Abstract
With the development of Internet technology, service providers can provide users with personalized services to enrich user experience, however, this often requires a large number of users’ private data. Meanwhile, the protection of their private data and the evaluation of the risk of leaked datasets become a matter of great concern to many people. To resolve these issues, in this paper, we develop a machine learning-based approach in online social networks (OSNs) to efficiently correlate the leaked datasets and accurately learn millions of users’ confidential information. Moreover, a trust evaluation model is developed in OSNs to identify malicious service providers and secure users’ social activities via direct trust computing and indirect trust computing. Extensive experiments are conducted by using real-world leaked datasets, and the results show that the efficiency and effectiveness of the proposed approach in terms of user privacy protection and accuracy of privacy leakage evaluation.
Similar content being viewed by others
References
Bell R, Koren Y, Volinsky C (2007) Modeling relationships at multiple scales to improve accuracy of large recommender systems. In: Proceedings of ACM SIGKDD
Bonneau J (2012) The science of guessing: analyzing an anonymized corpus of 70 million passwords. In: IEEE Symposium on security and privacy
Bonneau J, Herley C, Oorschot PCv, Stajano F (2012) The quest to replace passwords: a framework for comparative evaluation of web authentication schemes. In: IEEE Symposium on security and privacy
de Carné de Carnavalet X, Mannan M (2014) From very weak to very strong: analyzing password-strength meters. In: Proceedings of NDSS
Castelluccia C, Abdelberi C, Dürmuth M, Perito D (2013) When privacy meets security: leveraging personal information for password cracking. arXiv:1304.6584
Wang Y, Su Z, Xu Q, Yang T, Zhang N (2019) A novel charging scheme for electric vehicles with smart communities in vehicular networks. In: IEEE Transactions on Vehicular Technology
Castelluccia C, Dürmuth M., Perito D (2012) Adaptive password-strength meters from markov models. In: Proceedings of NDSS
Das A, Bonneau J, Caesar M, Borisov N, Wang X (2014) The tangled web of password reuse. In: Proceedings of NDSS
Li Z, Han W, Xu W (2014) A large-scale empirical analysis on chinese web passwords. In: Proceedings of USENIX security symposium
You Z, Han X, Lü L., Yeung CH (2015) Empirical studies on the network of social groups: the case of tencent QQ. PLoS ONE 10(7)
Gu Y, Zhang X, Liu Z, Ren F (2019) BeSense: leveraging WiFi channel data and computational intelligence for behavior analysis. In: IEEE Computational intelligence magazine
Hu H, Liu Z, An J (2020) Mining mobile intelligence for wireless systems: a deep neural network approach. In: IEEE Computational intelligence magazine
Dey R, Tang C, Ross KW, Saxena N (2012) Estimating age privacy leakage in online social networks. In: Proceedings of IEEE INFOCOM
Gundecha P, Barbier G, Liu H (2011) Exploiting vulnerability to secure user privacy on a social networking site. In: Proceedings of ACM SIGKDD
Su Z, Wang Y, Xu Q, Fei M, Tian Y, Zhang N (2019) A secure charging scheme for electric vehicles with smart communities in energy blockchain. In: IEEE Internet of things journal
Liu Y, Gummadi KP, Krishnamurthy B, Mislove A (2011) Analyzing facebook privacy settings: user expectations vs. reality. In: Proceedings of ACM SIGCOMM IMC
Zheleva E, Getoor L (2009) To join or not to join: the illusion of privacy in social networks with mixed public and private user profiles. In: Proceedings of WWW
Wang Y, Su Z, Zhang N, Benslimane A (2020) Learning in the air: secure federated learning for UAV-assisted crowdsensing. In: IEEE Transactions on network science and engineering
Wang Y, Su Z, Zhang N (2019) BSIS: blockchain-based secure incentive scheme for energy delivery in vehicular energy network. In: IEEE Transactions on industrial informatics
Li Y, Peng Y, Zhang Z, Yin H, Xu Q. (2019) Matching user accounts across social networks based on username and display name. In: Proceedings of WWW
Oktay H, Firat A, Ertem Z (2014) Demographic breakdown of twitter users: an analysis based on names. In: Proceedings of ASE BIGDATA/SOCIALCOM/CYBERSECURITY
Nguyen D, Gravel R, Trieschnigg D, Meder T (2013) How old do you think i am?; a study of language and age in twitter. In: Proceedings of ICWSM
Liao L, Jiang J, Lim E-P, Huang H (2014) A study of age gaps between online friends. In: Proceedings of HT
Chen X, et al. (2020) Age of information aware radio resource management in vehicular networks: a proactive deep reinforcement learning perspective. In: IEEE Transactions on wireless communications
Zhang J, Hu X, Zhang Y, Liu H (2016) Your age is no secret: inferring microbloggers’ ages via content and interaction analysis. In: Proceedings of AAAI
Ma H, King I, Lyu MR (2009) Learning to recommend with social trust ensemble. In: Proceedings of ACM SIGIR
Yang X, Steck H, Liu Y (2012) Circle-based recommendation in online social networks. In: Proceedings of ACM SIGKDD
Wang X, Donaldson R, Nell C, Gorniak P, Ester M, Bu J (2016) Recommending groups to users using user-group engagement and time-dependent matrix factorization. In: AAAI
Wang X, Hoi SCH, Ester M, Bu J, Chen C (2017) Learning personalized preference of strong and weak ties for social recommendation. In: WWW
Wang X, Zhu W, Liu C (2019) Social recommendation with optimal limited attention. In: ACM SIGKDD
Zhu L, Galstyan A, Cheng J, Lerman K (2014) Tripartite graph clustering for dynamic sentiment analysis on social media. In: Proceedings of ACM SIGMOD
