The Journal of Machine Learning Research
Information revelation and privacy in online social networks
Proceedings of the 2005 ACM workshop on Privacy in the electronic society
Proceedings of the 16th international conference on World Wide Web
Restricted Boltzmann machines for collaborative filtering
Proceedings of the 24th international conference on Machine learning
Proceedings of the 18th international conference on World wide web
Inferring private information using social network data
Proceedings of the 18th international conference on World wide web
LINKREC: a unified framework for link recommendation with user attributes and graph structure
Proceedings of the 19th international conference on World wide web
Walking in facebook: a case study of unbiased sampling of OSNs
INFOCOM'10 Proceedings of the 29th conference on Information communications
Inferring privacy information from social networks
ISI'06 Proceedings of the 4th IEEE international conference on Intelligence and Security Informatics
Hi-index | 0.00 |
While social networking platforms allow users to control how their private information is shared, recent research has shown that a user's sensitive attribute can be inferred based on friendship links and group memberships, even when the attribute value is not shared with anyone else. Thus, existing access control mechanisms are unable to protect against such privacy breaches. Our research goal is to develop tools that help a user Alice be aware of privacy breaches via attribute inference. In this paper, we specifically focus on two problems: (a) whether Alice's sensitive attribute can be inferred based on public information in Alice's neighborhood, and (b) whether making Alice's sensitive attribute public leads to the disclosure of sensitive information of another user Bob in Alice's neighborhood. We propose three algorithms to detect the aforementioned privacy breaches. We limit our scope to the one-hop neighbors of Alice -- information that is visible to an app that can be executed on behalf of Alice. Our results indicate that analyzing local networks is sufficient to extract a significant amount of information about most users.