A privacy-preserving model to control social interaction behaviors in social network sites

Journal of Information Security and Applications - Tập 49 - Trang 102402 - 2019
Sanaz Kavianpour1, Ali Tamimi2, Bharanidharan Shanmugam3
1Abertay University, Dundee, Scotland, United Kingdom
2Washington State University, Pullman, WA, United States
3Charles Darwin University, Darwin, Australia

Tài liệu tham khảo

Gu, 2016, Developing user loyalty for social networking sites: a relational perspective, J Electron Comm Res, 17, 1 Gundecha, 2012, Mining social media: a brief introduction, Tutor Operat Res, 1, 1 Zafarani, 2010, Sentiment propagation in social networks: a case study in livejournal, 413 Beye, 2012, Privacy in online social networks, 87 Kumar, 2014, Online social networks: privacy challenges and proposed security framework for facebook, Int J Soft Comput Eng, 4 Chaabane, 2014, A closer look at third-party osn applications: are they leaking your personal information?, 235 Pallis, 2011, Online social networks: status and trends, 213 Egelman, 2013, My profile is my password, verify me!: the privacy/convenience tradeoff of Facebook connect, 2369 Aldhafferi N, Watson C, Sajeev A. Personal information privacy settings of online social networks and their suitability for mobile internet devices, arXiv preprint arXiv:1305.2770. Richthammer, 2014, Taxonomy of social network data types, EURASIP J Inform Secur, 2014, 11, 10.1186/s13635-014-0011-7 Kayes I, Iamnitchi A. A survey on privacy and security in online social networks, arXiv:1504.03342. Steel, 2010, Facebook in privacy breach, Wall Street J, 18, 21 King, 2011, Privacy: is there an app for that?, 12 Singh, 2011, A user-centric evaluation of the readability of privacy policies in popular web sites, Inform Syst Front, 13, 501, 10.1007/s10796-010-9228-2 Viswanath, 2012, Keeping information safe from social networking apps, 49 Chaabane, 2014, A closer look at third-party osn applications: are they leaking your personal information?, 235 Wu, 2010, K-symmetry model for identity anonymization in social networks, 111 Liu, 2014, Survey on privacy preserving techniques for publishing social network data, J Softw, 25, 576 A. Chakraborty, B. Annappa, A perturbation based approach for privacy preserving publication of social network graphs. Blosser, 2008, Privacy preserving collaborative social network, 543 Campan, 2010, P-sensitive k-anonymity with generalization constraints, Trans Data Priv, 3, 65 Guha, 2008, NOYB: privacy in online social networks, 49 Fong, 2009, A privacy preservation model for facebook-style social network systems, Comp Secur - ESORICS, 5789, 303 Zhu, 2010, A collaborative framework for privacy protection in online social networks, 1 Shakimov, 2011, Vis-a-Vis: privacy-preserving online social networking via virtual individual servers, 1 Masoumzadeh, 2012, Preserving structural properties in edge-perturbing anonymization techniques for social networks, IEEE Trans Dependable Secure Comput, 9, 877, 10.1109/TDSC.2012.65 Fire, 2012, Social privacy protector - protecting users' privacy in social networks Heatherly, 2013, Preventing private information inference attacks on social networks, IEEE Trans Knowl Data Eng, 25, 1849, 10.1109/TKDE.2012.120 Cheng, 2013, Preserving user privacy from third-party applications in online social networks, 723 Sun, 2013, Privacy preserving social network publication against mutual friend attacks Singh, 2014, Privacy preserving techniques in social networks data publishing-a review, Int J Comput Appl, 87, 0975 Raghunathan, 2013 Qi, 2012, An overview of privacy preserving data mining, Procedia Environ Sci, 12, 1341, 10.1016/j.proenv.2012.01.432 Indhumathi R, Priya SM. Data preserving by anonymization techniques for collaborative data publishing, Mechanics20(21) 20–21. Sweeney, 2002, k-anonymity: a model for protecting privacy, international journal of uncertainty, Fuzzi Knowl-Based Syst, 10, 557, 10.1142/S0218488502001648 Machanavajjhala, 2007, L-diversity: privacy beyond k-anonymity, ACM Trans Knowl Discov Data (TKDD), 1, 3, 10.1145/1217299.1217302 Li, 2007, t-closeness: privacy beyond kanonymity and l-diversity, 106 Campan, 2015, Preserving communities in anonymized social networks, Trans Data Priv, 55 Tassa, 2013, Anonymization of centralized and distributed social networks by sequential clustering, IEEE Trans Knowl Data Eng, 25, 311, 10.1109/TKDE.2011.232 Skarkala, 2012, Privacy preservation by k-anonymization of weighted social networks, 423 Yuan, 2013, Protecting sensitive labels in social network data anonymization, IEEE Trans Knowl Data Eng, 25, 633, 10.1109/TKDE.2011.259 Chakraborty, 2015, Analysis and performance enhancement to achieve recursive (c, l) diversity anonymization in social networks, Trans Data Priv, 8, 173 Song, 2015, Decision tree methods: applications for classification and prediction, Shanghai Arch Psychiatry, 27, 130 Rahman, 2012, FRAppE: detecting malicious Facebook applications, 313 Kavianpour, 2017, Classification of third-party applications on facebook to mitigate users information leakage, 144 Leskovec, 2014 Shi, 2010, Anonymizing data with quasi-sensitive attribute values, 1389 Ananthula, 2015, Measuring privacy in online social networks, Int J Secur Privacy Trust Manage, 4, 1, 10.5121/ijsptm.2015.4201