Skip to main content

Privacy Threat Analysis of Mobile Social Network Data Publishing

  • Conference paper
  • First Online:
Security and Privacy in Communication Networks (SecureComm 2017)

Abstract

With mobile phones becoming integral part of modern life, the popularity of mobile social networking has tremendously increased over the past few years, bringing with it many benefits but also new trepidations. In particular, privacy issues in mobile social networking has recently become a significant concern. In this paper we present our study on the privacy vulnerability of the mobile social network data publication with emphases on a re-identification and disclosure attacks. We present a new technique for uniquely identifying a targeted individual in the anonymized social network graph and empirically demonstrate the capability of the proposed approach using a very large social network datasets. The results show that the proposed approach can uniquely re-identify a target on anonymized social network data with high success rate.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Teles, A.S., da Silva e Silva, F.J., Endler, M.: Situation-based privacy autonomous management for mobile social networks. Comput. Commun. 107, 75–92 (2017)

    Article  Google Scholar 

  2. Abawajy, J.H., Ninggal, M.I.H., Herawan, T.: Privacy preserving social network data publication. IEEE Commun. Surv. Tutor. 18(3), 1974–1997

    Article  Google Scholar 

  3. Zhang, S., Wang, G., Liu, Q., Abawajy, J.H.: A trajectory privacy-preserving scheme based on query exchange in mobile social networks. Soft Comput. 1–13 (2016)

    Google Scholar 

  4. Ninggal, M.I.H., Abawajy, J.H.: Utility-aware social network graph anonymization. J. Netw. Comput. Appl. 56, 137–148 (2015)

    Article  Google Scholar 

  5. Luo, E., Liu, Q., Abawajy, J.H., Wang, G.: Privacy-preserving multi-hop profile-matching protocol for proximity mobile social networks. Future Gener. Comput. Syst. 68, 222–233 (2017)

    Article  Google Scholar 

  6. Abawajy, J.H., Ninggal, M.I.H., Herawan, T.: Vertex re-identification attack using neighbourhood-pair properties. Concurr. Comput. Pract. Exp. 28(10), 2906–2919 (2016)

    Article  Google Scholar 

  7. Xiao, X., Chen, C., Sangaiah, A.K., Hu, G., Ye, R., Jiang, Y.: CenLocShare: a centralized privacy-preserving location-sharing system for mobile online social networks. Future Gener. Comput. Syst. (2017). https://doi.org/10.1016/j.future.2017.01.035

  8. Ninggal, M.I.H., Abawajy, J.H.: Preserving utility in social network graph anonymization. In: The Proceedings of the 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2013), Melbourne, Australia, 16–18 July 2013, pp. 226–232. IEEE Computer Society (2013). ISBN 978-0-7695-5022-0

    Google Scholar 

  9. Liu, K., Terzi, E.: Towards identity anonymization on graphs. In: Proceedings of the 2008 ACM SIGMOD International Conference on Management of Data, pp. 93–106. Vancouver, Canada (2008)

    Google Scholar 

  10. Ninggal, M.I.H., Abawajy, J.H.: Attack vector analysis and privacy-preserving social network data publishing. In: The Proceedings of the IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2011), Changsha, China, 16–18 November 2011, pp. 847-852. IEEE Computer Society (2013). ISBN 978-1-4577-2135-9

    Google Scholar 

  11. Zhou, B., Pei, J.: The k-anonymity and l-diversity approaches for privacy preservation in social networks against neighborhood attacks. Knowl. Inf. Syst. 28(1), 47–77 (2011)

    Article  Google Scholar 

  12. Ninggal, M.I.H., Abawajy, J.: Privacy threat analysis of social network data. In: Xiang, Y., Cuzzocrea, A., Hobbs, M., Zhou, W. (eds.) ICA3PP 2011. LNCS, vol. 7017, pp. 165–174. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-24669-2_16

    Chapter  Google Scholar 

Download references

Acknowledgement

The help of Maliha Omar is greatly appreciated. Without her support this paper will not come to its present state.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jemal H. Abawajy .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Abawajy, J.H., Ninggal, M.I.H., Aghbari, Z.A., Darem, A.B., Alhashmi, A. (2018). Privacy Threat Analysis of Mobile Social Network Data Publishing. In: Lin, X., Ghorbani, A., Ren, K., Zhu, S., Zhang, A. (eds) Security and Privacy in Communication Networks. SecureComm 2017. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 239. Springer, Cham. https://doi.org/10.1007/978-3-319-78816-6_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-78816-6_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-78815-9

  • Online ISBN: 978-3-319-78816-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics