Generalization Algorithm For Prevent Inference Attacks In Social Network Data
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 3
Abstract
Online social networking has become one of the most popular activities on the web. Online social networks (OS Ns), such as Facebook, are increasingly utilized by many people. OS Ns allow users to control and customize what personal information is available to other users. These networks allow users to publish details about themselves and to connect to their friends. S ome of the information revealed inside these networks is meant to be private. A privacy breach occurs when sensitive information about the user, the information that an individual wants to keep from public, is disclosed to an adversary. Yet it is possible to use learning algorithms on released data to predict private information. Private information leakage could be an important issue in some cases. And explore how to launch inference attacks using released social networking data to predict private information. Desired use of data and individual privacy presents an opportunity for privacy-preserving social network data mining. Then devise three possible sanitization techniques that could be used in various situations. The effect of removing details and links in preventing sensitive information leakage. Removing details and friendship links together is the best way to reduce classifier accuracy. This is probably infeasible in maintaining the use of social networks. Explore the effectiveness of these techniques and attempt to use methods of collective inference to discover sensitive attributes of the data set. Decrease the effectiveness of both local and relational classification algorithms by using the sanitization methods.
Authors and Affiliations
Chethana Nair, Neethu Krishna, Siby Abraham
RFID Based Bus Tracking System
The innovation in technology today has made our lifestyle much easier and fun. This research work proposes and implements a solution for enhancing public transportation management services based on RFID and GSM. The s...
A New Heuristic Approach For Hide Valuable Information Of Organizations
Organizations accumulate and analyze customer data to pick up their services. Access Control Mechanisms(ACM) is used to make sure that only authorized information is on hand to users. Onthe other hand, sensitive info...
Design of The CAN Bus Booster Pack and The Implementation of The CAN Protocol on the TIVA C Launch pad Evaluation Board
This paperis about the practical design of a CAN Bus Boosterpack and the implementation of the CAN protocol on the TIVA C Launchpad evaluation board. The boosterpack board contains a CAN transceiver that can make com...
Survey of Text Categorization Techniques
On the internet huge data are in the uncategorized form. Big information is hidden behind this uncategorized scene of data. If classification of these internet documents done, then it will be helpful in many cases. Al...
Underwater Wireless Sensor Network Communication Using Electromagnetic Waves
An investigation of submerged Wireless Sensor network utilizing electromagnetic waves is presented as a part of this paper. under water communication require exceptionally effective radio wires for remote correspondence...