Security and Privacy in Communication Networks. SecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22–25, 2017, Proceedings

Research Article

Privacy Threat Analysis of Mobile Social Network Data Publishing

Download
160 downloads
  • @INPROCEEDINGS{10.1007/978-3-319-78816-6_5,
        author={Jemal Abawajy and Mohd Ninggal and Zaher Aghbari and Abdul Darem and Asma Alhashmi},
        title={Privacy Threat Analysis of Mobile Social Network Data Publishing},
        proceedings={Security and Privacy in Communication Networks. SecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22--25, 2017, Proceedings},
        proceedings_a={SECURECOMM \& ATCS \& SEPRIOT},
        year={2018},
        month={4},
        keywords={Mobile social network Social network data publication Privacy attack Re-identification attacks Disclosure attacks},
        doi={10.1007/978-3-319-78816-6_5}
    }
    
  • Jemal Abawajy
    Mohd Ninggal
    Zaher Aghbari
    Abdul Darem
    Asma Alhashmi
    Year: 2018
    Privacy Threat Analysis of Mobile Social Network Data Publishing
    SECURECOMM & ATCS & SEPRIOT
    Springer
    DOI: 10.1007/978-3-319-78816-6_5
Jemal Abawajy1,*, Mohd Ninggal2,*, Zaher Aghbari3,*, Abdul Darem4,*, Asma Alhashmi4
  • 1: Deakin University
  • 2: Universiti Putra Malaysia
  • 3: University of Sharjah
  • 4: University of Mysore
*Contact email: jemal@deakin.edu.au, mohdizuan@upm.edu.my, zaher@sharjah.ac.ae, basit.darem@yahoo.com

Abstract

With mobile phones becoming integral part of modern life, the popularity of mobile social networking has tremendously increased over the past few years, bringing with it many benefits but also new trepidations. In particular, privacy issues in mobile social networking has recently become a significant concern. In this paper we present our study on the privacy vulnerability of the mobile social network data publication with emphases on a re-identification and disclosure attacks. We present a new technique for uniquely identifying a targeted individual in the anonymized social network graph and empirically demonstrate the capability of the proposed approach using a very large social network datasets. The results show that the proposed approach can uniquely re-identify a target on anonymized social network data with high success rate.