Averting Intruder Attack on Social Network by Data Sanitization
نویسندگان
چکیده
Online Social Networks offer for social interactions and information sharing among peoples, but it includes security and privacy issues. OSNs allow users to limit access to shared data; OSNs currently do not provide any mechanism to enforce privacy concerns over data associated with multiple users. To overcome this, we put forward an approach which supports the protection of shared data associated with multiple users in OSNs. We are developing an access control model to capture the core of shared authorization requirements, along with a multiparty policy specification scheme and a policy enforcement mechanism.
منابع مشابه
Collective Data-Sanitization for Preventing Sensitive Information Inference Attacks in Social Networks
Releasing social network data could seriously breach user privacy. User profile and friendship relations are inherently private. Unfortunately, it is possible to predict sensitive information carried in released data latently by utilizing data mining techniques. Therefore, sanitizing network data prior to release is necessary. In this paper, we explore how to launch an inference attack exploiti...
متن کاملTowards Privacy-Preserving Speech Data Publishing
Privacy-preserving data publishing has been a heated research topic in the last decade. Numerous ingenious attacks on users’ privacy and defensive measures have been proposed for the sharing of various data, varying from relational data, social network data, spatiotemporal data, to images and videos. Speech data publishing, however, is still untouched in the literature. To fill this gap, we stu...
متن کاملPreventing Private Information Inference Attacks on Social Networks Technical Report UTDCS-03-09
On-line social networks, such as Facebook, are increasingly utilized by many people. These networks allow users to publish details about themselves and connect to their friends. Some of the information revealed inside these networks is meant to be private. Yet it is possible that corporations could use learning algorithms on released data to predict undisclosed private information. In this pape...
متن کاملAn Ant Colony Optimization Algorithm for Network Vulnerability Analysis
Intruders often combine exploits against multiple vulnerabilities in order to break into the system. Each attack scenario is a sequence of exploits launched by an intruder that leads to an undesirable state such as access to a database, service disruption, etc. The collection of possible attack scenarios in a computer network can be represented by a directed graph, called network attack gra...
متن کاملA Combined Model of Clustering and Classification Methods for Preserving Privacy in Social Networks against Inference and Neighborhood Attacks
In the last decade online social networks has gained remarkable attention. Facebook or Google+, are example social network services which allow people to create online profiles and share personal information with their friends. These networks publish details about users while some of the information revealed inside is private. In order to address privacy concerns, many social networks allow use...
متن کامل