Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

Secure collaborative social networks

Published: 01 November 2010 Publication History

Abstract

A social network is the mapping and measuring of relationships and flows between individuals, groups, organizations, computers, websites, and other information/knowledge processing entities. The nodes in the network are the people and groups, while the links show relationships or flows between the nodes. Social networks provide both a visual and a mathematical analysis of relationships. Social network has been researched for a while. However, to our best knowledge, privacy-preserving social networks have not been well explored. In this paper, we would like to address how to build up a social network involving multiple parties. Data collection is a necessary step in the social-network-construction process. Due to privacy reasons, collecting data from different parties becomes difficult and these concerns may prevent the parties from directly sharing the data. How multiple parties collaboratively construct a social network without breaching data privacy presents a challenge. The objective of this paper is to provide a solution for privacy-preserving collaborative social-network problem.

References

[1]
L. Adamic and E. Adar, "How to search a social network," Soc. Netw., vol. 27, no. 3, pp. 187-203, 2005.
[2]
M. Annavaram, Q. Jacobson, and J. Shen. (2009). Hongout: A privacy preserving location based social networking service. {Online}. Available: http://ceng.usc.edu/assets/001/58350.pdf
[3]
V. Balasubramaniyan, Y. Lee, and M. Ahamad, "Privacy preserving grapevines: Capturing social network interactions using delegatable anonymous credentials," School Comput. Sci., Georgia Inst. Technol., Arlington, VA, Tech. Rep. GT-CS-09-12, 2009.
[4]
G. Blosser and J. Zhan, "Privacy-preserving social networks," presented at the IEEE Int. Conf. Inf. Secur. Assur. (ISA), Busan, Korea, Apr. 24-26, 2008.
[5]
D. Chaum, "Security without identification," Commun. ACM, vol. 28, no. 10, pp. 1030-1044, Oct. 1985.
[6]
L. Cutillo, R. Molva, and T. Strufe, "Privacy preserving social networking through decentralization. in Proc. Sixth Int. Conf. Wireless On-Demand Netw. Syst. Serv., 2009, pp. 145-152.
[7]
Epic. (2003, May). Privacy and human rights an international survey of privacy laws and developments {Online}. Electronic Privacy Information Center, Washington, DC. Available: www.epic.org
[8]
A. Felt and D. Evans, "Privacy protection for social networking apis," presented at the Workshop on WEB 2.0 Security and Privacy (W2SP), Oakland, CA, 2008.
[9]
O. Goldreich, The Foundations of Cryptography. Cambridge, U.K.: Cambridge Univ. Press, 2004.
[10]
S. Goldwasser and S. Micali, "Probabilistic encryption and how to play mental poker keeping secret all partial information," in Proc. Annu. ACM Symp. Theory Comput. Arch., San Francisco, CA, 1982, pp. 365-377.
[11]
S. Guha, K. Tang, and P. Francis, "Noyb: Privacy in online social networks," presented at the First ACM SIGCOMM Workshop Online Soc. Netw., Seattle, WA, Aug. 2008.
[12]
M. Hay, G. Miklau, and D. Jensen, "Anonymizing social networks," Dept. Comput. Sci., Univ. Massachusetts, Amherst, MA, Tech. Rep. 07-19, Mar. 2007.
[13]
F. Kerschbaum and A. Schaad, "Privacy-preserving social network analysis for criminal investigations," in Proc. 7th ACM Workshop Privacy Electron. Soc., 2008, pp. 9-14.
[14]
L. Liu, J. Wang, J. Liu, and J. Zhang, "Privacy preserving in social networks against sensitive edge-disclosure," Dept. Comput. Sci., Univ. Kentucky, Lexington, KY, Tech. Rep. CMIDA-HiPSCCS006-08, 2008.
[15]
B. Luo and D. Lee, "On protecting private information in social networks: A proposal," in Proc. IEEE Int. Conf. Data Eng., 2009, pp. 1603-1606.
[16]
G. Mezzour, A. Perrig, V. Gligor, and P. Papadimitratos, "Privacy-preserving relationship path discovery in social networks," in Proc. 8th Int. Conf. Cryptol. Netw. Secur. (CANS), Dec. 2009, pp. 189-208.
[17]
P. Paillier, "Public-key cryptosystems based on composite degree residuosity classes," in Proc. Adv. Cryptography (EUROCRYPT), Prague, Czech Republic, 1999, pp. 223-238.
[18]
R. A. DeMillo, R. Rivest, L. Adleman, and M. Dertouzos, "On data banks and privacy homomorphisms," in Proc. Foundations Secure Comput. R. A. DeMillo et al., Eds. San Francisco, CA: Academic, 1978, pp. 169-179.
[19]
L. Singh and J. Zhan, "Measuring topological anonymity in social networks," presented at the IEEE Int. Conf. Granular Comput., Silicon Valley, CA, Nov. 2-4, 2007.
[20]
D. Wang, C. Liau, and T. Hsu, "Privacy protection in social network data disclosure based on granular computing," presented at the IEEE Int. Conf. Fuzzy Syst., Vancouver, BC, Canada, Jul. 16-21, 2006.
[21]
X. He, J. Vaidya, B. Shafiq, N. Adam, and V. Atluri, "Preserving privacy in social networks: A structure-aware approach," in Proc. IEEE/WIC/ACM Int. Conf. Web Intell., 2009, vol. 1, pp. 647-654.
[22]
J. Zhan, G. Blosser, C. Yang, and L. Singh, "Privacy-preserving collaborative social networks," in Lecture Notes in Computer Science, 2009, vol. 5075, pp. 114-125.
[23]
Z. Zhan, "Privacy preserving collaborative data mining," Ph.D. thesis, Univ. Ottawa, Ottawa, ON, Canada, 2006.
[24]
B. Zhou and J. Pei, "Preserving privacy in social networks against neighborhood attacks," presented at the 24th Int. Conf. Data Eng. (ICDE), Cancúun, Meéxico, Apr. 7-12, 2008.

