Secure Analysis of Social Media Data

Hareesha Katiganere Siddaramappa, Sumana Maradithaya, Sampath Kumar

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Confidentiality of the social media data during analysis is a major concern. Several real evidences show how the privacy and security of the data is compromised. One of the essential processes with social media data is to find the shortest paths between selected pair of nodes. This paper proposes a technique to modify the original data before analysis. The algorithm calculates shortest paths (data utility) between target nodes and then classifies edges into partially visited, all-visited and unvisited edges. Each category of edges is then perturbed using a dynamic variable value that is bound to satisfy specific constraints such that the shortest path as well as the shortest paths lengths, between the target node pairs remains the same. This paper proposes an approach to preserve the privacy of the weights and also generates an accurate length of the shortest path. It is also observed that the shortest path lengths between any target pairs of nodes are retained. The output is in the form of graphs, that shows that the proposed perturbation strategy perturbs the sensitive edge weights up to a maximum 72%, while keeping the difference in shortest path lengths minimum (up to 3%). It is hence demonstrated that along with preserving the sensitive information by perturbing the edge weights, the data utility is preserved i.e. the shortest path lengths are kept as near as potential to the original ones.

Original languageEnglish
Title of host publication2019 International Conference on Automation, Computational and Technology Management, ICACTM 2019
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages315-319
Number of pages5
ISBN (Electronic)9781538680100
DOIs
Publication statusPublished - 01-04-2019
Event2019 International Conference on Automation, Computational and Technology Management, ICACTM 2019 - London, United Kingdom
Duration: 24-04-201926-04-2019

Publication series

Name2019 International Conference on Automation, Computational and Technology Management, ICACTM 2019

Conference

Conference2019 International Conference on Automation, Computational and Technology Management, ICACTM 2019
CountryUnited Kingdom
CityLondon
Period24-04-1926-04-19

Fingerprint

Social Media
Shortest path
Path Length
privacy
Vertex of a graph
Target
Privacy
Social media
Confidentiality
preserving
Data analysis
Classify
Perturbation
Calculate
perturbation
Node
output
Output
Graph in graph theory

All Science Journal Classification (ASJC) codes

  • Strategy and Management
  • Artificial Intelligence
  • Management of Technology and Innovation
  • Computer Science Applications
  • Information Systems and Management
  • Control and Optimization
  • Instrumentation

Cite this

Siddaramappa, H. K., Maradithaya, S., & Kumar, S. (2019). Secure Analysis of Social Media Data. In 2019 International Conference on Automation, Computational and Technology Management, ICACTM 2019 (pp. 315-319). [8776834] (2019 International Conference on Automation, Computational and Technology Management, ICACTM 2019). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/ICACTM.2019.8776834
Siddaramappa, Hareesha Katiganere ; Maradithaya, Sumana ; Kumar, Sampath. / Secure Analysis of Social Media Data. 2019 International Conference on Automation, Computational and Technology Management, ICACTM 2019. Institute of Electrical and Electronics Engineers Inc., 2019. pp. 315-319 (2019 International Conference on Automation, Computational and Technology Management, ICACTM 2019).
@inproceedings{33b32619250f4c1ab015f27d6850ed38,
title = "Secure Analysis of Social Media Data",
abstract = "Confidentiality of the social media data during analysis is a major concern. Several real evidences show how the privacy and security of the data is compromised. One of the essential processes with social media data is to find the shortest paths between selected pair of nodes. This paper proposes a technique to modify the original data before analysis. The algorithm calculates shortest paths (data utility) between target nodes and then classifies edges into partially visited, all-visited and unvisited edges. Each category of edges is then perturbed using a dynamic variable value that is bound to satisfy specific constraints such that the shortest path as well as the shortest paths lengths, between the target node pairs remains the same. This paper proposes an approach to preserve the privacy of the weights and also generates an accurate length of the shortest path. It is also observed that the shortest path lengths between any target pairs of nodes are retained. The output is in the form of graphs, that shows that the proposed perturbation strategy perturbs the sensitive edge weights up to a maximum 72{\%}, while keeping the difference in shortest path lengths minimum (up to 3{\%}). It is hence demonstrated that along with preserving the sensitive information by perturbing the edge weights, the data utility is preserved i.e. the shortest path lengths are kept as near as potential to the original ones.",
author = "Siddaramappa, {Hareesha Katiganere} and Sumana Maradithaya and Sampath Kumar",
year = "2019",
month = "4",
day = "1",
doi = "10.1109/ICACTM.2019.8776834",
language = "English",
series = "2019 International Conference on Automation, Computational and Technology Management, ICACTM 2019",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
pages = "315--319",
booktitle = "2019 International Conference on Automation, Computational and Technology Management, ICACTM 2019",
address = "United States",

