Abstract
Nowadays, the number of SNS user is increasing very quickly and importance of information in SNS is getting higher. While other traditional web services treat only photos and articles of users, SNS covers more sort of information. SNS privacy issue receives more attention because SNS users upload and update information about them in real time spontaneously. Existing researches mainly concentrate about extracting profiles from each user or connections between users. In this paper, we present a possible privacy attacking method for an attacker may use, and show that the method can be adopted in real social network service form as the third party application. Especially, we show how the application works to analyze threats to which SNS users can be exposed, and to show in what way users should react when using SNS.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Su, X., Khoshgoftaar, T.M.: A survey of collaborative filtering techniques. Advances in Artificial Intelligence, 1–19 (2009)
Narayanan, A., Shmatikov, V.: De-anonymizing social networks. In: 2009 30th IEEE Symposium on Security and Privacy, pp. 173–187 (2009)
Diaz, C., Troncoso, C., Serjantov, A.: On the impact of social network profiling on anonymity. In: Borisov, N., Goldberg, I. (eds.) PETS 2008. LNCS, vol. 5134, pp. 44–62. Springer, Heidelberg (2008)
Backstrom, L., Dwork, C., Kleinberg, J.: Wherefore Art Thou R3579X? Anonymized social networks, hidden patterns, and structural steganography. In: WWW (2007)
Beato, F., Kohlweiss, M., Wouters, K.: Enforcing access control in social networks. In: Proc. HotPets (2009)
Kamahara, J., Asakawa, T., Shimojo, S., Miyahara, H.: A community-based recommendation system to reveal unexpected interests. In: Proceedings of the 11th International Multimedia Modelling Conference, Washington, DC, USA, pp. 433–438 (2005)
Balduzzi, M., Platzer, C., Holz, T., Kirda, E., Balzarotti, D., Kruegel, C.: Abusing social networks for automated user profiling. In: Jha, S., Sommer, R., Kreibich, C. (eds.) RAID 2010. LNCS, vol. 6307, pp. 422–441. Springer, Heidelberg (2010)
Korolova, A., Motwani, R., Nabar, S., Xu, Y.: Link privacy in social networks. In: Proceeding of the 17th ACM Conference on Information and Knowledge Mining (2008)
Facebook, Facebook Markup Language (FBML) (July 4, 2012), http://developers.facebook.com/docs/reference/fbml/ (July 11, 2012 )
Calandrino, J.A., Kilzer, A., Narayanan, A., Felten, E.W., Shmatikov, V.: You might also like: privacy risks of collaborative filtering. In: IEEE Symposium on Security and Privacy, pp. 231–246 (2011)
Salton, G., McGill, M.J.: Introduction to modern information retrieval. McGraw-Hill (1986)
Tan, P.-N., Steinbach, M., Kumar, V., Grover, R., Vriens, M., Grover, R.E., Vriens, M.E.: Introduction to Data Mining. Journal of School Psychology 19(1), 51–56 (2005)
Kamahara, J., Asakawa, T., Shimojo, S., Miyahara, H.: A community-based recommendation system to reveal unexpected interests. In: Proceedings of the 11th International Multimedia Modelling Conference, Washington, DC, USA, pp. 433–438 (2005)
Baeza-Yates, R., Ribeiro-Neto, B.: Modern Information Retrieval, pp. 28–30. Addison Wesley (1999)
Golbeck, J., Hendler, J.: FilmTrust: movie recommendations using trust in web-based social networks. In: Proceedings of 3rd IEEE Consumer Communications and Networking Conference, vol. 1, pp. 282–286 (2006)
Zhou, B., Pei, J.: Preserving Privacy in Social Networks Against Neighborhood Attacks. In: 2008 IEEE 24th International Conference on Data Engineering, pp. 506–515 (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kim, C., Jung, K., Park, S. (2013). A Method of Pre-detecting Privacy Leak in Social Network Service Using Collaborative Filtering. In: Hong, B., Meng, X., Chen, L., Winiwarter, W., Song, W. (eds) Database Systems for Advanced Applications. DASFAA 2013. Lecture Notes in Computer Science, vol 7827. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-40270-8_13
Download citation
DOI: https://doi.org/10.1007/978-3-642-40270-8_13
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-40269-2
Online ISBN: 978-3-642-40270-8
eBook Packages: Computer ScienceComputer Science (R0)