Final
Final
DISCLOSURES ON OSN
• P R E S E RV E P R I VA C Y O F U S E R
PROFILES.
• PROVIDE THE MINIMUM
I N F O R M AT I O N L O S S .
• TO MINIMIZE CRIMES ON
INTERNET
MOTIVATION
• G R O W I N G R AT E O F C R I M E S O N
THE INTERNET
• P R E S E RV I N G U S E R ’ S P R I VA C Y
• ENABLING SECURE
C O M M U N I C AT I O N B E T W E E N T H E
USERS
• PROTECTION FROM HACKERS AND
OTHER UNKNOWN USERS
LITERATURE SURVEY
Sr. No. Paper Name Author Year of Methodology Description Advantage
Publication Used
1. Inferring Privacy Jianming He, 2010 Bayesian Using a Bayesian Results reveal that personal
Information From Wesley W. Chu, Networks network approach attributes can be
Social and Zhenyu only way to infer inferred with high accuracy
Networks (Victor) Liu private information especially when people are
via friendship link. connected with
strong relationships.
2. Community-Enhanced Shirin Nilizadeh 2014 Divide-and- To re-identify user. Reducing the anonymity of users.
De-anonymization of Apu Kapadia conquer Our approach
Online Social Yong-Yeol Ahn approach partitions the
Networks networks into
communities’ and
performs a two-
stage mapping
Sr. Paper Name Author Year of Methodology Description Advantage
No. Publication Used
4. curso: Protect Eunsu Ryu Yao 2013 1. Social- Results indicate Whether Alice's sensitive attribute
Yourself from Curse Rong, Jie Li Attribute that user SI can be can be inferred based on public
of Attribute Inference Ashwin Network Model inferred based on information in Alice's
Machanavajjhala 2.Deterministc friendship neighborhood, and Whether
Algorithm information and making Alice's sensitive attribute
3. Utility group membership public leads to the disclosure of
Functions and it also shows sensitive information of another
that disclouser of user Bob in Alice's neighborhood.
one user hidden
information would
breach her friends
privacy.
ISSUES
Sensitivity = (N – Ri) / N
V = ( Ri * Rj) / (N*n)
For ex.
V = (DOBPublic_cnt * Rj ) / (N *n)
Vcontact = (DOBPublicCnt * Rj) / (N * n);
= (191+1*0.698)/(546*8)
= 0.04356
PQj
For ex.
PQj = Vdob*dobSensitivity + Vgender*genderSensitivity +
Vcontact*mobileSensitivity + Vemail*emailSensitivity +
Vaddress*AddressSensitivity + VcurrentCity*currentCitySensitivity +
Vedu*EducationSensitivity + Vjob*jobDetailsSensitivity;
PQl.add(PQj);
Curr Job
Sensitivit Us Conta Addre Educati
Attributes DOB Gender Email ent Deta
y er ct ss on
city ils
s
DOB 0.65018
0.17 0.052 0.096 0.261 0.24
Gender 0.68864 A 0.1556 0.26 0.2536
49 1 1 9 26
Contact 0.8956 0.30 0.091 0.168 0.455 0.458 0.42
B 0.2724 0.4439
Email 0.80769 6 3 2 1 3 46
0.21 0.065 0.120 0.130 0.12
Address 0.47985 C 0.1945 0.325 0.1268
86 2 1 9 13
Current 0.04 0.065 0.065 0.06
0.47619 D 0.0389 0.013 0.024 0.0634
City 37 01 4 06
Job details 0.51465 0.17 0.052 0.096 0.261 0.24
E 0.1556 0.26 0.2536
Education 0.49267 49 1 1 9 26
Table 4.1 Sensitivity score for user profile attribute 0.13 0.039 0.072 0.196 0.18
F 0.1167 0.195 0.1902
11 1 1 4 2
Us Curr Job privac 0.17 0.052 0.096 0.261 0.24
Gende Cont Emai Add Educ G 0.1556 0.26 0.2536
er DOB ent Detai y 49 1 1 9 26
r act l ress ation
s city ls score
0.13 0.039 0.072 0.196 0.18
0.052 0.096 0.261 0.253 H 0.1167 0.195 0.1902
A 0.175 0.156 0.26 0.243 0.845 11 1 11 4 2
1 1 9 6
0.26 0.078 0.144 0.390 0.392 0.36
0.091 0.168 0.45 0.458 0.443 I 0.2335 0.3804
B 0.306 0.272 0.425 1.478 23 29 23 1 8 4
3 2 51 3 9
0.08 0.130 0.12
0.065 0.120 0.32 0.130 0.126 J 0.0778 0.026 0.048 0.13 0.1268
C 0.219 0.195 0.121 1.056 74 9 13
2 1 5 9 8
0.06 0.065 0.063
D 0.044 0.039 0.013 0.024 0.061 0.211 Table 6.3 Attribute Visibility Score
5 4 4
.
0.052 0.096 0.261 0.253
E 0.175 0.156 0.26 0.243 0.845
1 1 9 6
0.039 0.072 0.19 0.196 0.190
F 0.131 0.117 0.182 0.634
1 1 5 4 2
0.052 0.096 0.261 0.253
G 0.175 0.156 0.26 0.243 0.845
1 1 9 6
0.039 0.072 0.19 0.196 0.190
H 0.131 0.117 0.182 0.634
1 1 5 4 2
0.078 0.144 0.39 0.392 0.380
I 0.262 0.234 0.364 1.267
3 2 01 8 4
0.130 0.126 Table 6.4 Privacy Disclosure Score
J 0.087 0.078 0.026 0.048 0.13 0.121 0.422
9 8
SYSTEM ARCHITECTURE
[1] Abdullah Al Hasib. Threats of online social networks. IJCSNS International Journal of Computer Science
and Network Security, 9(11):288–93, 2009.
[2] Lei Jin, Hassan Takabi, and James BD Joshi. Towards active detection of identity clone attacks on online
social networks. In Proceedings of the first ACM conference on Data and application security and privacy,
pages 27–38. ACM, 2011.
[3] Chi Zhang, Jinyuan Sun, Xiaoyan Zhu, and Yuguang Fang. Privacy and security for online social
networks: challenges and opportunities. Network, IEEE, volume, 24(4):13–18, 2010.
[4] Hongyu Gao, Jun Hu, Tuo Huang, Jingnan Wang, and Yan Chen. Security issues in online social
networks. Internet Computing, IEEE, volume, 15(4):56–63, 2011.
[5] Michael Beye, Arjan Jeckmans, Zekeriya Erkin, Pieter Hartel, Reginald Lagendijk, and Qiang Tang.
Literature overview-privacy in online social networks. 2010.
[6] Abdullah Al Hasib. Threats of online social networks. IJCSNS International Journal of Computer
Science and Network Security, 9(11):288–93, 2009.
[7] Judith DeCew. Privacy. In Edward N. Zalta, editor, The Stanford Encyclopedia of Philosophy, 2012.
[8] Gail-Joon Ahn, Mohamed Shehab, and Anna Squicciarini. Security and privacy in social networks.
Internet Computing, IEEE, 15(3):10–12, 2011.
[9] Prateek Joshi and CC Jay Kuo. Security and privacy in online social networks: A survey. In Multimedia
and Expo (ICME), 2011 IEEE International Conference on, pages 1–6. IEEE, 2011.
[10] Gergely Biczok and Pern Hui Chia. Interdependent privacy: Let me share your data. ´ In Financial
Cryptography and Data Security, pages 338–353. Springer, 2013.
User Login page