Abstract
In this chapter, we survey the literature on privacy in social networks. We focus both on online social networks and online affiliation networks. We formally define the possible privacy breaches and describe the privacy attacks that have been studied. We present definitions of privacy in the context of anonymization together with existing anonymization techniques.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
A. Acquisti and R. Gross. Predicting social security numbers from public data. In PNAS, 2009.
C. C. Aggarwal and P. S. Yu. Privacy-Preserving Data Mining: Models and Algorithms. Springer, 2008.
G. Aggarwal, T. Feder, K. Kenthapadi, R. Motwani, R. Panigrahy, D. Thomas, and A. Zhu. Approximation algorithms for k-anonimity. JPT, Nov. 2005.
L. Backstrom, C. Dwork, and J. Kleinberg. Wherefore art thou r3579x: anonymized social networks, hidden patterns, and struct. steganography. In WWW, 2007.
M. Barbaro and T. Zeller. A face is exposed for aol searcher no. 4417749. New York Times, August 2006.
S. Bhagat, G. Cormode, B. Krishnamurthy, and D. Srivastava. Classbased graph anonymization for social network data. In VLDB, 2009.
S. Bhagat, G. Cormode, B. Krishnamurthy, and D. Srivastava. Privacy in dynamic social networks. In WWW Poster, 2010.
A. Campan and T.M. Truta. A clustering approach for data and structural anonymity in social networks. PinKDD, 2008.
S. Chawla, C. Dwork, F.Mcsherry, A. Smith, and H.Wee. Toward privacy in public databases. In TCC, 2005.
B.-C. Chen, D. Kifer, K. LeFevre, and A. Machanavajjhala. Privacypreserving data publishing. Foundations and trends in databases, 2(1–2):1–167, 2009.
D. R. Choffnes, J. Duch, D. Malmgren, R. Guimera, F. E. Bustamante, and L. Amaral. Swarmscreen: Privacy through plausible deniability in p2p systems tech. Technical Report NWU-EECS-09-04, Department of EECS, Northwestern University, June 2009.
K. Clarkson, K. Liu, and E. Terzi. Towards identity anonymization in social networks. In P.Yu, J. Han, and C. Faloutsos, editors, Link Mining: Models Algorithms and Applications. Springer, 2010, in press.
G. Cormode, D. Srivastava, T. Yu, and Q. Zhang. Anonymizing bipartite graph data using safe groupings. In VLDB, 2008.
C. Cortes, D. Pregibon, and C. Volinsky. Communities of interest. In IDA, 2001.
danah boyd. Privacy and publicity in the context of big data. In WWW Invited Talk, 2010. Available at http://www.danah.org/papers/talks/2010/WWW2010.html.
S. Das, Äšmer Egecioglu, and A. E. Abbadi. Anonymizing weighted social network graphs. In ICDE, 2010.
C. Dwork. Differential privacy. In ICALP, 2006.
C. Dwork. An ad omnia approach to defining and achieving private data analysis. PinKDD, 4890:1–13, 2007.
C. Dwork, K. Kenthapadi, F. McSherry, I. Mironov, and M. Naor. Our data, ourselves: privacy via distributed noise generation. In EUROCRYPT, 2006.
C. Dwork, F. McSherry, K. Nissim, and A. Smith. Calibrating noise to sensitivity in private data analysis. In TCC, 2005.
L. Fang and K. LeFevre. Privacy wizards for social networking sites. In WWW, 2010.
L. Getoor and C. P. Diehl. Link mining: a survey. SIGKDD Explorations, 7(2):3–12, December 2005.
L. Getoor and B. Taskar, editors. Introduction to statistical relational learning. MIT Press, 2007.
M. Hay, C. Li, G. Miklau, and D. Jensen. Accurate estimation of the degree distribution of private networks. In ICDM, 2009.
M. Hay, G. Miklau, and D. Jensen. Enabling accurate analysis of private network data. In F. Bonchi and E. Ferrari, editors, Privacy-Aware Knowledge Discovery: Novel Applications and New Techniques. Chapman & Hall/CRC Press, 2010, in press.
M. Hay, G. Miklau, D. Jensen, and D. Towsley. Resisting structural identification in anonymized social networks. In VLDB, August 2008.
M. Hay, G. Miklau, D. Jensen, P. Weis, and S. Srivastava. Anonymizing social networks. Technical report, University ofMassachusetts, Amherst, March 2007.
