...
首页> 外文期刊>Security Informatics >Social network integration and analysis using a generalization and probabilistic approach for privacy preservation
【24h】

Social network integration and analysis using a generalization and probabilistic approach for privacy preservation

机译:使用泛化和概率方法进行隐私保护的社交网络集成和分析

获取原文
           

摘要

Social Network Analysis and Mining (SNAM) techniques have drawn significant attention in the recent years due to the popularity of online social media. With the advance of Web 2.0 and SNAM techniques, tools for aggregating, sharing, investigating, and visualizing social network data have been widely explored and developed. SNAM is effective in supporting intelligence and law enforcement force to identify suspects and extract communication patterns of terrorists or criminals. In our previous work, we have shown how social network analysis and visualization techniques are useful in discovering patterns of terrorist social networks. Attribute to the advance of SNAM techniques, relationships among social actors can be visualized through network structures explicitly and implicit patterns can be discovered automatically. Despite the advance of SNAM, the utility of a social network is highly affected by its d completeness. Missing edges or nodes in a social network will reduce the utility of the network. For example, SNAM techniques may not be able to detect groups of social actors if some of the relationships among these social actors are not available. Similarly, SNAM techniques may overestimate the distance between two social actors if some intermediate nodes or edges are missing. Unfortunately, it is common that an organization only have a partial social network due to its limited information sources. In public safety domain, each law enforcement unit has its own criminal social network constructed by the data available from the criminal intelligence and crime database but this network is only a part of the global criminal social network, which can be obtained by integrating criminal social networks from all law enforcement units. However, due to the privacy policy, law enforcement units are not allowed to share the sensitive information of their social network data. A naive and yet practical approach is anonymizing the social network data before publishing or sharing it. However, a modest privacy gains may reduce a substantial SNAM utility. It is a challenge to make a balance between privacy and utility in social network data sharing and integration. In order to share useful information among different organizations without violating the privacy policies and preserving sensitive information, we propose a generalization and probabilistic approach of social network integration in this paper. Particularly, we propose generalizing social networks to preserve privacy and integrating the probabilistic models of the shared information for SNAM. To preserve the identity of sensitive nodes in social network, a simple approach in the literature is removing all node identities. However, it only allows us to investigate of the structural properties of such anonymized social network, but the integration of multiple anonymized social networks will be impossible. To make a balance between privacy and utility, we introduce a social network integration framework which consists of three major steps: (i) constructing generalized sub-graph, (ii) creating generalized information for sharing, and (iii) social networks integration and analysis. We also propose two sub-graph generalization methods namely, edge betweenness based (EBB) and K-nearest neighbor (KNN). We evaluated the effectiveness of these algorithms on the Global Salafi Jihad terrorist social network.
机译:近年来,由于在线社交媒体的普及,社交网络分析和挖掘(SNAM)技术引起了广泛的关注。随着Web 2.0和SNAM技术的发展,用于聚集,共享,调查和可视化社交网络数据的工具已得到广泛的探索和开发。 SNAM可有效支持情报和执法部门识别嫌疑犯并提取恐怖分子或罪犯的交流方式。在我们之前的工作中,我们已经展示了社交网络分析和可视化技术如何在发现恐怖分子社交网络的模式中有用。由于SNAM技术的进步,社交参与者之间的关系可以通过网络结构显式可视化,并且可以自动发现隐式模式。尽管SNAM取得了进步,但社交网络的实用性仍受其完整性的影响。社交网络中缺少边缘或节点会降低网络的实用性。例如,如果这些社交行为者之间的某些关系不可用,SNAM技术可能无法检测到社交行为者的组。类似地,如果缺少某些中间节点或边缘,SNAM技术可能会高估两个社交参与者之间的距离。不幸的是,由于组织的信息来源有限,通常只有一个部分社交网络。在公共安全领域,每个执法部门都有自己的犯罪社交网络,该网络由犯罪情报和犯罪数据库提供的数据构成,但是该网络只是全球犯罪社交网络的一部分,可以通过集成犯罪社交网络来获得来自所有执法部门。但是,由于隐私政策的原因,不允许执法单位共享其社交网络数据的敏感信息。天真而又实用的方法是在发布或共享社交网络数据之前将其匿名化。但是,适度的隐私获取可能会减少大量的SNAM实用程序。在社交网络数据共享和集成的隐私和实用程序之间取得平衡是一个挑战。为了在不违反隐私政策和保留敏感信息的情况下,在不同组织之间共享有用的信息,我们提出了一种社交网络集成的概化和概率方法。特别是,我们建议对社交网络进行泛化以保护隐私,并为SNAM集成共享信息的概率模型。为了保留社交网络中敏感节点的身份,文献中的一种简单方法是删除所有节点身份。但是,这仅允许我们研究这种匿名社交网络的结构特性,但是多个匿名社交网络的集成将是不可能的。为了在隐私和实用程序之间取得平衡,我们引入了一个社交网络集成框架,该框架包括三个主要步骤:(i)构建通用子图,(ii)创建通用信息以进行共享,以及(iii)社交网络集成和分析。我们还提出了两种子图泛化方法,即基于边缘中间性(EBB)和近邻K(KNN)。我们在全球Salafi圣战恐怖分子社交网络上评估了这些算法的有效性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号