資源描述:
《privacy breach analysis in social networks》由會(huì)員上傳分享,免費(fèi)在線閱讀,更多相關(guān)內(nèi)容在工程資料-天天文庫。
1、PrivacyBreachAnalysisinSocialNetworksFrankNagleAbstractThischapteraddressesvariousaspectsofanalyzingprivacybreachesinsocialnetworks.We?rstreviewliteraturethatde?nesthreetypesofprivacybreachesinsocialnetworks:interactive,active,andpassive.Wethensurveythevar-iousnet
2、workanonymizationschemesthathavebeenconstructedtoaddresstheseprivacybreaches.Afterexploringthesebreachesandanonymizationschemes,weevaluateameasurefordeterminingthelevelofanonymityinherentinanetworkgraphbasedonitstopologicalstructure.Finally,weclosebyemphasizingthe
3、dif-?cultyofanonymizingsocialnetworkdatawhilemaintainingusabilityforresearchpurposesandofferingareasforfuturework.KeywordsSocialnetwork·Privacy·Breach·Security·Anonymity1IntroductionOverthepast5–10years,onlinesocialnetworkshaverapidlyexpanded,andasofMarch2012thela
4、rgestonlinesocialnetwork,Facebook,hadover901millionactivemembers.1Thewealthofinformationuserspostintheirsocialnetworkpro-?les,aswellastheunderlyingstructureofthenetworkitself,areappealingdatasetsforresearchersandalluringtargetsforcriminals.Duetotheattractivenessof
5、thesenetworkstobothgroups,researchershaverecentlybeguntostudymethodsforre-leasingthisdatainamannerthatmaintainstheprivacyoftheindividualsinthenetwork.Thischapterpresentsanoverviewofrecentworkinthis?eld.Thedatausersdiscloseintheirpro?lesiswideranging,andincludeseve
6、rythingfromemailaddressesandbirthdaystopoliticalinterestsandphysicaladdress.Twocasestudiesoftheinformationusersreveal[1,23]foundthatapproximately90%ofuserslistapartialorfullbirthdayaswellasanemailaddress.Thesepiecesof1FacebookNewsroomKeyFacts,http://newsroom.fb.co
7、m/content/default.aspx?NewsAreaId=22,accessedMay06,2012.F.Nagle(B)HarvardBusinessSchool,Wyss100,SoldiersField,Boston,MA02163,USAe-mail:fnagle@hbs.eduT.?zyeretal.(eds.),MiningSocialNetworksandSecurityInformatics,63LectureNotesinSocialNetworks,DOI10.1007/978-94-007-
8、6359-3_4,?SpringerScience+BusinessMediaDordrecht201364F.Nagleinformationcanbeusedbyanattackertostealtheuser’sidentity.Toallowtheuseofsuchnetworksforacad