Improved Privacy Preserving Profile Matching in Online Social Networks
Abstract
Social networking  became popular because of its digital communication technologies tools for extending the social circle of people. Privacy preservation became a significant issue in social networking. This work discussed user profile matching with privacy preservation and introduced a group of   profile matching protocols. Online social network with a mixture of public and private user profiles to predict the private attributes of users. We map this problem to a relational classification problem and we propose practical models that use friendship and group membership information (which is often not hidden) to infer sensitive attributes. The key novel idea is that in addition to friendship links, groups can be carriers of significant information. To the best of our knowledge, this is the first work that uses operation-based and group-based classification to study privacy implications in social networks with mixed public and private user profiles.
Keywords
References
“Comscore,â€http://www.comscoredatamine.com/.
A. G. Miklas, K. K. Gollu, K. K. W. Chan, S. Saroiu, P. K. Gummadi, and E. de Lara, “Exploiting social interactions in mobile systems,†in Ubicomp, 2007, pp. 409–428.
S. Ioannidis, A. Chaintreau, and L. Massouli´ e, “Optimal and scalable distribution of content updates over a mobile social network,†in Proc. IEEE INFOCOM, 2009, pp. 1422–1430.
R. Lu, X. Lin, and X. Shen, “Spring: A social-based privacy-preserving packet forwarding protocol for vehicular delay tolerant networks,†in Proc. IEEE INFOCOM, 2010, pp. 632–640.
W. He, Y. Huang, K. Nahrstedt, and B. Wu, “Message propagation in adhoc-based proximity mobile social networks,†in PERCOM workshops, 2010, pp. 141–146.
D. Niyato, P. Wang, W. Saad, and A. Hjørungnes, “Controlled coalitional games for cooperative mobile social networks,†IEEE Transactions onVehicular Technology, vol. 60, no. 4, pp. 1812–1824, 2011.
M. Motani, V. Srinivasan, and P. Nuggehalli, “Peoplenet: engineering a wireless virtual social network,†in MobiCom, 2005, pp. 243–257.
M. Brereton, P. Roe, M. Foth, J. M. Bunker, and L. Buys, “Designing participation in agile ridesharing with mobile social software,†in OZCHI, 2009, pp. 257–260.
E.Bulut and B.Szymanski, “Exploiting friendship relations for efficient routing in delay tolerant mobile social networks,†IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 12, pp. 2254–2265, 2012.
Z. Yang, B. Zhang, J. Dai, A. C. Champion, D. Xuan, and D. Li, “E-smalltalker: A distributed mobile system for social networking in physical proximity,†in ICDCS, 2010, pp. 468–477.
Q. Li, S. Zhu, and G. Cao, “Routing in socially selfish delay tolerant networks,†in Proc. IEEE INFOCOM, 2010, pp. 857–865.
X. Liang, X. Li, T. H. Luan, R. Lu, X. Lin, and X. Shen, “Moralitydriven data forwarding with privacy preservation in mobile social networks,†IEEE Transactions on Vehicular Technology, vol. 7, no. 61, pp. 3209–3222, 2012
Refbacks
- There are currently no refbacks.
Copyright © 2013, All rights reserved.| ijseat.com
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.
Â