2021
DOI: 10.1109/access.2021.3064208
|View full text |Cite
|
Sign up to set email alerts
|

Privacy Inference Attack Against Users in Online Social Networks: A Literature Review

Abstract: With the rapid development of social networks, users pay more and more attention to the protection of personal information. However, the transmission of users' personal information through social networks will inevitably lead to privacy leakage and make users attacked. A large amount of privacy information can be inferred from the content and social traces published by users, which leads to the rise of privacy inference technology for users in social networks. Social relationship inference and attribute infere… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(3 citation statements)
references
References 87 publications
0
3
0
Order By: Relevance
“…Apart from the BK and other auxiliary types of data, a new risk known as interdependent privacy risk (IPR) has become one of the major privacy threats in SNs in recent times [43][44][45]. Furthermore, inference attacks [46], ML-based attacks [47], privacy leakage in health SNs [48], profile cloning [49], profile matching [50], community-based threats [51], cross-SN user matching [52], and privacy concerns in different OSN services (e.g., recommendation systems [53], query evaluations [54], and sentiment analyses [55]) have made privacy preservation in OSNs an active area of research.…”
Section: Anonymization Operation That Can Be Applied To Gmentioning
confidence: 99%
“…Apart from the BK and other auxiliary types of data, a new risk known as interdependent privacy risk (IPR) has become one of the major privacy threats in SNs in recent times [43][44][45]. Furthermore, inference attacks [46], ML-based attacks [47], privacy leakage in health SNs [48], profile cloning [49], profile matching [50], community-based threats [51], cross-SN user matching [52], and privacy concerns in different OSN services (e.g., recommendation systems [53], query evaluations [54], and sentiment analyses [55]) have made privacy preservation in OSNs an active area of research.…”
Section: Anonymization Operation That Can Be Applied To Gmentioning
confidence: 99%
“…Attackers can infer the sensitive information contained in the statistically analytical data through the parameters of algorithms [2]. In addition, the other two attack methods: attribute inference [3] and model theft [4] may also lead to the disclosure of private data. Some scholars use technology based on k-anonymity [5] to protect datasets.…”
Section: Introductionmentioning
confidence: 99%
“…OSNs are filled with many types of User Generated Data (UGD), among which the attributes of users and the relationships between users can be used by adversaries to launch various attacks 6,7 including privacy inference attacks 8,9 to infer the privacy of the target users. Since UGD represents a large percentage of the data in OSNs and is relatively easy to acquire, it is therefore important to study privacy inference methods and design counter‐measures against such attacks to prevent the leakage of user privacy 10,11 .…”
Section: Introductionmentioning
confidence: 99%