A Review of Several Privacy Violation Measures for Large Networks under Active Attacks

Tanima Chatterjee, Nasim Mobasheri, B. Dasgupta
{"title":"A Review of Several Privacy Violation Measures for Large Networks under Active Attacks","authors":"Tanima Chatterjee, Nasim Mobasheri, B. Dasgupta","doi":"10.5772/intechopen.90909","DOIUrl":null,"url":null,"abstract":"It is by now a standard practice to use the concepts and terminologies of network science to analyze social networks of interconnections between people such as Facebook, Twitter and LinkedIn. The powers and implications of such social network analysis are indeed indisputable; for example, such analysis may uncover previously unknown knowledge on community-based involvements, media usages and individual engagements. However, all these benefits are not necessarily cost-free since a malicious individual could compromise privacy of users of these social networks for harmful purposes that may result in the disclosure of sensitive data that may be linked to its users. A natural way to avoid this consists of an “ anonymization process ” of the relevant social network. However, since such anonymization processes may not always succeed, an important research goal is to quantify and measure how much privacy a given social network can achieve. Toward this goal, some recent research works have aimed at evaluating the resistance of a social network against active privacy-violating attacks by introducing and studying a new and meaningful privacy measure for social networks. In this chapter, we review both theoretical and empirical aspects of such privacy violation measures of large networks under active attacks.","PeriodicalId":143303,"journal":{"name":"Security and Privacy From a Legal, Ethical, and Technical Perspective","volume":"10 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Security and Privacy From a Legal, Ethical, and Technical Perspective","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.5772/intechopen.90909","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

It is by now a standard practice to use the concepts and terminologies of network science to analyze social networks of interconnections between people such as Facebook, Twitter and LinkedIn. The powers and implications of such social network analysis are indeed indisputable; for example, such analysis may uncover previously unknown knowledge on community-based involvements, media usages and individual engagements. However, all these benefits are not necessarily cost-free since a malicious individual could compromise privacy of users of these social networks for harmful purposes that may result in the disclosure of sensitive data that may be linked to its users. A natural way to avoid this consists of an “ anonymization process ” of the relevant social network. However, since such anonymization processes may not always succeed, an important research goal is to quantify and measure how much privacy a given social network can achieve. Toward this goal, some recent research works have aimed at evaluating the resistance of a social network against active privacy-violating attacks by introducing and studying a new and meaningful privacy measure for social networks. In this chapter, we review both theoretical and empirical aspects of such privacy violation measures of large networks under active attacks.
主动攻击下几种大型网络隐私侵犯措施综述
目前,使用网络科学的概念和术语来分析人们之间相互联系的社交网络(如Facebook、Twitter和LinkedIn)已成为一种标准做法。这种社会网络分析的力量和影响确实是无可争辩的;例如,这种分析可能揭示以前未知的关于社区参与、媒体使用和个人参与的知识。然而,所有这些好处并不一定是没有成本的,因为恶意的个人可能会出于有害的目的损害这些社交网络用户的隐私,从而可能导致与其用户相关的敏感数据泄露。避免这种情况的一种自然方法是对相关社交网络进行“匿名化处理”。然而,由于这种匿名化过程可能并不总是成功,一个重要的研究目标是量化和衡量一个给定的社交网络可以实现多少隐私。为了实现这一目标,最近的一些研究工作旨在通过引入和研究一种新的有意义的社交网络隐私措施来评估社交网络对主动侵犯隐私攻击的抵抗力。在本章中,我们回顾了主动攻击下大型网络隐私侵犯措施的理论和实证方面。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信