skip to main content
10.1145/1526709.1526781acmconferencesArticle/Chapter ViewAbstractPublication PageswwwConference Proceedingsconference-collections
research-article

To join or not to join: the illusion of privacy in social networks with mixed public and private user profiles

Published:20 April 2009Publication History

ABSTRACT

In order to address privacy concerns, many social media websites allow users to hide their personal profiles from the public. In this work, we show how an adversary can exploit an online social network with a mixture of public and private user profiles to predict the private attributes of users. We map this problem to a relational classification problem and we propose practical models that use friendship and group membership information (which is often not hidden) to infer sensitive attributes. The key novel idea is that in addition to friendship links, groups can be carriers of significant information. We show that on several well-known social media sites, we can easily and accurately recover the information of private-profile users. To the best of our knowledge, this is the first work that uses link-based and group-based classification to study privacy implications in social networks with mixed public and private user profiles.

References

  1. G. Aggarwal, T. Feder, K. Kenthapadi, R. Motwani, R. Panigrahy, D. Thomas, and A. Zhu. Approximation algorithms for k--anonimity. JPT, Nov. 2005.Google ScholarGoogle Scholar
  2. E. Airoldi, D. Blei, S. Fienberg, and E. Xing. Mixed-membership stochastic blockmodels. JMLR, 9:1981--2014, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. L. Backstrom, C. Dwork, and J. Kleinberg. Wherefore art thou r3579x: anonymized social networks, hidden patterns, and struct. steganography. In WWW, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. D. Baldassarri and A. Gelman. Partisans without constraint: Political polarization and trends in american public opinion. American Journal of Sociology, 114(2):408--446, September 2008.Google ScholarGoogle ScholarCross RefCross Ref
  5. R. Bayardo and R. Agrawal. Data privacy through optimal k-anonymization. In ICDE, April 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. C. Dwork. Differential privacy. In ICALP, 2006. L. Getoor and B. Taskar, editors. Introduction to statistical relational learning. MIT Press, 2007.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. M. Hay, G. Miklau, D. Jensen, and D. Towsley. Resisting structural identification in anonymized social networks. In VLDB, August 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. J. He, W. Chu, and Z. Liu. Inferring privacy information from social networks. In ISI, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. K. Lewis, J. Kaufman, M. Gonzalez, A. Wimmer, and N. Christakis. Tastes, ties, and time. hd l:1902.1/11827.Google ScholarGoogle Scholar
  10. N. Li, T. Li, and S. Venkatasubramanian. t-closeness: Privacy beyond k-anon. and l-diversity. In ICDE, 2007.Google ScholarGoogle ScholarCross RefCross Ref
  11. D. Liben-Nowell, J. Novak, R. Kumar, P. Raghavan, and A. Tomkins. Geographic routing in social networks. PNAS, 102(33):11623--11628, August 2005.Google ScholarGoogle ScholarCross RefCross Ref
  12. J. Lindamood, R. Heatherly, M. Kantarcioglu, and B. Thuraisingham. Inferring private information using social network data. In WWW Poster, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. H. Liu and L. Yu. Toward integrating feature selection algorithms for classification and clustering. TKDE, 17(4):491--502, April 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. K. Liu and E. Terzi. Towards identity anonymization on graphs. In SIGMOD, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. A. Machanava jjhala, J. Gehrke, D. Kifer, and M. Venkitasubramaniam. l-diversity: Privacy beyond k-anonymity. In ICDE, 2006.Google ScholarGoogle Scholar
  16. S. Macskassy and F. Provost. Classification in networked data: A toolkit and a univariate case study. JMLR, 8:935--983, May 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. A. Narayanan and V. Shmatikov. Robust de-anonymization of large sparse datasets. S&P, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. M. E. Nergiz and C. Clifton. Multirelational k-anonymity. In ICDE, April 2007.Google ScholarGoogle ScholarCross RefCross Ref
  19. J. Neville and D. Jensen. Leveraging relational autocorrelation with latent group models. In ICDM, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. P. Sen, G. M. Namata, M. Bilgic, L. Getoor, B. Gallagher, and T. Eliassi--Rad. Collective classification in network data. Technical Report CS-TR-4905, Univ. of Maryland, 2008.Google ScholarGoogle ScholarCross RefCross Ref
  21. L. Sweeney. Achieving k-anonymity privacy protection using generalization and suppression. IJU, 10(5), 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. I. Tsochantaridis, T. Hofmann, T. Joachims, and Y. Altun. Support vector learning for interdependent and structured output spaces. ICML, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Y. Wang and G. Wong. Stochastic blockmodels for directed graphs. JASA, 1987.Google ScholarGoogle ScholarCross RefCross Ref
  24. E. Zheleva and L. Getoor. Preserving the privacy of sensitive relationships in graph data. PinKDD, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. To join or not to join: the illusion of privacy in social networks with mixed public and private user profiles

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      WWW '09: Proceedings of the 18th international conference on World wide web
      April 2009
      1280 pages
      ISBN:9781605584874
      DOI:10.1145/1526709

      Copyright © 2009 IW3C2 org

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 20 April 2009

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate1,899of8,196submissions,23%

      Upcoming Conference

      WWW '24
      The ACM Web Conference 2024
      May 13 - 17, 2024
      Singapore , Singapore

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader