Privacy Preservation in Online Social Networks Using Graph-Attribute-Driven Optimal Clustering Algorithm
Keywords:
Privacy preservation, online social networks, Sensitive information, Risk mitigation, anonymization degree, information loss and execution time.Abstract
The surge in global online social network (OSN) users, especially post-COVID-19, has made it an integral part of daily life. As more rely on social networks, there's an increasing demand for privacy protection because these platforms store sensitive user information. This creates risks of potential intruders trying to access and misuse that information. The research aims to create a method for safeguarding privacy in OSN, minimizing the risk of sensitive information leaks, reducing processing time, and achieving high-level privacy preservation with minimal information loss (IL). The outcomes show that, in terms of privacy preservation, the suggested strategy performs better than cutting-edge techniques. The metrics employed, including anonymization degree, IL, and execution time (ET), demonstrate the high-level effectiveness of the proposed approach in achieving the specified privacy goals. The proposed approach effectively anonymizes OSNs through Graph-Attribute-Driven Optimal Clustering Algorithm (GADOCA); the research offers a practical solution to the ongoing challenges in ensuring k-anonymity, l-diversity, and t-closeness. The evaluation against real-world data adds credibility to the proposed method, emphasizing its potential to enhance privacy preservation in OSNs and contribute to the broader field of information security.
Downloads
References
Wani, M.A., Agarwal, N., and Bours, P., “Impact of unreliable content on social media users during COVID-19 and stance detection system”. Electronics, 10(1), pp.5, (2020). https://doi.org/10.3390/electronics10010005
Fire, M., Goldschmidt, R., and Elovici, Y., “Online social networks: threats and solutions”. IEEE Communications Surveys & Tutorials, 16(4), 2019-2036 (2024). DOI: 10.1109/COMST.2014.2321628.
Jain, A. K., Sahoo, S. R., and Kaubiyal, J., “Online social networks security and privacy”. comprehensive review and analysis. Complex & Intelligent Systems, 7(5), pp.2157-2177, (2021). https://doi.org/10.1007/s40747-021-00409-7
Wei, R., Tian, H., and Shen, H., “Improving k-anonymity based privacy preservation for collaborative filtering”. Computers & Electrical Engineering, 67, pp.509-519, (2018). https://doi.org/10.1016/j.compeleceng.2018.02.017
Temuujin, O., Ahn, J., and Im, D. H., “Efficient L-diversity algorithm for preserving privacy of dynamically published datasets”. IEEE Access, 7, pp.122878-122888, (2019). DOI: 10.1109/ACCESS.2019.2936301
Sathiya Devi, S., and Indhumathi, R., “A study on privacy-preserving approaches in online social network for data publishing”. In Data Management, Analytics and Innovation: Proceedings of ICDMAI 2018, 1, pp. 99-115, Springer Singapore, (2019). https://doi.org/10.1007/978-981-13-1402-5_8
Pan, X., and Hamilton, A. F. D. C., “Why and how to use virtual reality to study human social interaction: The challenges of exploring a new research landscape”. British Journal of Psychology, 109(3), pp. 395-417, (2018). https://doi.org/10.1111/bjop.12290
Papaioannou, M., Karageorgou, M., Mantas, G., Sucasas, V., Essop, I., Rodriguez, J., and Lymberopoulos, D., “A survey on security threats and countermeasures in internet of medical things (IoMT)”. Transactions on Emerging Telecommunications Technologies, 33(6), pp.e4049, (2022). https://doi.org/10.1002/ett.4049
Tripathy, B. K., Sishodia, M. S., Jain, S., and Mitra, A., “Privacy and anonymization in social networks”. Social Networking: Mining, Visualization, and Security, pp.243-270, (2014). https://doi.org/10.1007/978-3-319-05164-2_10
Zhang, J., Chen, B., Zhao, Y., Cheng, X., and Hu, F., “Data security and privacy-preserving in edge computing paradigm: Survey and open issues”. IEEE access, 6, pp.18209-18237, (2018). DOI: 10.1109/ACCESS.2018.2820162
