Modeling Privacy Leakage Risks in Large-Scale Social Networks
The current culture that encourages online dating, and interaction makes large-scale social network users vulnerable to miscellaneous personal identifiable information leakage. To this end, we take a first step toward modeling privacy leakages in large-scale social networks from both technical and e...
Main Authors: | , , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2018-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/8322239/ |
id |
doaj-0fefefca21664f72a4852ca6b71cafff |
---|---|
record_format |
Article |
spelling |
doaj-0fefefca21664f72a4852ca6b71cafff2021-03-29T21:01:50ZengIEEEIEEE Access2169-35362018-01-016176531766510.1109/ACCESS.2018.28181168322239Modeling Privacy Leakage Risks in Large-Scale Social NetworksSuguo Du0Xiaolong Li1Jinli Zhong2Lu Zhou3Minhui Xue4Haojin Zhu5https://orcid.org/0000-0001-5079-4556Limin Sun6Shanghai Jiao Tong University, Shanghai, ChinaShanghai Jiao Tong University, Shanghai, ChinaShanghai Jiao Tong University, Shanghai, ChinaShanghai Jiao Tong University, Shanghai, ChinaNew York University Shanghai, Shanghai, ChinaShanghai Jiao Tong University, Shanghai, ChinaSchool of Cyber Security, University of Chinese Academy of Sciences, Beijing, ChinaThe current culture that encourages online dating, and interaction makes large-scale social network users vulnerable to miscellaneous personal identifiable information leakage. To this end, we take a first step toward modeling privacy leakages in large-scale social networks from both technical and economic perspectives.From a technical perspective, we use Markov chain to propose a dynamic attack-defense tree-based model, which is temporal-aware, to characterize an attack effort made by an attacker and a corresponding countermeasure responded by a social network security defender. From an economic perspective, we use static game theory to analyze the ultimate strategies taken by the attacker and the defender, where both rational participants tend to maximize their utilities, with respect to their attack/defense costs. To validate the proposed approach, we perform extensive experimental evaluations on three realworld data sets, triggered by the survey of over 300 volunteers involved, which illuminates the privacy risk management of contemporary social network service providers.https://ieeexplore.ieee.org/document/8322239/Social network servicesData privacyInformation security |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Suguo Du Xiaolong Li Jinli Zhong Lu Zhou Minhui Xue Haojin Zhu Limin Sun |
spellingShingle |
Suguo Du Xiaolong Li Jinli Zhong Lu Zhou Minhui Xue Haojin Zhu Limin Sun Modeling Privacy Leakage Risks in Large-Scale Social Networks IEEE Access Social network services Data privacy Information security |
author_facet |
Suguo Du Xiaolong Li Jinli Zhong Lu Zhou Minhui Xue Haojin Zhu Limin Sun |
author_sort |
Suguo Du |
title |
Modeling Privacy Leakage Risks in Large-Scale Social Networks |
title_short |
Modeling Privacy Leakage Risks in Large-Scale Social Networks |
title_full |
Modeling Privacy Leakage Risks in Large-Scale Social Networks |
title_fullStr |
Modeling Privacy Leakage Risks in Large-Scale Social Networks |
title_full_unstemmed |
Modeling Privacy Leakage Risks in Large-Scale Social Networks |
title_sort |
modeling privacy leakage risks in large-scale social networks |
publisher |
IEEE |
series |
IEEE Access |
issn |
2169-3536 |
publishDate |
2018-01-01 |
description |
The current culture that encourages online dating, and interaction makes large-scale social network users vulnerable to miscellaneous personal identifiable information leakage. To this end, we take a first step toward modeling privacy leakages in large-scale social networks from both technical and economic perspectives.From a technical perspective, we use Markov chain to propose a dynamic attack-defense tree-based model, which is temporal-aware, to characterize an attack effort made by an attacker and a corresponding countermeasure responded by a social network security defender. From an economic perspective, we use static game theory to analyze the ultimate strategies taken by the attacker and the defender, where both rational participants tend to maximize their utilities, with respect to their attack/defense costs. To validate the proposed approach, we perform extensive experimental evaluations on three realworld data sets, triggered by the survey of over 300 volunteers involved, which illuminates the privacy risk management of contemporary social network service providers. |
topic |
Social network services Data privacy Information security |
url |
https://ieeexplore.ieee.org/document/8322239/ |
work_keys_str_mv |
AT suguodu modelingprivacyleakagerisksinlargescalesocialnetworks AT xiaolongli modelingprivacyleakagerisksinlargescalesocialnetworks AT jinlizhong modelingprivacyleakagerisksinlargescalesocialnetworks AT luzhou modelingprivacyleakagerisksinlargescalesocialnetworks AT minhuixue modelingprivacyleakagerisksinlargescalesocialnetworks AT haojinzhu modelingprivacyleakagerisksinlargescalesocialnetworks AT liminsun modelingprivacyleakagerisksinlargescalesocialnetworks |
_version_ |
1724193587619430400 |