Composite Behavioral Modeling for Identity Theft Detection in Online Social Networks

Authors

  • A Hima Bindu  Assistant Professor, Department of CSE, Bhoj Reddy Engineering College for Women, Hyderabad, Telangana, India
  • Sheelam Sriya Reddy  Department of CSE, Bhoj Reddy Engineering College for Women, Hyderabad, Telangana, India
  • Gurrala Sai Sri  Department of CSE, Bhoj Reddy Engineering College for Women, Hyderabad, Telangana, India

Keywords:

Data privacy, Social networks, User data, K-anonymity, Mobile social networks, Location based services, Dynamic clustering

Abstract

Recent trends show that the popularity of Social Networks (SNs) has been increasing rapidly. From daily communication sites to online communities, an average person’s daily life has become dependent on these online networks. Additionally, the number of people using at least one of the social networks has increased drastically over the years. It is estimated that by the end of the year 2020, one-third of the world’s population will have social accounts. Hence, user privacy protection has gained wide acclaim in the research community. It has also become evident that protection should be provided to these networks from unwanted intruders. In this dissertation, we consider data privacy on online social networks at the network level and the user level. The network-level privacy helps us to prevent information leakage to third-party users like advertisers. To achieve such privacy, we propose various schemes that combine the privacy of all the elements of a social network: node, edge, and attribute privacy by clustering the users based on their attribute similarity. We combine the concepts of k-anonymity and l-diversity to achieve user privacy. To provide user-level privacy, we consider the scenario of mobile social networks as the user location privacy is the much-compromised problem. We provide a distributed solution where users in an area come together to achieve their desired privacy constraints. We also consider the mobility of the user and the network to provide much better results.

References

  1.  (2017). Children and parents: Media use and attitudes report.
  2. Abar, S., Theodoropoulos, G. K., Lemarinier, P., and O’Hare, G. M. (2017). Agent based modelling and simulation tools: A review of the state-of-art software. Com puter Science Review, 24(Supplement C), 13 – 33.
  3. Abbasi, A., Chung, K. S. K., and Hossain, L. (2012). Egocentric analysis of co authorship network structure, position and performance. Information Processing & Management, 48(4), 671–679.
  4. Abril, D., Navarro-Arribas, G., and Torra, V. (2011). On the declassification of confidential documents. In International Conference on Modeling Decisions for Artificial Intelligence, pages 235–246. Springer.
  5. Acquisti, A., Brandimarte, L., and Loewenstein, G. (2015). Privacy and human behavior in the age of information. Science, 347(6221), 509–514.
  6. Acquisti, A., Taylor, C., and Wagman, L. (2016). The economics of privacy. Journal of Economic Literature, 54(2), 442–92.
  7. Acquisti, A., Adjerid, I., Balebako, R., Brandimarte, L., Cranor, L. F., Komanduri, S., Leon, P. G., Sadeh, N., Schaub, F., Sleeper, M., et al. (2017). Nudges for privacy and security: Understanding and assisting users’ choices online. ACM Computing Surveys, 50, 44.
  8. Akhtar, N. (2014). Social network analysis tools. In Communication Systems and Network Technologies (CSNT), 2014 Fourth International Conference on, pages 388–392.IEEE.
  9. Al-Rahmi, W. M., Alias, N., Othman, M. S., Marin, V. I., and Tur, G. (2018). A model of factors affecting learning performance through the use of social media in malaysian higher education. Computers & Education, 121, 59–72.
  10. Albert, D. and Steinberg, L. (2011). Judgment and decision making in adolescence. Journal of Research on Adolescence, 21(1), 211–224.
  11. Alemany, J., del Val, E., Alberola, J., and García-Fornes, A. (2018). Estimation of privacy risk through centrality metrics. Future Generation Computer Systems, 82, 63–76.
  12. Alemany, J., del Val, E., Alberola, J., and García-Fornes, A. (2019a). Enhanc ing the privacy risk awareness of teenagers in online social networks through soft paternalism mechanisms. International Journal of Human-Computer Studies.
  13. Alemany, J., Del Val, E., Alberola, J. M., and Gar?ia-Fornes, A. (2019b). Metrics for privacy assessment when sharing information in online social networks. IEEE Access, 7, 143631–143645.
  14. Alemany, J., Del Val, E., and García-Fornes, A. (2020). Empowering users regard ing the sensitivity of their data in social networks through nudge mechanisms. In Proceedings of the 53rd Hawaii International Conference on System Sciences, pages 2539– 2548.
  15. Alemany Bordera, J. (2016). PESEDIA. Red social para concienciar en privacidad. Mas ter’s thesis, Universitat Politècnica de València, Valencia, Spain.

Downloads

Published

2023-07-09

Issue

Section

Research Articles

How to Cite

[1]
A Hima Bindu, Sheelam Sriya Reddy, Gurrala Sai Sri "Composite Behavioral Modeling for Identity Theft Detection in Online Social Networks" International Journal of Scientific Research in Science, Engineering and Technology (IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 10, Issue 4, pp.73-78, July-August-2023.