Generic placeholder image

Recent Advances in Electrical & Electronic Engineering

Editor-in-Chief

ISSN (Print): 2352-0965
ISSN (Online): 2352-0973

Research Article

Information Leakage Tracking Algorithms in Online Social Networks

Author(s): Yusong Zhang, Mohammad Shabaz* and Shehab Mohamed Beram

Volume 16, Issue 2, 2023

Published on: 25 August, 2022

Page: [126 - 134] Pages: 9

DOI: 10.2174/2352096515666220513111522

Price: $65

Abstract

Aim: To explore information leakage tracking algorithms in online social networks and solve the problem of information leakage in the current online social network, a deterministic leaker tracking algorithm based on digital fingerprints is proposed.

Background: The basic working principle of the algorithm is that the platform uses plug-ins to embed unique user-identifying information before users try to obtain digital media such as images and videos shared by others on the platform.

Objective: Because the scale of users in social networks is extremely large and dynamic, while ensuring the uniqueness of digital fingerprints, it is also necessary to ensure the coding efficiency and scalability of digital fingerprint code words.

Methods: Simulation experiments show that 10 experiments are performed on 10,000–100,000 nodes, the Hamming distance threshold is set to 3, and the length of the hash code and the binary random sequence code are both 64 bits.

Results: The proposed digital fingerprint fast detection scheme exhibits better performance than conventional linear search.

Conclusion: An index table based on hash code and user ID is established and combined with community structure to improve the detection efficiency of digital fingerprints.

Keywords: Leaker tracking, digital fingerprint, trust model, neighbor hash, social network, OSN

