Privacy Preservation in Online Social Networks Using Graph-Attribute-Driven Optimal Clustering Algorithm

Authors

  • R. Suresh, A. Devendran, V. N. Rajavarman

Keywords:

Privacy preservation, online social networks, Sensitive information, Risk mitigation, anonymization degree, information loss and execution time.

Abstract

The surge in global online social network (OSN) users, especially post-COVID-19, has made it an integral part of daily life. As more rely on social networks, there's an increasing demand for privacy protection because these platforms store sensitive user information. This creates risks of potential intruders trying to access and misuse that information. The research aims to create a method for safeguarding privacy in OSN, minimizing the risk of sensitive information leaks, reducing processing time, and achieving high-level privacy preservation with minimal information loss (IL). The outcomes show that, in terms of privacy preservation, the suggested strategy performs better than cutting-edge techniques. The metrics employed, including anonymization degree, IL, and execution time (ET), demonstrate the high-level effectiveness of the proposed approach in achieving the specified privacy goals. The proposed approach effectively anonymizes OSNs through Graph-Attribute-Driven Optimal Clustering Algorithm (GADOCA); the research offers a practical solution to the ongoing challenges in ensuring k-anonymity, l-diversity, and t-closeness. The evaluation against real-world data adds credibility to the proposed method, emphasizing its potential to enhance privacy preservation in OSNs and contribute to the broader field of information security.

Downloads

Download data is not yet available.

References

Wani, M.A., Agarwal, N., and Bours, P., “Impact of unreliable content on social media users during COVID-19 and stance detection system”. Electronics, 10(1), pp.5, (2020). https://doi.org/10.3390/electronics10010005

Fire, M., Goldschmidt, R., and Elovici, Y., “Online social networks: threats and solutions”. IEEE Communications Surveys & Tutorials, 16(4), 2019-2036 (2024). DOI: 10.1109/COMST.2014.2321628.

Jain, A. K., Sahoo, S. R., and Kaubiyal, J., “Online social networks security and privacy”. comprehensive review and analysis. Complex & Intelligent Systems, 7(5), pp.2157-2177, (2021). https://doi.org/10.1007/s40747-021-00409-7

Wei, R., Tian, H., and Shen, H., “Improving k-anonymity based privacy preservation for collaborative filtering”. Computers & Electrical Engineering, 67, pp.509-519, (2018). https://doi.org/10.1016/j.compeleceng.2018.02.017

Temuujin, O., Ahn, J., and Im, D. H., “Efficient L-diversity algorithm for preserving privacy of dynamically published datasets”. IEEE Access, 7, pp.122878-122888, (2019). DOI: 10.1109/ACCESS.2019.2936301

Sathiya Devi, S., and Indhumathi, R., “A study on privacy-preserving approaches in online social network for data publishing”. In Data Management, Analytics and Innovation: Proceedings of ICDMAI 2018, 1, pp. 99-115, Springer Singapore, (2019). https://doi.org/10.1007/978-981-13-1402-5_8

Pan, X., and Hamilton, A. F. D. C., “Why and how to use virtual reality to study human social interaction: The challenges of exploring a new research landscape”. British Journal of Psychology, 109(3), pp. 395-417, (2018). https://doi.org/10.1111/bjop.12290

Papaioannou, M., Karageorgou, M., Mantas, G., Sucasas, V., Essop, I., Rodriguez, J., and Lymberopoulos, D., “A survey on security threats and countermeasures in internet of medical things (IoMT)”. Transactions on Emerging Telecommunications Technologies, 33(6), pp.e4049, (2022). https://doi.org/10.1002/ett.4049

Tripathy, B. K., Sishodia, M. S., Jain, S., and Mitra, A., “Privacy and anonymization in social networks”. Social Networking: Mining, Visualization, and Security, pp.243-270, (2014). https://doi.org/10.1007/978-3-319-05164-2_10

Zhang, J., Chen, B., Zhao, Y., Cheng, X., and Hu, F., “Data security and privacy-preserving in edge computing paradigm: Survey and open issues”. IEEE access, 6, pp.18209-18237, (2018). DOI: 10.1109/ACCESS.2018.2820162

Tu, Z., Zhao, K., Xu, F., Li, Y., Su, L., and Jin, D., “Protecting trajectory from semantic attack considering ${k} $-anonymity, ${l} $-diversity, and ${t} $-closeness”. IEEE Transactions on Network and Service Management, 16(1), pp.264-278, (2018). DOI: 10.1109/TNSM.2018.2877790

Oishi, K., Tahara, Y., Sei, Y., and Ohsuga, A., “Proposal of l-diversity algorithm considering distance between sensitive attribute values”. In 2017 IEEE Symposium Series on Computational Intelligence (SSCI) pp. 1-8, (2017). IEEE. DOI: 10.1109/SSCI.2017.8280973

