Inference Attack Prevention Model on Social Networking Application Data Sanitization Method on User’s Profile
Abstract
Nowadays social media
is becoming very popular and used for marketing as per users profile. But for
this, social networking sites share user’s data with other marketing companies
and it is possible the third party companies can use user’s private data.
Significant factor in multimedia mobile systems is social network, where users
can send their photos, videos and other media files. On the other hand, the
information (e.g., user Bio, posts, etc. ) on social media platforms shared
usually reveals lots of users private information. That can be mined and
mistreated for the malicious reasons. To tackle privacy concerns, privacy
preserving mechanisms adopted by many social network service providers, e.g.
hiding users profiles, anonym zing user identity, etc. As an attributes result
from user profiles are usually set such that it could be accessed to prevent
personal information outflow only by friends. To understand the hidden
attributes to the numerous efficiency of current privacy protecting mechanisms
different attacks have been proposed. Almost solutions are based on the social
networking links along with users or their behaviors. The proposed work is an
inference attack prevention model on social networking application to solve
prevention problem. To prevent inference attack we proposed data sanitization
method on user’s profile.
Country : India
1 Veernala Sireesha
Assistant Professor, Department of Computer Science And Engineering, Malla Reddy College of Engineering for Women, Hyderabad -500100, Telangana, India
Z. Yin, M. Gupta, T. Weninger, and J.
Han, “A unified framework for link recommendation using random walks,'' in
Proc. IEEE Int. Conf. Adv. Social Netw. Anal. Mining. Odense, Denmark, Aug.
2010, pp. 152_159.
Narayanan and V. Shmatikov, “De-anonym
zing social networks,” in Proceedings of the 2009 30th IEEE Symposium on
Security and Privacy, ser. SP ’09. Washington, DC, USA: IEEE Computer Society,
2009, pp. 173–187.
J. He, W. W. Chu, and Z. V. Liu,
“Inferring privacy information from social networks,” in Proceedings of the 4th
IEEE International Conference on Intelligence and Security Informatics, ser.
ISI’06. Berlin, Heidelberg: Springer-Verlag, 2006, pp. 154– 165.
AW. Burange and H. D. Misalkar,
"Review of Internet of Things in development of smart cities with data
management & privacy," 2015 International Conference on Advances in
Computer Engineering and Applications, 2015, pp. 189-195.
E. Zheleva and L. Getoor, “Preserving
the Privacy of Sensitive Relationships in Graph Data,” Proc. First ACM SIGKDD
Int’l Conf. Privacy, Security, and Trust in KDD, pp. 153-171, 2008.
Z. Jorgensen, T. Yu, and G. Cormode,
“Publishing attributed social graphs with formal privacy guarantees,” in
Proceedings of the 2016 International Conference on Management of Data, ser.
SIGMOD ’16,2016, pp. 107–122.
Barnaghi, P., Wang, W., Henson, C.,
and Taylor, K., “Semantics for the Internet of Things: Early Progress and Back
to the Future,” International Journal on Semantic Web and Information Systems,
vol. 8, No. 1, 2012.