Generalization Algorithm For Prevent Inference Attacks In Social Network Data
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 3
Abstract
Online social networking has become one of the most popular activities on the web. Online social networks (OS Ns), such as Facebook, are increasingly utilized by many people. OS Ns allow users to control and customize what personal information is available to other users. These networks allow users to publish details about themselves and to connect to their friends. S ome of the information revealed inside these networks is meant to be private. A privacy breach occurs when sensitive information about the user, the information that an individual wants to keep from public, is disclosed to an adversary. Yet it is possible to use learning algorithms on released data to predict private information. Private information leakage could be an important issue in some cases. And explore how to launch inference attacks using released social networking data to predict private information. Desired use of data and individual privacy presents an opportunity for privacy-preserving social network data mining. Then devise three possible sanitization techniques that could be used in various situations. The effect of removing details and links in preventing sensitive information leakage. Removing details and friendship links together is the best way to reduce classifier accuracy. This is probably infeasible in maintaining the use of social networks. Explore the effectiveness of these techniques and attempt to use methods of collective inference to discover sensitive attributes of the data set. Decrease the effectiveness of both local and relational classification algorithms by using the sanitization methods.
Authors and Affiliations
Chethana Nair, Neethu Krishna, Siby Abraham
Applications of MVS on Hierarchical Clustering Algorithms
Clustering is a valuable method that arranges a large quantity of unordered text documents into a small number of expressive and coherent clusters, thereby offering a basis for instinctive and informative steering an...
Greedy Algorithm for Hub Selection in Interactive Network Applications
Many multiple users interaction in network applications such as teleconferencing, network gaming and online trading are gaining popularity but these applications require that the delay difference in between multiple...
Survey on Encryption and Data Hiding for Secure Data Transmission
There are many possible ways to transmit data to destination. However one of the main issues with sending data over the internet is its security. In which the confidential data can be stolen or hacked in many ways. S...
Amalgamation Of Captcha And Click Based Graphical Password For User Authentication
Many security primitives are based on hard mathematical problems. Using hard AI problems for security is emerging as an exciting new paradigm, but has been under-explored. Usable security has unique usability challen...
Performance of Different Bow Tie Antennas In Fresh Water
In this paper, the performance of a different microstrip fed bow tie antennas in water is studied. The antennas are designed and simulated using the simulator tool HFSS (High Frequency Structure Simulator). The antenna...