Iyer RR, Chen J, Sun H, Xu K (2019) A heterogeneous graphical model to understand user-level sentiments in social media. arXiv:https://arxiv.org/abs/1912.07911
Deng H, Han J, Ji H, Li H, Lu Y, Wang H (2013) Exploring and inferring user-user pseudo-friendship for sentiment analysis with heterogeneous networks. In: Proceedings of SIAM ICDM
Tan C, Lee L, Tang J, Jiang L, Zhou M, Li P (2011) User-level sentiment analysis incorporating social networks. In: Proceedings of ACM SIGKDD
Wang D, Zhang Z, Wang P, Yan J, Huang X (2016) Targeted online password guessing: an underestimated threat. In: Proc ACM CCS
Liu B, Sun X, Ni Z, Cao J, Luo J, Liu B, Fu X. (2020) Co-Detection of crowdturfing microblogs and spammers in online social networks. In: Proceedings of WWW
Hu X, Tang J, Gao H, Liu H (2014) Social spammer detection with sentiment information. In: Proceedings of IEEE ICDM
Song Y, Lu Z, Leung CW, Yang Q (2013) Collaborative boosting for activity classification in microblogs. In: Proceedings of ACM SIGKDD
Ma J, Yang W, Luo M, Li N (2014) A study of probabilistic password models. In: IEEE Symposium on security and privacy
Narayanan A, Shmatikov V (2005) Fast dictionary attacks on passwords using time-space tradeoff. In: Proceedings of ACM CCS
Veras R, Collins C, Thorpe J (2014) On semantic patterns of passwords and their security impact. In: Proceedings of NDSS
Han W, Li Z, Yuan L, Xu W (2016) Regional patterns and vulnerability analysis of chinese web passwords. IEEE Transactions on Information Forensics and Security
Weir M, Aggarwal S, Medeiros B.d., Glodek B. (2009) Password cracking using probabilistic context-free grammars. In: IEEE Symposium on security and privacy
Dell’Amico M, Michiardi P, Roudier Y (2010) Password strength: an empirical analysis. In: Conference on information communications
Ji S, Yang S, Wang T, Liu C, Lee WH, Beyah R (2015) Pars: a uniform and open-source password analysis and research system. In: Proceedings of ACM WSDM
Kelley PG, Komanduri S, Mazurek ML, Shay R, Vidas T, Bauer L, Christin N, Cranor LF, Lopez J (2012) Guess again (and again and again): measuring password strength by simulating password-cracking algorithms. In: IEEE Symposium on security and privacy
Mazurek ML, Komanduri S, Vidas T, Bauer L, Christin N, Cranor LF, Kelley PG, Shay R, Ur B (2013) Measuring password guessability for an entire university. In: Proceedings of ACM CCS
Ur B, Kelley PG, Komanduri S, Lee J, Maass M, Mazurek ML, Passaro T, Shay R, Vidas T, Bauer L, Christin N, Cranor LF (2012) How does your password measure up? The effect of strength meters on password creation. In: USENIX Conference on security symposium
Florêncio D, Herley C (2010) Where do security policies come from?. In: Symposium on usable privacy and security
Wang D, Wang P (2015) The emperor’s new password creation policies: an evaluation of leading web services and the effect of role in resisting against online guessing. In: Proceedings of ESORICS
Weir M, Aggarwal S, Collins M, Stern H (2010) Testing metrics for password creation policies by attacking large sets of revealed passwords. In: Proceedings of ACM CCS
Ji S, Yang S, Hu X, Han W, Li Z, Beyah R (2017) Zero-sum password cracking game a large-scale empirical study on the crackability, correlation, and security of passwords. IEEE TDSC
Wang D, Cheng H, Wang P, Huang X, Jian G (2017) Zipf’s law in passwords. IEEE TIFS.
Li Y, Wang H, Sun K (2016) A study of personal information in human-chosen passwords and its security implications. In: Proc. IEEE INFOCOM
Wang D, Wang P, He D, Tian Y (2019) Birthday, name and bifacial-security: understanding passwords of chinese web users. In: Proceedings of USENIX security symposium
Liu L, Jia H (2015) Trust evaluation via large-scale complex service-oriented online social networks. In: IEEE Transactions on systems, man and cybernetics: systems
Bradbury TN, Karney BR (2019) Intimate relationships
Su Z, Wang Y, Xu Q, Zhang N (2020) LVBS: lightweight vehicular blockchain for secure data sharing in disaster rescue. In: IEEE Transactions on dependable and secure computing
Pearman S, Thomas J, Naeini PE, Habib H, Bauer L, Christin N, Cranor LF, Egelman S, Forget A (2017) Let’s go in for a closer look: observing passwords in their natural habitat. In: ACM CCS
Acknowledgements
The preliminary version of this article has been published in CyberSciTech 2019. This research is supported in part by National Key R&D Program of China (2018YFC0830500), National Natural Science Foundation of China (U1736205, 61603290), Shenzhen Basic Research Grant (JCYJ20170816100819428), Natural Science Basic Research Plan in Shaanxi Province of China (2019JM-159), and Natural Science Basic Research in Zhejiang Province of China (LGG18F020016).
Open Access
This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of Interests
The authors declare that they have no competing interests.
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Yuanming Zhang and Jing Tao contributed equally to this work.
This article belongs to the Topical Collection: Special Issue on Privacy-Preserving Computing
Guest Editors: Kaiping Xue, Zhe Liu, Haojin Zhu, Miao Pan and David S.L. Wei
Rights and permissions
About this article
Cite this article
Zhang, Y., Tao, J., Zhang, S. et al. A machine learning based approach for user privacy preservation in social networks. Peer-to-Peer Netw. Appl. 14, 1596–1607 (2021). https://doi.org/10.1007/s12083-020-01068-0
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12083-020-01068-0