Skip to main content

A Method of Pre-detecting Privacy Leak in Social Network Service Using Collaborative Filtering

  • Conference paper
Database Systems for Advanced Applications (DASFAA 2013)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 7827))

Included in the following conference series:

  • 2976 Accesses

Abstract

Nowadays, the number of SNS user is increasing very quickly and importance of information in SNS is getting higher. While other traditional web services treat only photos and articles of users, SNS covers more sort of information. SNS privacy issue receives more attention because SNS users upload and update information about them in real time spontaneously. Existing researches mainly concentrate about extracting profiles from each user or connections between users. In this paper, we present a possible privacy attacking method for an attacker may use, and show that the method can be adopted in real social network service form as the third party application. Especially, we show how the application works to analyze threats to which SNS users can be exposed, and to show in what way users should react when using SNS.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 49.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Su, X., Khoshgoftaar, T.M.: A survey of collaborative filtering techniques. Advances in Artificial Intelligence, 1–19 (2009)

    Google Scholar 

  2. Narayanan, A., Shmatikov, V.: De-anonymizing social networks. In: 2009 30th IEEE Symposium on Security and Privacy, pp. 173–187 (2009)

    Google Scholar 

  3. Diaz, C., Troncoso, C., Serjantov, A.: On the impact of social network profiling on anonymity. In: Borisov, N., Goldberg, I. (eds.) PETS 2008. LNCS, vol. 5134, pp. 44–62. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  4. Backstrom, L., Dwork, C., Kleinberg, J.: Wherefore Art Thou R3579X? Anonymized social networks, hidden patterns, and structural steganography. In: WWW (2007)

    Google Scholar 

  5. Beato, F., Kohlweiss, M., Wouters, K.: Enforcing access control in social networks. In: Proc. HotPets (2009)

    Google Scholar 

  6. Kamahara, J., Asakawa, T., Shimojo, S., Miyahara, H.: A community-based recommendation system to reveal unexpected interests. In: Proceedings of the 11th International Multimedia Modelling Conference, Washington, DC, USA, pp. 433–438 (2005)

    Google Scholar 

  7. Balduzzi, M., Platzer, C., Holz, T., Kirda, E., Balzarotti, D., Kruegel, C.: Abusing social networks for automated user profiling. In: Jha, S., Sommer, R., Kreibich, C. (eds.) RAID 2010. LNCS, vol. 6307, pp. 422–441. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  8. Korolova, A., Motwani, R., Nabar, S., Xu, Y.: Link privacy in social networks. In: Proceeding of the 17th ACM Conference on Information and Knowledge Mining (2008)

    Google Scholar 

  9. Facebook, Facebook Markup Language (FBML) (July 4, 2012), http://developers.facebook.com/docs/reference/fbml/ (July 11, 2012 )

  10. Calandrino, J.A., Kilzer, A., Narayanan, A., Felten, E.W., Shmatikov, V.: You might also like: privacy risks of collaborative filtering. In: IEEE Symposium on Security and Privacy, pp. 231–246 (2011)

    Google Scholar 

  11. Salton, G., McGill, M.J.: Introduction to modern information retrieval. McGraw-Hill (1986)

    Google Scholar 

  12. Tan, P.-N., Steinbach, M., Kumar, V., Grover, R., Vriens, M., Grover, R.E., Vriens, M.E.: Introduction to Data Mining. Journal of School Psychology 19(1), 51–56 (2005)

    Google Scholar 

  13. Kamahara, J., Asakawa, T., Shimojo, S., Miyahara, H.: A community-based recommendation system to reveal unexpected interests. In: Proceedings of the 11th International Multimedia Modelling Conference, Washington, DC, USA, pp. 433–438 (2005)

    Google Scholar 

  14. Baeza-Yates, R., Ribeiro-Neto, B.: Modern Information Retrieval, pp. 28–30. Addison Wesley (1999)

    Google Scholar 

  15. Golbeck, J., Hendler, J.: FilmTrust: movie recommendations using trust in web-based social networks. In: Proceedings of 3rd IEEE Consumer Communications and Networking Conference, vol. 1, pp. 282–286 (2006)

    Google Scholar 

  16. Zhou, B., Pei, J.: Preserving Privacy in Social Networks Against Neighborhood Attacks. In: 2008 IEEE 24th International Conference on Data Engineering, pp. 506–515 (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kim, C., Jung, K., Park, S. (2013). A Method of Pre-detecting Privacy Leak in Social Network Service Using Collaborative Filtering. In: Hong, B., Meng, X., Chen, L., Winiwarter, W., Song, W. (eds) Database Systems for Advanced Applications. DASFAA 2013. Lecture Notes in Computer Science, vol 7827. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-40270-8_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-40270-8_13

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-40269-2

  • Online ISBN: 978-3-642-40270-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics