Skip to main content

Privacy in Social Networks: A Survey

  • Chapter
  • First Online:
Social Network Data Analytics

Abstract

In this chapter, we survey the literature on privacy in social networks. We focus both on online social networks and online affiliation networks. We formally define the possible privacy breaches and describe the privacy attacks that have been studied. We present definitions of privacy in the context of anonymization together with existing anonymization techniques.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.00
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. A. Acquisti and R. Gross. Predicting social security numbers from public data. In PNAS, 2009.

    Google Scholar 

  2. C. C. Aggarwal and P. S. Yu. Privacy-Preserving Data Mining: Models and Algorithms. Springer, 2008.

    Google Scholar 

  3. G. Aggarwal, T. Feder, K. Kenthapadi, R. Motwani, R. Panigrahy, D. Thomas, and A. Zhu. Approximation algorithms for k-anonimity. JPT, Nov. 2005.

    Google Scholar 

  4. L. Backstrom, C. Dwork, and J. Kleinberg. Wherefore art thou r3579x: anonymized social networks, hidden patterns, and struct. steganography. In WWW, 2007.

    Google Scholar 

  5. M. Barbaro and T. Zeller. A face is exposed for aol searcher no. 4417749. New York Times, August 2006.

    Google Scholar 

  6. S. Bhagat, G. Cormode, B. Krishnamurthy, and D. Srivastava. Classbased graph anonymization for social network data. In VLDB, 2009.

    Google Scholar 

  7. S. Bhagat, G. Cormode, B. Krishnamurthy, and D. Srivastava. Privacy in dynamic social networks. In WWW Poster, 2010.

    Google Scholar 

  8. A. Campan and T.M. Truta. A clustering approach for data and structural anonymity in social networks. PinKDD, 2008.

    Google Scholar 

  9. S. Chawla, C. Dwork, F.Mcsherry, A. Smith, and H.Wee. Toward privacy in public databases. In TCC, 2005.

    Google Scholar 

  10. B.-C. Chen, D. Kifer, K. LeFevre, and A. Machanavajjhala. Privacypreserving data publishing. Foundations and trends in databases, 2(1–2):1–167, 2009.

    Article  Google Scholar 

  11. D. R. Choffnes, J. Duch, D. Malmgren, R. Guimera, F. E. Bustamante, and L. Amaral. Swarmscreen: Privacy through plausible deniability in p2p systems tech. Technical Report NWU-EECS-09-04, Department of EECS, Northwestern University, June 2009.

    Google Scholar 

  12. K. Clarkson, K. Liu, and E. Terzi. Towards identity anonymization in social networks. In P.Yu, J. Han, and C. Faloutsos, editors, Link Mining: Models Algorithms and Applications. Springer, 2010, in press.

    Google Scholar 

  13. G. Cormode, D. Srivastava, T. Yu, and Q. Zhang. Anonymizing bipartite graph data using safe groupings. In VLDB, 2008.

    Google Scholar 

  14. C. Cortes, D. Pregibon, and C. Volinsky. Communities of interest. In IDA, 2001.

    Google Scholar 

  15. danah boyd. Privacy and publicity in the context of big data. In WWW Invited Talk, 2010. Available at http://www.danah.org/papers/talks/2010/WWW2010.html.

    Google Scholar 

  16. S. Das, Äšmer Egecioglu, and A. E. Abbadi. Anonymizing weighted social network graphs. In ICDE, 2010.

    Google Scholar 

  17. C. Dwork. Differential privacy. In ICALP, 2006.

    Google Scholar 

  18. C. Dwork. An ad omnia approach to defining and achieving private data analysis. PinKDD, 4890:1–13, 2007.

    MathSciNet  Google Scholar 

  19. C. Dwork, K. Kenthapadi, F. McSherry, I. Mironov, and M. Naor. Our data, ourselves: privacy via distributed noise generation. In EUROCRYPT, 2006.

    Google Scholar 

  20. C. Dwork, F. McSherry, K. Nissim, and A. Smith. Calibrating noise to sensitivity in private data analysis. In TCC, 2005.

    Google Scholar 

  21. L. Fang and K. LeFevre. Privacy wizards for social networking sites. In WWW, 2010.

    Google Scholar 

  22. L. Getoor and C. P. Diehl. Link mining: a survey. SIGKDD Explorations, 7(2):3–12, December 2005.

    Article  Google Scholar 

  23. L. Getoor and B. Taskar, editors. Introduction to statistical relational learning. MIT Press, 2007.

    Google Scholar 

  24. M. Hay, C. Li, G. Miklau, and D. Jensen. Accurate estimation of the degree distribution of private networks. In ICDM, 2009.

    Google Scholar 

  25. M. Hay, G. Miklau, and D. Jensen. Enabling accurate analysis of private network data. In F. Bonchi and E. Ferrari, editors, Privacy-Aware Knowledge Discovery: Novel Applications and New Techniques. Chapman & Hall/CRC Press, 2010, in press.

    Google Scholar 

  26. M. Hay, G. Miklau, D. Jensen, and D. Towsley. Resisting structural identification in anonymized social networks. In VLDB, August 2008.

