k-anonymity: a model for protecting privacy
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
IEEE Security and Privacy
Information revelation and privacy in online social networks
Proceedings of the 2005 ACM workshop on Privacy in the electronic society
Revisiting the uniqueness of simple demographics in the US population
Proceedings of the 5th ACM workshop on Privacy in electronic society
L-diversity: Privacy beyond k-anonymity
ACM Transactions on Knowledge Discovery from Data (TKDD)
Proceedings of the 16th international conference on World Wide Web
Tor: the second-generation onion router
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
EntityRank: searching entities directly and holistically
VLDB '07 Proceedings of the 33rd international conference on Very large data bases
Measuring Topological Anonymity in Social Networks
GRC '07 Proceedings of the 2007 IEEE International Conference on Granular Computing
Facetnet: a framework for analyzing communities and their evolutions in dynamic networks
Proceedings of the 17th international conference on World Wide Web
Planetary-scale views on a large instant-messaging network
Proceedings of the 17th international conference on World Wide Web
Towards identity anonymization on graphs
Proceedings of the 2008 ACM SIGMOD international conference on Management of data
Resisting structural re-identification in anonymized social networks
Proceedings of the VLDB Endowment
Proceedings of the 18th international conference on World wide web
A brief survey on anonymization techniques for privacy preserving publishing of social network data
ACM SIGKDD Explorations Newsletter
Preserving Privacy in Social Networks Against Neighborhood Attacks
ICDE '08 Proceedings of the 2008 IEEE 24th International Conference on Data Engineering
On Protecting Private Information in Social Networks: A Proposal
ICDE '09 Proceedings of the 2009 IEEE International Conference on Data Engineering
On the leakage of personally identifiable information via online social networks
Proceedings of the 2nd ACM workshop on Online social networks
Preserving Privacy in Social Networks: A Structure-Aware Approach
WI-IAT '09 Proceedings of the 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology - Volume 01
Unsupervised named-entity extraction from the Web: An experimental study
Artificial Intelligence
Finding "hidden" connections on linkedIn an argument for more pragmatic social network privacy
Proceedings of the 2nd ACM workshop on Security and artificial intelligence
A Framework for Computing the Privacy Scores of Users in Online Social Networks
ICDM '09 Proceedings of the 2009 Ninth IEEE International Conference on Data Mining
A Literature Review of Privacy Research on Social Network Sites
MINES '09 Proceedings of the 2009 International Conference on Multimedia Information Networking and Security - Volume 01
k-automorphism: a general framework for privacy preserving network publication
Proceedings of the VLDB Endowment
Preserving the privacy of sensitive relationships in graph data
PinKDD'07 Proceedings of the 1st ACM SIGKDD international conference on Privacy, security, and trust in KDD
Privacy and security for online social networks: challenges and opportunities
IEEE Network: The Magazine of Global Internetworking
A Framework for Computing the Privacy Scores of Users in Online Social Networks
ACM Transactions on Knowledge Discovery from Data (TKDD)
Privacy policies for shared content in social network sites
The VLDB Journal — The International Journal on Very Large Data Bases
Who's your best friend?: targeted privacy attacks In location-sharing social networks
Proceedings of the 13th international conference on Ubiquitous computing
Social Network Privacy for Attribute Disclosure Attacks
ASONAM '11 Proceedings of the 2011 International Conference on Advances in Social Networks Analysis and Mining
Inferring privacy information from social networks
ISI'06 Proceedings of the 4th IEEE international conference on Intelligence and Security Informatics
Security and privacy in online social networks: A survey
ICME '11 Proceedings of the 2011 IEEE International Conference on Multimedia and Expo
Structural and Message Based Private Friend Recommendation
ASONAM '12 Proceedings of the 2012 International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2012)
Computers in Human Behavior
Hi-index | 0.00 |
With the extreme popularity of Web and online social networks, a large amount of personal information has been made available over the Internet. On the other hand, advances in information retrieval, data mining and knowledge discovery technologies have enabled users to efficiently satisfy their information needs over the Internet or from large-scale data sets. However, such technologies also help the adversaries such as web stalkers to discover private information about their victims from mass data. In this paper, we study privacy-sensitive information that are accessible from the Web, and how these information could be utilized to discover personal identities. In the proposed scenario, an adversary is assumed to possess a small piece of "seed" information about a targeted user, and conduct extensive and intelligent search to identify the target over both the Web and an information repository collected from the Web. In particular, two types of attackers are modeled, namely tireless attackers and resourceful attackers. We then analyze detailed attacking mechanisms that could be performed by these attackers, and quantify the threats of both types of attacks to general Web users. With extensive experiments and sophisticated analysis, we show that a large portion of users with online presence are highly identifiable, even when only a small piece of (possibly inaccurate) seed information is known to the attackers.