Inference Attack Prevention Model on Social Networking Application Data Sanitization Method on User’s Profile

Abstract

Nowadays social media is becoming very popular and used for marketing as per users profile. But for this, social networking sites share user’s data with other marketing companies and it is possible the third party companies can use user’s private data. Significant factor in multimedia mobile systems is social network, where users can send their photos, videos and other media files. On the other hand, the information (e.g., user Bio, posts, etc. ) on social media platforms shared usually reveals lots of users private information. That can be mined and mistreated for the malicious reasons. To tackle privacy concerns, privacy preserving mechanisms adopted by many social network service providers, e.g. hiding users profiles, anonym zing user identity, etc. As an attributes result from user profiles are usually set such that it could be accessed to prevent personal information outflow only by friends. To understand the hidden attributes to the numerous efficiency of current privacy protecting mechanisms different attacks have been proposed. Almost solutions are based on the social networking links along with users or their behaviors. The proposed work is an inference attack prevention model on social networking application to solve prevention problem. To prevent inference attack we proposed data sanitization method on user’s profile. 

Country : India

1 Veernala Sireesha

  1. Assistant Professor, Department of Computer Science And Engineering, Malla Reddy College of Engineering for Women, Hyderabad -500100, Telangana, India

IRJIET, Volume 1, Issue 3, December 2017 pp. 1-4

.

References

  1. Z. Yin, M. Gupta, T. Weninger, and J. Han, “A unified framework for link recommendation using random walks,'' in Proc. IEEE Int. Conf. Adv. Social Netw. Anal. Mining. Odense, Denmark, Aug. 2010, pp. 152_159.
  2. Narayanan and V. Shmatikov, “De-anonym zing social networks,” in Proceedings of the 2009 30th IEEE Symposium on Security and Privacy, ser. SP ’09. Washington, DC, USA: IEEE Computer Society, 2009, pp. 173–187.
  3. J. He, W. W. Chu, and Z. V. Liu, “Inferring privacy information from social networks,” in Proceedings of the 4th IEEE International Conference on Intelligence and Security Informatics, ser. ISI’06. Berlin, Heidelberg: Springer-Verlag, 2006, pp. 154– 165.
  4. AW. Burange and H. D. Misalkar, "Review of Internet of Things in development of smart cities with data management & privacy," 2015 International Conference on Advances in Computer Engineering and Applications, 2015, pp. 189-195.
  5. E. Zheleva and L. Getoor, “Preserving the Privacy of Sensitive Relationships in Graph Data,” Proc. First ACM SIGKDD Int’l Conf. Privacy, Security, and Trust in KDD, pp. 153-171, 2008.
  6. Z. Jorgensen, T. Yu, and G. Cormode, “Publishing attributed social graphs with formal privacy guarantees,” in Proceedings of the 2016 International Conference on Management of Data, ser. SIGMOD ’16,2016, pp. 107–122.
  7. Barnaghi, P., Wang, W., Henson, C., and Taylor, K., “Semantics for the Internet of Things: Early Progress and Back to the Future,” International Journal on Semantic Web and Information Systems, vol. 8, No. 1, 2012.