Mauger, C., Mahec, G. L., and Dequen, G., “Multi-criteria Optimization Using l-diversity and t-closeness for k-anonymization”. In Data Privacy Management, Cryptocurrencies and Blockchain Technology: ESORICS 2020 International Workshops, DPM 2020 and CBT 2020, Guildford, UK, September pp. 17–18, 2020, Revised Selected Papers 15, pp. 73-88. Springer International Publishing (2020). https://doi.org/10.1007/978-3-030-66172-4_5

Sei, Y., Okumura, H., Takenouchi, T., and Ohsuga, A., “Anonymization of sensitive quasi-identifiers for l-diversity and t-closeness”. IEEE transactions on dependable and secure computing, 16(4), pp. 580-593 (2017). DOI: 10.1109/TDSC.2017.2698472

Mortazavi, R., and Erfani, S. H., “GRAM: An efficient (k, l) graph anonymization method”. Expert Systems with Applications, 153, pp.113454, (2020). https://doi.org/10.1016/j.eswa.2020.113454

Domingo-Ferrer, J., Sánchez, D., and Soria-Comas, J., “Beyond k-Anonymity: l-Diversity and t-Closeness”. In Database Anonymization: Privacy Models, Data Utility, and Microaggregation-based Inter-model Connections, pp. 47-51, Cham: Springer International Publishing 2016. https://doi.org/10.1007/978-3-031-02347-7_6

Kaushik, P., and Tayde, V. D., “Data Privacy in Hadoop Using Anonymization and T-Closeness”. In Smart and Innovative Trends in Next Generation Computing Technologies: Third International Conference, NGCT 2017, Dehradun, India, October 30-31, 2017, Revised Selected Papers, Part II 3, pp. 459-468.,Springer Singapore (2018). https://doi.org/10.1007/978-981-10-8660-1_35

Gangarde, R., Sharma, A., Pawar, A., Joshi, R., and Gonge, S., “Privacy preservation in online social networks using multiple-graph-properties-based clustering to ensure k-anonymity, l-diversity, and t-closeness”. Electronics, 10(22), pp.2877, (2021). https://doi.org/10.3390/electronics10222877

Singh, A., & Singh, M., “Social Networks Privacy Preservation: A Novel Framework”. Cybernetics and Systems, pp.1-32, (2022). https://doi.org/10.1080/01969722.2022.2151966

Gangarde, R., Shrivastava, D., Sharma, A., Tandon, T., Pawar, A., and Garg, R., “Data anonymization to balance privacy and utility of online social media network data”. Journal of Discrete Mathematical Sciences and Cryptography, 25(3), pp.829-838, (2022). https://doi.org/10.1080/09720529.2021.2016225

Mehta, B. B., and Rao, U. P., “Improved l-diversity: scalable anonymization approach for privacy preserving big data publishing”. Journal of King Saud University-Computer and Information Sciences, 34(4), pp.1423-1430, (2022). https://doi.org/10.1016/j.jksuci.2019.08.006

Siddula, M., Li, Y., Cheng, X., Tian, Z., and Cai, Z., “Anonymization in online social networks based on enhanced equi-cardinal clustering”. IEEE Transactions on Computational Social Systems, 6(4), pp.809-820, (2019). DOI: 10.1109/TCSS.2019.2928324

Jamshidi, M. B., Alibeigi, N., Rabbani, N., Oryani, B., and Lalbakhsh, A., “Artificial neural networks: A powerful tool for cognitive science”. In 2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), pp. 674-679, IEEE (2018). DOI: 10.1109/IEMCON.2018.8615039

Chen, J., Lin, X., Wu, Y., Chen, Y., Zheng, H., Su, M., and Ruan, Z., “Double layered recommendation algorithm based on fast density clustering: Case study on Yelp social networks dataset”. In 2017 International Workshop on Complex Systems and Networks (IWCSN) pp. 242-252, IEEE (2017). DOI: 10.1109/IWCSN.2017.8276534

Domingo-Ferrer, J., Farras, O., Ribes-González, J., and Sánchez, D. “Privacy-preserving cloud computing on sensitive data: A survey of methods, products and challenges”. Computer Communications, 140, pp.38-60, (2019). https://doi.org/10.1016/j.comcom.2019.04.011

Downloads

Published

24.03.2024

How to Cite

A. Devendran, V. N. Rajavarman, . R. S. (2024). Privacy Preservation in Online Social Networks Using Graph-Attribute-Driven Optimal Clustering Algorithm. International Journal of Intelligent Systems and Applications in Engineering, 12(3), 1960–1970. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/5661

Issue

Section

Research Article