[1]
Y. Feng, S. Zhao, and G. Yu, "Research on moving target tracking algorithm based on computer vision in complex scene", Rev. Fac. Ing., vol. 32, no. 16, pp. 784-790, 2017.
[2]
Y. Zhao, "Research on extracting bpm feature values in music beat tracking algorithm", Rev. Fac. Ing., vol. 32, no. 5, pp. 209-216, 2017.
[3]
P.C. Lin, and P.Y. Lin, "Unintentional and involuntary personal information leakage on facebook from user interactions", Trans. Internet Inf. Syst., vol. 10, no. 7, pp. 3301-3318, 2016.
[4]
V. Pham, S. Yu, K. Sood, and L. Cui, "Privacy issues in social networks and analysis: A comprehensive survey", IET Networks, vol. 7, no. 2, pp. 74-84, 2018.
[http://dx.doi.org/10.1049/iet-net.2017.0137]
[5]
F. Buccafurri, L. Fotia, G. Lax, and V. Saraswat, "Analysis-preserving protection of user privacy against information leakage of social-network likes", Inf. Sci., vol. 328, pp. 340-358, 2016.
[http://dx.doi.org/10.1016/j.ins.2015.08.046]
[6]
T. Hong, C. Chang, and J. Shin, "Cnn-based malicious user detection in social networks", Concurr. Computat..
vol. 30, no. 2, pp. e4163.1-e4163.10, 2018. [http://dx.doi.org/10.1002/cpe.4163]
[7]
Zhou and Tian, "Research on community detection of online social network members based on the sparse subspace clustering approach", Future Internet, vol. 11, no. 12, p. 254, 2019.
[8]
X. Xing, G. Sun, Y. Jin, W. Tang, and X. Cheng, "Relay selection based on social relationship prediction and information leakage reduction for mobile social networks", Math. Found. Comput., vol. 1, no. 4, pp. 369-382, 2018.
[http://dx.doi.org/10.3934/mfc.2018018]
[9]
T.T. Dang, K.T. Dang, and J. Küng, "Interaction and visualization design for user privacy interface on online social networks", SN Comput. Sci., vol. 1, no. 5, p. 297, 2020.
[http://dx.doi.org/10.1007/s42979-020-00314-9]
[10]
A. Mohammadi, and H. Hamidi, "Analyzing tools and algorithms for privacy protection and data security in social networks", Int. J. Eng. Trans. B: Appl., vol. 31, no. 8, pp. 1267-1273, 2018.
[11]
X. Li, Y. Xin, C. Zhao, Y. Yang, and Y. Chen, "Graph convolutional networks for privacy metrics in online social networks", Appl. Sci., vol. 10, no. 4, p. 1327, 2020.
[http://dx.doi.org/10.3390/app10041327]
[12]
K.K. Priyaa, K. Lahari, V. Vasundhara, and C. Saranya, "Preventing malicious accounts based on mining with steganography in online", IACSIT Int. J. Eng. Technol., vol. 7, no. 2, pp. 615-618, 2018.
[http://dx.doi.org/10.14419/ijet.v7i2.33.14848]
[13]
Y. Sun, Y. Yuan, G. Wang, and Y. Cheng, "Splitting anonymization: A novel privacy-preserving approach of social network", Knowl. Inf. Syst., vol. 47, no. 3, pp. 595-623, 2016.
[http://dx.doi.org/10.1007/s10115-015-0855-2]
[14]
S. Hamadou, C. Palamidessi, and V. Sassone, "Quantifying leakage in the presence of unreliable sources of information", J. Comput. Syst. Sci., vol. 88, no. 9, pp. 27-52, 2017.
[http://dx.doi.org/10.1016/j.jcss.2017.03.013]
[15]
C. Zhang, "Research on data forwarding method based on TCC-aware in mobile social networks", J. Liaoning Tech. Univ., vol. 36, no. 4, pp. 437-444, 2017.
[16]
N. Yuvaraj, K. Srihari, G. Dhiman, K. Somasundaram, A. Sharma, S. Rajeskannan, M. Soni, G.S. Gaba, M.A. AlZain, and M. Masud, "Nature-inspired-based approach for automated cyberbullying classification on multimedia social networking", Math. Probl. Eng., vol. 2021, p. 2021, 2021.
[http://dx.doi.org/10.1155/2021/6644652]
[17]
G. Veselov, A. Tselykh, A. Sharma, and R. Huang, "Applications of artificial intelligence in evolution of smart cities and societies", Informatica, vol. 45, no. 5, p. 603, 2021.
[18]
Y. Li and A. Sharma, "Regional network education information collection platform for smart classrooms based on big data technology", Informatica, vol. 45, no. 5, 2021.
[19]
Y. Geng, Z. Jie, Z. Yongfang, Y. Ning, and R. Kaiya, "Research on wormhole attack detection algorithm in space information networks", Int. J. Secur. Appl., vol. 10, no. 5, pp. 181-192, 2016.
[http://dx.doi.org/10.14257/ijsia.2016.10.5.17]
[20]
A.K. Das, A. Al Asif, A. Paul, and M.N. Hossain, "Bangla hate speech detection on social media using attention-based recurrent neural network", J. Intell. Syst., vol. 30, no. 1, pp. 578-591, 2021.
[http://dx.doi.org/10.1515/jisys-2020-0060]
[21]
L. Wang, R. Abbas, F.M. Almansour, G.S. Gaba, R. Alroobaea, and M. Masud, "An empirical study on vulnerability assessment and penetration detection for highly sensitive networks", J. Intell. Syst., vol. 30, no. 1, pp. 592-603, 2021.
[http://dx.doi.org/10.1515/jisys-2020-0145]
[22]