}

Siddaramappa, HK, Maradithaya, S & Kumar, S 2019, Secure Analysis of Social Media Data. in 2019 International Conference on Automation, Computational and Technology Management, ICACTM 2019., 8776834, 2019 International Conference on Automation, Computational and Technology Management, ICACTM 2019, Institute of Electrical and Electronics Engineers Inc., pp. 315-319, 2019 International Conference on Automation, Computational and Technology Management, ICACTM 2019, London, United Kingdom, 24-04-19. https://doi.org/10.1109/ICACTM.2019.8776834

Secure Analysis of Social Media Data. / Siddaramappa, Hareesha Katiganere; Maradithaya, Sumana; Kumar, Sampath.

2019 International Conference on Automation, Computational and Technology Management, ICACTM 2019. Institute of Electrical and Electronics Engineers Inc., 2019. p. 315-319 8776834 (2019 International Conference on Automation, Computational and Technology Management, ICACTM 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - Secure Analysis of Social Media Data

AU - Siddaramappa, Hareesha Katiganere

AU - Maradithaya, Sumana

AU - Kumar, Sampath

PY - 2019/4/1

Y1 - 2019/4/1

N2 - Confidentiality of the social media data during analysis is a major concern. Several real evidences show how the privacy and security of the data is compromised. One of the essential processes with social media data is to find the shortest paths between selected pair of nodes. This paper proposes a technique to modify the original data before analysis. The algorithm calculates shortest paths (data utility) between target nodes and then classifies edges into partially visited, all-visited and unvisited edges. Each category of edges is then perturbed using a dynamic variable value that is bound to satisfy specific constraints such that the shortest path as well as the shortest paths lengths, between the target node pairs remains the same. This paper proposes an approach to preserve the privacy of the weights and also generates an accurate length of the shortest path. It is also observed that the shortest path lengths between any target pairs of nodes are retained. The output is in the form of graphs, that shows that the proposed perturbation strategy perturbs the sensitive edge weights up to a maximum 72%, while keeping the difference in shortest path lengths minimum (up to 3%). It is hence demonstrated that along with preserving the sensitive information by perturbing the edge weights, the data utility is preserved i.e. the shortest path lengths are kept as near as potential to the original ones.

AB - Confidentiality of the social media data during analysis is a major concern. Several real evidences show how the privacy and security of the data is compromised. One of the essential processes with social media data is to find the shortest paths between selected pair of nodes. This paper proposes a technique to modify the original data before analysis. The algorithm calculates shortest paths (data utility) between target nodes and then classifies edges into partially visited, all-visited and unvisited edges. Each category of edges is then perturbed using a dynamic variable value that is bound to satisfy specific constraints such that the shortest path as well as the shortest paths lengths, between the target node pairs remains the same. This paper proposes an approach to preserve the privacy of the weights and also generates an accurate length of the shortest path. It is also observed that the shortest path lengths between any target pairs of nodes are retained. The output is in the form of graphs, that shows that the proposed perturbation strategy perturbs the sensitive edge weights up to a maximum 72%, while keeping the difference in shortest path lengths minimum (up to 3%). It is hence demonstrated that along with preserving the sensitive information by perturbing the edge weights, the data utility is preserved i.e. the shortest path lengths are kept as near as potential to the original ones.

UR - http://www.scopus.com/inward/record.url?scp=85070640808&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85070640808&partnerID=8YFLogxK

U2 - 10.1109/ICACTM.2019.8776834

DO - 10.1109/ICACTM.2019.8776834

M3 - Conference contribution

T3 - 2019 International Conference on Automation, Computational and Technology Management, ICACTM 2019

SP - 315

EP - 319

BT - 2019 International Conference on Automation, Computational and Technology Management, ICACTM 2019

PB - Institute of Electrical and Electronics Engineers Inc.

ER -

Siddaramappa HK, Maradithaya S, Kumar S. Secure Analysis of Social Media Data. In 2019 International Conference on Automation, Computational and Technology Management, ICACTM 2019. Institute of Electrical and Electronics Engineers Inc. 2019. p. 315-319. 8776834. (2019 International Conference on Automation, Computational and Technology Management, ICACTM 2019). https://doi.org/10.1109/ICACTM.2019.8776834