    Google Scholar 

  27. M. Hay, G. Miklau, D. Jensen, P. Weis, and S. Srivastava. Anonymizing social networks. Technical report, University ofMassachusetts, Amherst, March 2007.

    Google Scholar 

  28. Y. Z. J. Vaidya, C. Clifton. Privacy Preserving Data Mining. Springer, 2006.

    Google Scholar 

  29. J. M. Kleinberg. Challenges in mining social network data: processes, privacy, and paradoxes. In KDD, pages 4–5, 2007.

    Google Scholar 

  30. A. Korolova, K. Kenthapadi, N.Mishra, and A. Ntoulas. Releasing search queries and clicks privately. In WWW, 2009.

    Google Scholar 

  31. A. Korolova, R. Motwani, S. U. Nabar, and Y. Xu. Link privacy in social networks. In CIKM, 2008.

    Google Scholar 

  32. N. Li, T. Li, and S. Venkatasubramanian. t-closeness: Privacy beyond k-anonymity and l-diversity. In ICDE, 2007.

    Google Scholar 

  33. J. Lindamood, R. Heatherly, M. Kantarcioglu, and B. Thuraisingham. Inferring private information using social network data. In WWW Poster, 2009.

    Google Scholar 

  34. K. Liu, K. Das, T. Grandison, and H. Kargupta. Privacy-preserving data analysis on graphs and social networks. In H. Kargupta, J. Han, P. Yu, R. Motwani, and V. Kumar, editors, Next Generation of Data Mining, chapter 21, pages 419–437. Chapman & Hall/CRC, 2008.

    Google Scholar 

  35. K. Liu and E. Terzi. Towards identity anonymization on graphs. In SIGMOD, 2008.

    Google Scholar 

  36. K. Liu and E. Terzi. A framework for computing the privacy scores of users in online social networks. In ICDM, 2009.

    Google Scholar 

  37. L. Liu, J. Wang, J. Liu, and J. Zhang. Privacy preservation in social networks with sensitive edge weights. In SDM, 2009.

    Google Scholar 

  38. A. Machanavajjhala, J. Gehrke, D. Kifer, and M. Venkitasubramaniam. l-diversity: Privacy beyond k-anonymity. In ICDE, 2006.

    Google Scholar 

  39. F. McSherry and I. Mironov. Differentially private recommender systems: building privacy into the netflix prize contenders. In KDD, 2009.

    Google Scholar 

  40. A. Narayanan and V. Shmatikov. Robust de-anonymization of large sparse datasets. Security and Privacy, 2008.

    Google Scholar 

  41. A. Narayanan and V. Shmatikov. De-anonymizing social networks. In Security and Privacy, 2009.

    Google Scholar 

  42. P. Sen, G. M. Namata, M. Bilgic, L. Getoor, B. Gallagher, and T. Eliassi-Rad. Collective classification in network data. AI Magazine, 29(3):93–106, 2008.

    Google Scholar 

  43. L. Sweeney. Achieving k-anonymity privacy protection using generalization and suppression. International Journal of Uncertainty, 10(5):571–588, 2002.

    MathSciNet  MATH  Google Scholar 

  44. N. Vuokko and E. Terzi. Reconstructing randomized social networks. In SDM, 2010.

    Google Scholar 

  45. G. Wondracek, T. Holz, E. Kirda, and C. Kruegel. A practical attack to de-anonymize social network users. In Security and Privacy, 2010.

    Google Scholar 

  46. L.Wu, X. Ying, and X.Wu. Reconstruction of randomized graph via low rank approximation. In SDM, 2010.

    Google Scholar 

  47. X.Wu, X. Ying, K. Liu, and L. Chen. A survey of algorithms for privacypreserving social network analysis. In C. Aggarwal and H.Wang, editors, Managing and Mining Graph Data. Kluwer Academic Publishers, 2009.

    Google Scholar 

  48. X. Ying and X.Wu. Randomizing social networks: a spectrum preserving approach. In SDM, 2008.

    Google Scholar 

  49. E. Zheleva and L. Getoor. Preserving the privacy of sensitive relationships in graph data. PinKDD, 2007.

    Google Scholar 

  50. E. Zheleva and L. Getoor. To join or not to join: the illusion of privacy in social networks with mixed public and private user profiles. In WWW, 2009.

    Google Scholar 

  51. B. Zhou and J. Pei. Preserving privacy in social networks against neighborhood attacks. In ICDE, 2008.

    Google Scholar 

  52. B. Zhou, J. Pei, and W.-S. Luk. A brief survey on anonymization techniques for privacy preserving publishing of social network data. SIGKDD Explorations, 10(2), 2009.

    Google Scholar 

  53. L. Zou, L. Chen, andM. T. Ozsu. K-automorphism: A general framework for privacy preserving network publication. In VLDB, 2008.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Elena Zheleva .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer Science+Business Media, LLC

About this chapter

Cite this chapter

Zheleva, E., Getoor, L. (2011). Privacy in Social Networks: A Survey. In: Aggarwal, C. (eds) Social Network Data Analytics. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-8462-3_10

Download citation

  • DOI: https://doi.org/10.1007/978-1-4419-8462-3_10

  • Published:

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-1-4419-8461-6

  • Online ISBN: 978-1-4419-8462-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics