Protecting private geosocial networks against practical hybrid attacks with heterogeneous information

被引:3
|
作者
Li, Yuechuan [1 ]
Li, Yidong [1 ]
Xu, Guandong [2 ]
机构
[1] Beijing Jiaotog Univ, Sch Comp & Informat Technol, Beijing, Peoples R China
[2] Univ Technol Sydney, Adv Analyt Inst, Sydney, NSW 2007, Australia
基金
中国国家自然科学基金;
关键词
Geosocial network; Privacy preservation; Anonymization; Location-based attack;
D O I
10.1016/j.neucom.2015.08.132
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
GeoSocial Networks (GSNs) are becoming increasingly popular due to its power in providing high-performance and flexible service capabilities. More and more Internet users have accepted this innovative service model. However, even GSNs have great business value for data analysis by integrated with location information, it may seriously compromise users' privacy in publishing the GSN data. In this paper, we study the identity disclosure problem in publishing GSN data. We first discuss the attack problem by considering both the location-based and structure-based properties, as background knowledge, and then formalize two general models, named (k, m)-anonymity and (k, m, l)-anonymity. Then we propose a complete solution to achieve (k, m)-anonymization and (k, m, l)-anonymization to prevent the released data from the above attacks above. We also take data utility into consideration by defining specific information loss metrics. It is validated by real-world data that the proposed methods can prevent GSN dataset from the attacks while retaining good utility. (C) 2016 Elsevier B.V. All rights reserved.
引用
收藏
页码:81 / 90
页数:10
相关论文
共 50 条
  • [31] Protecting personalized privacy against sensitivity homogeneity attacks over road networks in mobile services
    Xiao PAN
    Weizhang CHEN
    Lei WU
    Chunhui PIAO
    Zhaojun HU
    Frontiers of Computer Science, 2016, 10 (02) : 370 - 386
  • [32] Private Synchronization Control of Complex Networks Against Eavesdropping Attacks: A Differential Privacy Scheme
    Gao, Chen
    Wang, Zidong
    Ma, Lifeng
    Liu, Hongjian
    He, Xiao
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2024, 11 (03): : 3028 - 3038
  • [33] Secure output containment of heterogeneous multi-agent systems against hybrid attacks
    Huo, Shicheng
    Wu, Hao
    Wu, Tiejun
    Zhang, Ya
    ISA TRANSACTIONS, 2024, 148 : 191 - 200
  • [34] Hybrid Cryptographic End-to-End Encryption Method for Protecting IoT Devices Against MitM Attacks
    Karmous, Nader
    Hizem, Moez
    BEN Dhiab, Yassmine
    Aoueileyine, Mohamed OULD-ELHASSEN
    Bouallegue, Ridha
    Youssef, Neji
    RADIOENGINEERING, 2024, 33 (04) : 583 - 592
  • [35] A Hybrid Routing algorithm against Routing attacks in Mobile Adhoc Networks (MANETs)
    Kapoor, Swati
    Saini, Poonam
    2015 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION & AUTOMATION (ICCCA), 2015, : 380 - 383
  • [36] Securing IoT Networks Against DDoS Attacks: A Hybrid Deep Learning Approach
    Ul Ain, Noor
    Sardaraz, Muhammad
    Tahir, Muhammad
    Abo Elsoud, Mohamed W.
    Alourani, Abdullah
    SENSORS, 2025, 25 (05)
  • [37] Fuzzy-information-based robustness of interconnected networks against attacks and failures
    Zhu, Qian
    Zhu, Zhiliang
    Wang, Yifan
    Yu, Hai
    PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2016, 458 : 194 - 203
  • [38] On the Effectiveness of Dynamic Taint Analysis for Protecting against Private Information Leaks on Android-based Devices
    Sarwar , Golam
    Mehani, Olivier
    Boreli, Roksana
    Kaafar, Mohamed-Ali
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT 2013), 2013, : 461 - 468
  • [39] Securing Networks Against Adversarial Domain Name System Tunneling Attacks Using Hybrid Neural Networks
    Ness, Stephanie
    IEEE Access, 2025, 13 : 46697 - 46709
  • [40] A Hybrid Trust Model against Insider Packet Drop Attacks in Wireless Sensor Networks
    Cho, Youngho
    Qu, Gang
    SENSORS, 2023, 23 (09)