Tu, Z., Zhao, K., Xu, F., Li, Y., Su, L., and Jin, D., “Protecting trajectory from semantic attack considering ${k} $-anonymity, ${l} $-diversity, and ${t} $-closeness”. IEEE Transactions on Network and Service Management, 16(1), pp.264-278, (2018). DOI: 10.1109/TNSM.2018.2877790
Oishi, K., Tahara, Y., Sei, Y., and Ohsuga, A., “Proposal of l-diversity algorithm considering distance between sensitive attribute values”. In 2017 IEEE Symposium Series on Computational Intelligence (SSCI) pp. 1-8, (2017). IEEE. DOI: 10.1109/SSCI.2017.8280973
Mauger, C., Mahec, G. L., and Dequen, G., “Multi-criteria Optimization Using l-diversity and t-closeness for k-anonymization”. In Data Privacy Management, Cryptocurrencies and Blockchain Technology: ESORICS 2020 International Workshops, DPM 2020 and CBT 2020, Guildford, UK, September pp. 17–18, 2020, Revised Selected Papers 15, pp. 73-88. Springer International Publishing (2020). https://doi.org/10.1007/978-3-030-66172-4_5
Sei, Y., Okumura, H., Takenouchi, T., and Ohsuga, A., “Anonymization of sensitive quasi-identifiers for l-diversity and t-closeness”. IEEE transactions on dependable and secure computing, 16(4), pp. 580-593 (2017). DOI: 10.1109/TDSC.2017.2698472
Mortazavi, R., and Erfani, S. H., “GRAM: An efficient (k, l) graph anonymization method”. Expert Systems with Applications, 153, pp.113454, (2020). https://doi.org/10.1016/j.eswa.2020.113454
Domingo-Ferrer, J., Sánchez, D., and Soria-Comas, J., “Beyond k-Anonymity: l-Diversity and t-Closeness”. In Database Anonymization: Privacy Models, Data Utility, and Microaggregation-based Inter-model Connections, pp. 47-51, Cham: Springer International Publishing 2016. https://doi.org/10.1007/978-3-031-02347-7_6
Kaushik, P., and Tayde, V. D., “Data Privacy in Hadoop Using Anonymization and T-Closeness”. In Smart and Innovative Trends in Next Generation Computing Technologies: Third International Conference, NGCT 2017, Dehradun, India, October 30-31, 2017, Revised Selected Papers, Part II 3, pp. 459-468.,Springer Singapore (2018). https://doi.org/10.1007/978-981-10-8660-1_35
Gangarde, R., Sharma, A., Pawar, A., Joshi, R., and Gonge, S., “Privacy preservation in online social networks using multiple-graph-properties-based clustering to ensure k-anonymity, l-diversity, and t-closeness”. Electronics, 10(22), pp.2877, (2021). https://doi.org/10.3390/electronics10222877
Singh, A., & Singh, M., “Social Networks Privacy Preservation: A Novel Framework”. Cybernetics and Systems, pp.1-32, (2022). https://doi.org/10.1080/01969722.2022.2151966
Gangarde, R., Shrivastava, D., Sharma, A., Tandon, T., Pawar, A., and Garg, R., “Data anonymization to balance privacy and utility of online social media network data”. Journal of Discrete Mathematical Sciences and Cryptography, 25(3), pp.829-838, (2022). https://doi.org/10.1080/09720529.2021.2016225
Mehta, B. B., and Rao, U. P., “Improved l-diversity: scalable anonymization approach for privacy preserving big data publishing”. Journal of King Saud University-Computer and Information Sciences, 34(4), pp.1423-1430, (2022). https://doi.org/10.1016/j.jksuci.2019.08.006
Siddula, M., Li, Y., Cheng, X., Tian, Z., and Cai, Z., “Anonymization in online social networks based on enhanced equi-cardinal clustering”. IEEE Transactions on Computational Social Systems, 6(4), pp.809-820, (2019). DOI: 10.1109/TCSS.2019.2928324
Jamshidi, M. B., Alibeigi, N., Rabbani, N., Oryani, B., and Lalbakhsh, A., “Artificial neural networks: A powerful tool for cognitive science”. In 2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), pp. 674-679, IEEE (2018). DOI: 10.1109/IEMCON.2018.8615039
Chen, J., Lin, X., Wu, Y., Chen, Y., Zheng, H., Su, M., and Ruan, Z., “Double layered recommendation algorithm based on fast density clustering: Case study on Yelp social networks dataset”. In 2017 International Workshop on Complex Systems and Networks (IWCSN) pp. 242-252, IEEE (2017). DOI: 10.1109/IWCSN.2017.8276534
Domingo-Ferrer, J., Farras, O., Ribes-González, J., and Sánchez, D. “Privacy-preserving cloud computing on sensitive data: A survey of methods, products and challenges”. Computer Communications, 140, pp.38-60, (2019). https://doi.org/10.1016/j.comcom.2019.04.011
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.