Y. Z. J. Vaidya, C. Clifton. Privacy Preserving Data Mining. Springer, 2006.
J. M. Kleinberg. Challenges in mining social network data: processes, privacy, and paradoxes. In KDD, pages 4–5, 2007.
A. Korolova, K. Kenthapadi, N.Mishra, and A. Ntoulas. Releasing search queries and clicks privately. In WWW, 2009.
A. Korolova, R. Motwani, S. U. Nabar, and Y. Xu. Link privacy in social networks. In CIKM, 2008.
N. Li, T. Li, and S. Venkatasubramanian. t-closeness: Privacy beyond k-anonymity and l-diversity. In ICDE, 2007.
J. Lindamood, R. Heatherly, M. Kantarcioglu, and B. Thuraisingham. Inferring private information using social network data. In WWW Poster, 2009.
K. Liu, K. Das, T. Grandison, and H. Kargupta. Privacy-preserving data analysis on graphs and social networks. In H. Kargupta, J. Han, P. Yu, R. Motwani, and V. Kumar, editors, Next Generation of Data Mining, chapter 21, pages 419–437. Chapman & Hall/CRC, 2008.
K. Liu and E. Terzi. Towards identity anonymization on graphs. In SIGMOD, 2008.
K. Liu and E. Terzi. A framework for computing the privacy scores of users in online social networks. In ICDM, 2009.
L. Liu, J. Wang, J. Liu, and J. Zhang. Privacy preservation in social networks with sensitive edge weights. In SDM, 2009.
A. Machanavajjhala, J. Gehrke, D. Kifer, and M. Venkitasubramaniam. l-diversity: Privacy beyond k-anonymity. In ICDE, 2006.
F. McSherry and I. Mironov. Differentially private recommender systems: building privacy into the netflix prize contenders. In KDD, 2009.
A. Narayanan and V. Shmatikov. Robust de-anonymization of large sparse datasets. Security and Privacy, 2008.
A. Narayanan and V. Shmatikov. De-anonymizing social networks. In Security and Privacy, 2009.
P. Sen, G. M. Namata, M. Bilgic, L. Getoor, B. Gallagher, and T. Eliassi-Rad. Collective classification in network data. AI Magazine, 29(3):93–106, 2008.
L. Sweeney. Achieving k-anonymity privacy protection using generalization and suppression. International Journal of Uncertainty, 10(5):571–588, 2002.
N. Vuokko and E. Terzi. Reconstructing randomized social networks. In SDM, 2010.
G. Wondracek, T. Holz, E. Kirda, and C. Kruegel. A practical attack to de-anonymize social network users. In Security and Privacy, 2010.
L.Wu, X. Ying, and X.Wu. Reconstruction of randomized graph via low rank approximation. In SDM, 2010.
X.Wu, X. Ying, K. Liu, and L. Chen. A survey of algorithms for privacypreserving social network analysis. In C. Aggarwal and H.Wang, editors, Managing and Mining Graph Data. Kluwer Academic Publishers, 2009.
X. Ying and X.Wu. Randomizing social networks: a spectrum preserving approach. In SDM, 2008.
E. Zheleva and L. Getoor. Preserving the privacy of sensitive relationships in graph data. PinKDD, 2007.
E. Zheleva and L. Getoor. To join or not to join: the illusion of privacy in social networks with mixed public and private user profiles. In WWW, 2009.
B. Zhou and J. Pei. Preserving privacy in social networks against neighborhood attacks. In ICDE, 2008.
B. Zhou, J. Pei, and W.-S. Luk. A brief survey on anonymization techniques for privacy preserving publishing of social network data. SIGKDD Explorations, 10(2), 2009.
L. Zou, L. Chen, andM. T. Ozsu. K-automorphism: A general framework for privacy preserving network publication. In VLDB, 2008.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer Science+Business Media, LLC
About this chapter
Cite this chapter
Zheleva, E., Getoor, L. (2011). Privacy in Social Networks: A Survey. In: Aggarwal, C. (eds) Social Network Data Analytics. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-8462-3_10
Download citation
DOI: https://doi.org/10.1007/978-1-4419-8462-3_10
Published:
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4419-8461-6
Online ISBN: 978-1-4419-8462-3
eBook Packages: Computer ScienceComputer Science (R0)