A. Sharma, and R. Kumar, "Service level agreement and energy cooperative cyber physical system for quickest healthcare services", J. Intell. Fuzzy Syst., vol. 36, no. 5, pp. 4077-4089, 2019.
[http://dx.doi.org/10.3233/JIFS-169968]
[23]
A.K. Ghoshal, N. Das, and S. Das, "Influence of community structure on misinformation containment in online social networks", Knowl. Base. Syst.. vol. 213, no. 1, pp. 106693, 2020.
[24]
M.M. Ali, "Arabic sentiment analysis about online learning to mitigate covid-19", J. Intell. Syst., vol. 30, no. 1, pp. 524-540, 2021.
[http://dx.doi.org/10.1515/jisys-2020-0115]
[25]
J.C. Zimmer, "Problematic social network use: Its antecedents and impact upon classroom performance", Comput. Educ..
vol. 177, pp. 104368, 2022. [http://dx.doi.org/10.1016/j.compedu.2021.104368]
[26]
D. Yuan, H. Sun, Z. Zhang, H. Ye, and S. Huang, "Intervention algorithm for malicious information in online social networks based on trusted regulator", Int. J. Wirel. Mobile Comput., vol. 18, no. 4, p. 343, 2020.
[http://dx.doi.org/10.1504/IJWMC.2020.108532]
[27]
F. Agneessens, and G.J. Labianca, "Collecting survey-based social network information in work organizations", Soc. Networks, vol. 68, pp. 31-47, 2022.
[http://dx.doi.org/10.1016/j.socnet.2021.04.003]
[28]
A.N. Islam, M. Mäntymäki, S. Laato, and O. Turel, "Adverse consequences of emotional support seeking through social network sites in coping with stress from a global pandemic", Int. J. Inf. Manage..
vol. 62, pp. 102431, 2022. [http://dx.doi.org/10.1016/j.ijinfomgt.2021.102431] [PMID: 34642531]
[29]
Y. Mei, W. Xing, Y. Jian, G. Jie, and T. Wang, "Research on application of lucene search engine in social network platform", Int. J. Hybrid Inf. Technol., vol. 10, no. 8, pp. 53-66, 2017.
[http://dx.doi.org/10.14257/ijhit.2017.10.8.04]
[30]
Z. Zhang, W.P. Tay, M. Draief, X. Wang, E. Chong, and A.O. Hero, "Introduction to the issue on distributed information processing in social networks", IEEE Trans. Signal Inf. Process. Netw., vol. 3, no. 2, pp. 219-221, 2017.
[http://dx.doi.org/10.1109/TSIPN.2017.2699868]
[31]
A. Sharma, and R. Kumar, "Service-level agreement-energy cooperative quickest ambulance routing for critical healthcare services", Arab. J. Sci. Eng., vol. 44, no. 4, pp. 3831-3848, 2019.
[http://dx.doi.org/10.1007/s13369-018-3687-z]
[32]
S. Menini, G. Moretti, M. Corazza, E. Cabrio, S. Tonelli, and S. Villata, "A system to monitor cyberbullying based on message classification and social network analysis",
In 2019 Proceedings of the Third Workshop on Abusive Language Online, 15 Aug, 2019, Florence, Italy, 2019, pp. 105-110. [http://dx.doi.org/10.18653/v1/W19-3511]
[33]
H. Shao, J. Shen, Z. Zhang, and H. Liu, "Research and analysis of video image target tracking algorithm based on significance", Int. J. High Perform. Syst. Archit., vol. 8, no. 1/2, p. 82, 2018.
[http://dx.doi.org/10.1504/IJHPSA.2018.094149]
[34]
S. Mouakket, and Y. Sun, "Investigating the impact of personality traits of social network sites users on information disclosure in china: The moderating role of gender", Inf. Syst. Front., vol. 22, no. 1-2, pp. 1-17, 2020.
[http://dx.doi.org/10.1007/s10796-019-09933-x]
[35]
X. Huang, A. Sharma, and M. Shabaz, "Biomechanical research for running motion based on dynamic analysis of human multi-rigid body model", Int. J. Syst. Assur. Eng. Manag..
pp. 1-10, 2022. [http://dx.doi.org/10.1007/s13198-021-01563-4]
[36]
A. Fan, Q. Wu, X. Yan, X. Lu, and X. Xiao, "Research on influencing factors of personal information disclosure intention of social media in China", Data Inf. Manag., vol. 5, no. 1, pp. 195-207, 2020.
[http://dx.doi.org/10.2478/dim-2020-0038]
[37]
S.N. Molotkov, and K.A. Balygin, "Side channels of information leakage in quantum cryptography based on geometrically uniform coherent states", Laser Phys..
vol. 30, no. 6, p. 065201, 2020. [http://dx.doi.org/10.1088/1555-6611/ab8298]
[38]
T. Wang, W. Wang, H. Liu, and T. Li, "Research on a face real-time tracking algorithm based on particle filter multi-feature fusion", Sensors, vol. 19, no. 5, p. 1245, 2019.
[http://dx.doi.org/10.3390/s19051245] [PMID: 30871046]
[39]
W. Wei, J. Chen, L.I. Dan, and B. Wang, "Partially known information attack on sm2 key exchange protocol", Sci. China Inf. Sci., vol. 62, no. 03, pp. 1-14, 2019.
[http://dx.doi.org/10.1007/s11432-018-9515-9]
[40]
M. Cardaioli, M. Conti, K. Balagani, P. Gasti, and L. Wu, "Pilot: Password and pin information leakage from obfuscated typing videos1", J. Comput. Secur., vol. 27, no. 4, pp. 405-425, 2019.
[http://dx.doi.org/10.3233/JCS-191289]

Rights & Permissions Print Cite
© 2024 Bentham Science Publishers | Privacy Policy