. Simply by relying on the total leaked privacy value calculated with our metric, users can adjust the amount of information they reveal on SNSs. Previous studies focused on quantifying privacy for purposes of data mining and location finding. The privacy metric in this paper deals with unintentional leaks of information from SNSs. Our metric helps users of SNSs find how much privacy can be preserved after they have published sentences on their SNSs. It is simple, yet precise, which is proved through an experimental evaluation.

[1]  E. Michael Maximilien,et al.  Privacy-asa-Service : Models , Algorithms , and Results on the Facebook Platform , 2009 .

[2]  Charu C. Aggarwal,et al.  On the design and quantification of privacy preserving data mining algorithms , 2001, PODS.

[3]  Lars Kulik,et al.  Simulation of Obfuscation and Negotiation for Location Privacy , 2005, COSIT.

[4]  David J. Weir,et al.  Co-occurrence Retrieval: A Flexible Framework for Lexical Distributional Similarity , 2005, CL.

[5]  Tetsuji Satoh,et al.  An anonymous communication technique using dummies for location-based services , 2005, ICPS '05. Proceedings. International Conference on Pervasive Services, 2005..

[6]  Latanya Sweeney,et al.  Achieving k-Anonymity Privacy Protection Using Generalization and Suppression , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[7]  ASHWIN MACHANAVAJJHALA,et al.  L-diversity: privacy beyond k-anonymity , 2006, 22nd International Conference on Data Engineering (ICDE'06).

[8]  Lars Kulik,et al.  Location privacy and location-aware computing , 2006 .

[9]  Marco Gruteser,et al.  USENIX Association , 1992 .

[10]  Yehuda Lindell,et al.  Privacy Preserving Data Mining , 2002, Journal of Cryptology.

[11]  Alessandro Acquisti,et al.  Information revelation and privacy in online social networks , 2005, WPES '05.

[12]  Ruslan Mitkov,et al.  The Oxford handbook of computational linguistics , 2003 .

[13]  Kuan-Ta Chen,et al.  Involuntary Information Leakage in Social Network Services , 2008, IWSEC.

[14]  Yves Zenou,et al.  Working Paper No . 601 , 2003 Social Networks and Crime Decisions : The Role of Social Structure in Facilitating Delinquent Behavior , 2003 .

[15]  Matt Bishop,et al.  Computer Security: Art and Science , 2002 .

[16]  Akira Utsumi,et al.  Disclosure Control of Natural Language Information to Enable Secure and Enjoyable Communication over the Internet , 2007, Security Protocols Workshop.

[17]  John Krumm,et al.  A survey of computational location privacy , 2009, Personal and Ubiquitous Computing.

[18]  Fernanda B. Viégas,et al.  Bloggers' Expectations of Privacy and Accountability: An Initial Survey , 2006, J. Comput. Mediat. Commun..

[19]  Pierangela Samarati,et al.  Protecting Respondents' Identities in Microdata Release , 2001, IEEE Trans. Knowl. Data Eng..

[20]  Philip S. Yu,et al.  Privacy-Preserving Data Mining - Models and Algorithms , 2008, Advances in Database Systems.

[21]  Nicholas Christakis,et al.  The Taste for Privacy: An Analysis of College Student Privacy Settings in an Online Social Network , 2008, J. Comput. Mediat. Commun..

[22]  Andrei Broder,et al.  A taxonomy of web search , 2002, SIGF.

[23]  Ninghui Li,et al.  t-Closeness: Privacy Beyond k-Anonymity and l-Diversity , 2007, 2007 IEEE 23rd International Conference on Data Engineering.

[24]  Elisa Bertino,et al.  A Survey of Quantification of Privacy Preserving Data Mining Algorithms , 2008, Privacy-Preserving Data Mining.

[25]  Marco Gruteser,et al.  Protecting Location Privacy Through Path Confusion , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[26]  Sang Joon Kim,et al.  A Mathematical Theory of Communication , 2006 .

[27]  Danah Boyd,et al.  Social Network Sites: Definition, History, and Scholarship , 2007, J. Comput. Mediat. Commun..

[28]  Pierre Baldi,et al.  Modeling the Internet and the Web: Probabilistic Methods and Algorithms. By Pierre Baldi, Paolo Frasconi, Padhraic Smith, John Wiley and Sons Ltd., West Sussex, England, 2003. 285 pp ISBN 0 470 84906 1 , 2006, Inf. Process. Manag..

[29]  Tanzima Hashem,et al.  Safeguarding Location Privacy in Wireless Ad-Hoc Networks , 2007, UbiComp.

[30]  Hui Xiong,et al.  Preserving privacy in gps traces via uncertainty-aware path cloaking , 2007, CCS '07.