Cited By

View all
  • (2022)A new method research for knowledge-match and trust-based large-scale group decision making with incomplete information contextJournal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology10.3233/JIFS-21256943:4(4037-4060)Online publication date: 1-Jan-2022
  • (2019)Hand Gesture Recognition with Convolution Neural Networks2019 IEEE 20th International Conference on Information Reuse and Integration for Data Science (IRI)10.1109/IRI.2019.00054(295-298)Online publication date: 30-Jul-2019
  • (2016)Anti-disturbance tracking control for systems with nonlinear disturbances using T-S fuzzy modelingNeurocomputing10.1016/j.neucom.2015.07.039171:C(1027-1037)Online publication date: 1-Jan-2016
  • Show More Cited By
  1. Secure collaborative social networks

    Recommendations

    Reviews

    You Chen

    Distributed collaborative information systems allow multiple organizations to share resources. Information sharing or transferring among different organizations is achieved through a collaborative social network. The network is a combination of multiple small social networks, each of which belongs to an organization. The objective of this paper is to construct a collaborative social network that transfers accurate information among multiple small networks, without disclosing the private structures of the small networks. This is comparable to building a backbone router to share information among multiple branch routers, without revealing any private structures of the branch router. The author proposes a privacy-preserving protocol for collaborative social network construction that also considers the accuracy of the shared information. The author shows that the constructed collaborative social network achieves a good balance between privacy risk and information utility. The goal of the protocol is to decide whether or not to keep the edge between two nodes (persons) by comparing the total communication count with the given threshold (in this paper, 500). The count is the private data a party wants to protect. Assuming there are n parties, and that the total count of the n parties is more than 500, then the edge between these two nodes will be kept. The protocol consists of four steps: (1) A party P 1 generates a cryptographic key pair ( e , d ) by using a homomorphic encryption scheme; e represents the encryption scheme and d represents private data. (2) " P 1 sends P 2 the encryption of the private value that is masked by a digital envelope." (3) " P 2 computes the multiplication between the received term and the encryption of the masked private value by another digital envelope." (4) Repeat until P 1 and P n collaboratively obtain the result of whether the total count is more than a threshold T or not. The time complexity of the protocol is O (2 ( n + k )), where is the total bytes for each communication, n is the total number of parties, and k is the total number of random integer numbers in step four of the protocol. The author verified the proposed protocol's performances on the Enron email dataset and a research article dataset. There are three different experiments. The first focuses on how the percentage of the whole dataset influences the time complexity of the protocol. The second focuses on how the number of parties influences the time complexity and communication cost of the protocol. The third focuses on how the total number of random integer numbers used in step four of the protocol influences the time complexity and probability for the "advantage of one party to gain the other party's private data." The experimental results of both datasets show that both time complexity and communication costs increase with the number of parties, data size, and the total number of random integer numbers. The probability of the advantage that each party can gain the information about other parties is very small on both datasets, which indicates that the proposed protocol can efficiently protect private information. The paper has some limitations. Perhaps the most important is that although "the total weighted count of communications between two nodes" is an important notation in the proposed protocol, its definition is not clear. Furthermore, the author does not clarify the relation between this communication count and the local weighted count of a party, which is referred to as the private data that a party wants to protect. Also, there are some issues with the experiments' datasets. For instance, the author lists that there are 150 users and 192,829 edges in the Enron email dataset. However, for a directed graph, given 150 nodes, the maximum number of edges is 150*(150-1), which is less than 192,829. In the research article dataset, the author claims that edges with a weight of less than 20 were removed from the dataset; however, this somewhat high threshold of 20 will make the new dataset very small, which may not be appropriate for a protocol study. Online Computing Reviews Service

    Access critical reviews of Computing literature here

    Become a reviewer for Computing Reviews.

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
    IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews  Volume 40, Issue 6
    November 2010
    96 pages

    Publisher

    IEEE Press

    Publication History

    Published: 01 November 2010
    Accepted: 30 March 2010
    Revised: 31 December 2009
    Received: 07 January 2009

    Author Tags

    1. Privacy
    2. privacy
    3. security
    4. social networks

    Qualifiers

    • Research-article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 14 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2022)A new method research for knowledge-match and trust-based large-scale group decision making with incomplete information contextJournal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology10.3233/JIFS-21256943:4(4037-4060)Online publication date: 1-Jan-2022
    • (2019)Hand Gesture Recognition with Convolution Neural Networks2019 IEEE 20th International Conference on Information Reuse and Integration for Data Science (IRI)10.1109/IRI.2019.00054(295-298)Online publication date: 30-Jul-2019
    • (2016)Anti-disturbance tracking control for systems with nonlinear disturbances using T-S fuzzy modelingNeurocomputing10.1016/j.neucom.2015.07.039171:C(1027-1037)Online publication date: 1-Jan-2016
    • (2014)A context-aware multimedia framework toward personal social network servicesMultimedia Tools and Applications10.1007/s11042-012-1302-y71:3(1717-1747)Online publication date: 1-Aug-2014

    View Options

    View options

    Get Access

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media