Skip to main content

Providing Group Anonymity in Social Networks

  • Chapter
  • First Online:
Computational Social Networks

Abstract

In today’s world, there are almost no borders between people. Using Internet technologies, especially social networks, people can communicate and share different information regardless of where they live or work. However, giving out any sensitive information can pose significant security threats for the owner of the information. As more privacy challenges arise, people become concerned about their security. Many social networking websites provide various types of privacy policies, but this proves to be insufficient. All existing security methods aim at gaining individual anonymity. Nevertheless, information about user groups, which could be determined inside social networks, is not protected. Still, this information might occur to be security-intensive information is present in this data set. In this chapter, the task we have set is providing group anonymity in social networks. By group anonymity we understand the property of a group of people to be indistinguishable within a particular dataset. We also propose a technique to solve the task using wavelet transforms.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Gross, R., Acquisti, A.: Information revelation and privacy in online social networks. In: Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, pp. 71–80. ACM, New York (2005)

    Google Scholar 

  2. Acquisti, A., Gross, R.: Imagined communities: awareness, information sharing, and privacy on the Facebook. In: International Workshop on Privacy Enhancing Technologies. Lecture Notes in Computer Science, vol. 4258, pp. 36–58. Springer, Berlin/Heidelberg (2006)

    Google Scholar 

  3. Krishnamurthy, B., Wills, C.E.: Characterizing privacy in online social networks. In: Proceedings of the First Workshop on Online Social Networks, pp. 37–42. ACM, New York (2008)

    Google Scholar 

  4. Augie, R., Jennifer, W., Emily, R.: Fight social media stagnation. Build trust and advocacy with targeted content and engagement strategies. Forrester Research report (2010)

    Google Scholar 

  5. Squicciarini, A.C., Shehab, M., Paci, F.: Collective privacy management in social networks. In: Proceedings of the 18th International Conference on World Wide Web, pp. 521–530. ACM, New York (2009)

    Google Scholar 

  6. Panda, G.K., Mitra, A., Prasad, A., Singh, A., Tour, D.: Applying l-diversity in anonymizing collaborative social network. Int. J. Comput. Sci. Inf. Secur. 8(2), 324–329 (2010)

    Google Scholar 

  7. Chew, M., Balfanz, D., Laurie, B.: (Under)mining privacy in social networks. In: Proceedings of Web 2.0 Security and Privacy Workshop, Oakland (2008)

    Google Scholar 

  8. Felt, A., Evans, D.: Privacy protection for social networking platforms. In: Proceedings of Web 2.0 Security and Privacy Workshop, Oakland (2008)

    Google Scholar 

  9. Guha, S., Tang, K., Francis, P.: NOYB: privacy in online social networks. In: Proceedings of the First Workshop on Online Social Networks, pp. 49–54. ACM, New York (2008)

    Google Scholar 

  10. Tootoonchian, A., Saroiu, S., Ganjali, Y., Wolman, A.: Lockr: better privacy for social networks. In: Proceedings of the 5th International Conference on Emerging Networking Experiments and Technologies, pp. 169–180. ACM, New York (2009)

    Google Scholar 

  11. Narayanan, A., Shmatikov, V.: Robust de-anonymization of large sparse datasets. In: Proceedings of the 2008 IEEE Symposium on Security and Privacy, pp. 111–125. IEEE Computer Society, Washington (2008)

    Google Scholar 

  12. Barbaro, M., Zeller Jr., T.: A face is exposed for AOL searcher no. 4417749. New York Times Aug 9, p. C4 (2006).

    Google Scholar 

  13. Buddy Media. “Corporate Brand Manager Poll—Reaching Customers in Local Markets” conducted by Harris Interactive, Aug 3 (2010)

    Google Scholar 

  14. Chertov, O., Tavrov, D.: Group anonymity. In: Hüllermeier, E., Kruse, R. (eds.) IPMU-2010. Communications in Computer and Information Science, vol. 81, pp. 592–601. Springer, Heidelberg (2010)

    Google Scholar 

  15. Chertov, O., Tavrov, D.: Data group anonymity: general approach. Int. J. Comput. Sci. Inf. Secur. 8(7), 1–8 (2010)

    Google Scholar 

  16. Mallat, S.A.: Wavelet Tour of Signal Processing. Academic, New York (1999)

    MATH  Google Scholar 

  17. Chertov, O.: Group Methods of Data Processing. Lulu.com, Raleigh (2010)

    Google Scholar 

  18. Alexa Internet. Vkontakte.ru, http://www.alexa.com/siteinfo/vkontakte.ru (2012)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Oleg Chertov .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag London

About this chapter

Cite this chapter

Chertov, O., Tavrov, D. (2012). Providing Group Anonymity in Social Networks. In: Abraham, A. (eds) Computational Social Networks. Springer, London. https://doi.org/10.1007/978-1-4471-4051-1_11

Download citation

  • DOI: https://doi.org/10.1007/978-1-4471-4051-1_11

  • Published:

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-4471-4050-4

  • Online ISBN: 978-1-4471-4051-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics