Precursor of privacy leakage detection for individual user

被引:0
|
作者
Li, Xuefeng [1 ]
Zhao, Chensu [2 ]
Hu, Yi [1 ]
Xie, Honglin [2 ]
Wang, Yuhang [1 ]
Zhao, Jingyang [1 ]
机构
[1] Henan Univ Technol, Zhengzhou 450001, Peoples R China
[2] Shandong Womans Univ, Jinan 250002, Peoples R China
关键词
Privacy; Social networks; Temporal; Predict;
D O I
10.1016/j.cose.2024.103879
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The pursuit of dividends from the burgeoning realm of data traffic has emerged as a prevailing trend. Given this current state of affairs, the safeguarding of personal information has become an urgent task. Current methods for personal privacy protection primarily offer alerts when information breaches occur, but at that stage, irreversible breaches have already transpired. Thus, the study of preemptive privacy breach prediction is a task of significant importance within the realm of privacy protection. However, the endeavor to predict privacy breaches in advance remains exceedingly challenging, owing to several factors: (i) The complexity of social networks gives rise to high-dimensional features. (ii) Concerning the comprehensive and precise capture of pathways leading to information leakage. (iii) How to employ time series data effectively to realize early predictions. This study proposes a novel approach for constructing graph neural networks and forecasting privacy breaches, centered on the context of user-generated content within specific time frames, integrates spatial graph structures with temporal series information. The integration can entirely achieve the advance prediction of users' ' privacy status, thereby preventing information leakage. Empirical tests on real-world datasets demonstrate that our approach surpasses traditional time series forecasting methods in privacy breach predictions, achieving a notable average improvement of 2% in F1 score, Recall, and Precision metrics.
引用
收藏
页数:11
相关论文
共 50 条
  • [41] Protecting individual privacy
    不详
    M D COMPUTING, 1999, 16 (01): : 12 - 12
  • [42] INFRINGEMENTS OF INDIVIDUAL PRIVACY
    SAMUELS, G
    MEDICAL JOURNAL OF AUSTRALIA, 1972, 2 (07) : 355 - &
  • [43] Fine-grained binary analysis method for privacy leakage detection on the cloud platform
    Pan J.
    Zhuang Y.
    Hu X.
    Zhao W.
    Computers, Materials and Continua, 2020, 64 (01): : 607 - 622
  • [44] Execution Enhanced Static Detection of Android Privacy Leakage Hidden by Dynamic Class Loading
    Yang, Yufei
    Luo, Wenbo
    Pei, Yu
    Pan, Minxue
    Zhang, Tian
    2019 IEEE 43RD ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), VOL 1, 2019, : 149 - 158
  • [45] LinkFlow: Efficient Large-Scale Inter-app Privacy Leakage Detection
    He, Yi
    Li, Qi
    Sun, Kun
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2017, 2018, 238 : 291 - 311
  • [46] Botnet detection and information leakage mitigation with differential privacy under generative adversarial networks
    Feizi, Sanaz
    Ghaffari, Hamidreza
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2025, 28 (02):
  • [47] Privacy beyond the individual
    David Garcia
    Nature Human Behaviour, 2019, 3 : 112 - 113
  • [48] Fine-Grained Binary Analysis Method for Privacy Leakage Detection on the Cloud Platform
    Pan, Jiaye
    Zhuang, Yi
    Hu, Xinwen
    Zhao, Wenbing
    CMC-COMPUTERS MATERIALS & CONTINUA, 2020, 64 (01): : 607 - 622
  • [49] Automatic Privacy Leakage Detection for Massive Android Apps via a Novel Hybrid Approach
    Chen, Hongyi
    Leung, Ho-fung
    Han, Biao
    Su, Jinshu
    2017 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2017,
  • [50] Privacy beyond the individual
    Garcia, David
    NATURE HUMAN BEHAVIOUR, 2019, 3 (02) : 112 - 113