2008 IEEE 24th International Conference on Data Engineering 2008
DOI: 10.1109/icde.2008.4497554
|View full text |Cite
|
Sign up to set email alerts
|

Link Privacy in Social Networks

Abstract: We consider a privacy threat to a social network in which the goal of an attacker is to obtain knowledge of a significant fraction of the links in the network. We formalize the typical social network interface and the information about links that it provides to its users in terms of lookahead. We consider a particular threat where an attacker subverts user accounts to get information about local neighborhoods in the network and pieces them together in order to get a global picture. We analyze, both experimenta… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

1
49
0

Year Published

2009
2009
2013
2013

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 61 publications
(50 citation statements)
references
References 6 publications
1
49
0
Order By: Relevance
“…, the authors evaluated how different parameters of the crawler algorithms affect crawling efficiency (defined previously in Ref. ) as well as the quality of collected data. Biases produced by certain schedulers can be avoided by selecting the proper scheduler algorithm as shown in Ref.…”
Section: State Of the Artmentioning
confidence: 99%
See 2 more Smart Citations
“…, the authors evaluated how different parameters of the crawler algorithms affect crawling efficiency (defined previously in Ref. ) as well as the quality of collected data. Biases produced by certain schedulers can be avoided by selecting the proper scheduler algorithm as shown in Ref.…”
Section: State Of the Artmentioning
confidence: 99%
“…In Ref. , edge privacy is studied from the point of view of the number of compromised accounts needed to expose as much nodes as possible depending on the lookahead of the network. Lookahead is defined as the distance from which a user can see his friends' links.…”
Section: State Of the Artmentioning
confidence: 99%
See 1 more Smart Citation
“…In some of his later work [2,46], Motwani investigated frameworks and algorithms for data sanitization, query auditing and related problems.…”
Section: Anonymity and Privacymentioning
confidence: 99%
“…Ahern et al [3] study Flickr to see how location information is leaked through users' photographs. Several studies [16,18,38] exploit the friend graph to infer characteristics about users. Persona resolves these issues by allowing users to precisely express the policies under which their data, including friend information, is encrypted and stored.…”
Section: Related Workmentioning
confidence: 99%