Privacy Preserving in Online Social Network Data Sharing and Publication

dc.contributor.advisorLin, Xiaojun
dc.contributor.advisorChien, Stanley
dc.contributor.authorGao, Tianchong
dc.contributor.otherLi, Feng
dc.contributor.otherHu, Jianghai
dc.contributor.otherDelp, Edward
dc.date.accessioned2019-09-26T17:10:06Z
dc.date.available2019-09-26T17:10:06Z
dc.date.issued2019-12
dc.degree.date2019en_US
dc.degree.disciplineElectrical & Computer Engineeringen
dc.degree.grantorPurdue Universityen_US
dc.degree.levelPh.D.en_US
dc.descriptionIndiana University-Purdue University Indianapolis (IUPUI)en_US
dc.description.abstractFollowing the trend of online data sharing and publishing, researchers raise their concerns about the privacy problem. Online Social Networks (OSNs), for example, often contain sensitive information about individuals. Therefore, anonymizing network data before releasing it becomes an important issue. This dissertation studies the privacy preservation problem from the perspectives of both attackers and defenders. To defenders, preserving the private information while keeping the utility of the published OSN is essential in data anonymization. At one extreme, the final data equals the original one, which contains all the useful information but has no privacy protection. At the other extreme, the final data is random, which has the best privacy protection but is useless to the third parties. Hence, the defenders aim to explore multiple potential methods to strike a desirable tradeoff between privacy and utility in the published data. This dissertation draws on the very fundamental problem, the definition of utility and privacy. It draws on the design of the privacy criterion, the graph abstraction model, the utility method, and the anonymization method to further address the balance between utility and privacy. To attackers, extracting meaningful information from the collected data is essential in data de-anonymization. De-anonymization mechanisms utilize the similarities between attackers’ prior knowledge and published data to catch the targets. This dissertation focuses on the problems that the published data is periodic, anonymized, and does not cover the target persons. There are two thrusts in studying the de-anonymization attacks: the design of seed mapping method and the innovation of generating-based attack method. To conclude, this dissertation studies the online data privacy problem from both defenders’ and attackers’ point of view and introduces privacy and utility enhancement mechanisms in different novel angles.en_US
dc.identifier.urihttps://hdl.handle.net/1805/20972
dc.identifier.urihttp://dx.doi.org/10.7912/C2/2565
dc.language.isoen_USen_US
dc.rightsAttribution 3.0 United States*
dc.rights.urihttp://creativecommons.org/licenses/by/3.0/us/*
dc.subjectPrivacy protectionen_US
dc.subjectOnline social networksen_US
dc.subjectDifferential privacyen_US
dc.subjectAnonymizationen_US
dc.subjectDe-anonymizationen_US
dc.titlePrivacy Preserving in Online Social Network Data Sharing and Publicationen_US
dc.typeThesisen
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
dissertation.pdf
Size:
5.74 MB
Format:
Adobe Portable Document Format
Description:
Main article
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.99 KB
Format:
Item-specific license agreed upon to submission
Description: