Modeling Privacy Leakage Risks in Large-Scale Social Networks

The current culture that encourages online dating, and interaction makes large-scale social network users vulnerable to miscellaneous personal identifiable information leakage. To this end, we take a first step toward modeling privacy leakages in large-scale social networks from both technical and e...

Full description

Bibliographic Details
Main Authors: Suguo Du, Xiaolong Li, Jinli Zhong, Lu Zhou, Minhui Xue, Haojin Zhu, Limin Sun
Format: Article
Language:English
Published: IEEE 2018-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/8322239/
id doaj-0fefefca21664f72a4852ca6b71cafff
record_format Article
spelling doaj-0fefefca21664f72a4852ca6b71cafff2021-03-29T21:01:50ZengIEEEIEEE Access2169-35362018-01-016176531766510.1109/ACCESS.2018.28181168322239Modeling Privacy Leakage Risks in Large-Scale Social NetworksSuguo Du0Xiaolong Li1Jinli Zhong2Lu Zhou3Minhui Xue4Haojin Zhu5https://orcid.org/0000-0001-5079-4556Limin Sun6Shanghai Jiao Tong University, Shanghai, ChinaShanghai Jiao Tong University, Shanghai, ChinaShanghai Jiao Tong University, Shanghai, ChinaShanghai Jiao Tong University, Shanghai, ChinaNew York University Shanghai, Shanghai, ChinaShanghai Jiao Tong University, Shanghai, ChinaSchool of Cyber Security, University of Chinese Academy of Sciences, Beijing, ChinaThe current culture that encourages online dating, and interaction makes large-scale social network users vulnerable to miscellaneous personal identifiable information leakage. To this end, we take a first step toward modeling privacy leakages in large-scale social networks from both technical and economic perspectives.From a technical perspective, we use Markov chain to propose a dynamic attack-defense tree-based model, which is temporal-aware, to characterize an attack effort made by an attacker and a corresponding countermeasure responded by a social network security defender. From an economic perspective, we use static game theory to analyze the ultimate strategies taken by the attacker and the defender, where both rational participants tend to maximize their utilities, with respect to their attack/defense costs. To validate the proposed approach, we perform extensive experimental evaluations on three realworld data sets, triggered by the survey of over 300 volunteers involved, which illuminates the privacy risk management of contemporary social network service providers.https://ieeexplore.ieee.org/document/8322239/Social network servicesData privacyInformation security
collection DOAJ
language English
format Article
sources DOAJ
author Suguo Du
Xiaolong Li
Jinli Zhong
Lu Zhou
Minhui Xue
Haojin Zhu
Limin Sun
spellingShingle Suguo Du
Xiaolong Li
Jinli Zhong
Lu Zhou
Minhui Xue
Haojin Zhu
Limin Sun
Modeling Privacy Leakage Risks in Large-Scale Social Networks
IEEE Access
Social network services
Data privacy
Information security
author_facet Suguo Du
Xiaolong Li
Jinli Zhong
Lu Zhou
Minhui Xue
Haojin Zhu
Limin Sun
author_sort Suguo Du
title Modeling Privacy Leakage Risks in Large-Scale Social Networks
title_short Modeling Privacy Leakage Risks in Large-Scale Social Networks
title_full Modeling Privacy Leakage Risks in Large-Scale Social Networks
title_fullStr Modeling Privacy Leakage Risks in Large-Scale Social Networks
title_full_unstemmed Modeling Privacy Leakage Risks in Large-Scale Social Networks
title_sort modeling privacy leakage risks in large-scale social networks
publisher IEEE
series IEEE Access
issn 2169-3536
publishDate 2018-01-01
description The current culture that encourages online dating, and interaction makes large-scale social network users vulnerable to miscellaneous personal identifiable information leakage. To this end, we take a first step toward modeling privacy leakages in large-scale social networks from both technical and economic perspectives.From a technical perspective, we use Markov chain to propose a dynamic attack-defense tree-based model, which is temporal-aware, to characterize an attack effort made by an attacker and a corresponding countermeasure responded by a social network security defender. From an economic perspective, we use static game theory to analyze the ultimate strategies taken by the attacker and the defender, where both rational participants tend to maximize their utilities, with respect to their attack/defense costs. To validate the proposed approach, we perform extensive experimental evaluations on three realworld data sets, triggered by the survey of over 300 volunteers involved, which illuminates the privacy risk management of contemporary social network service providers.
topic Social network services
Data privacy
Information security
url https://ieeexplore.ieee.org/document/8322239/
work_keys_str_mv AT suguodu modelingprivacyleakagerisksinlargescalesocialnetworks
AT xiaolongli modelingprivacyleakagerisksinlargescalesocialnetworks
AT jinlizhong modelingprivacyleakagerisksinlargescalesocialnetworks
AT luzhou modelingprivacyleakagerisksinlargescalesocialnetworks
AT minhuixue modelingprivacyleakagerisksinlargescalesocialnetworks
AT haojinzhu modelingprivacyleakagerisksinlargescalesocialnetworks
AT liminsun modelingprivacyleakagerisksinlargescalesocialnetworks
_version_ 1724193587619430400