Secure Analysis of Social Media Data

Hareesha Katiganere Siddaramappa, Sumana Maradithaya, Sampath Kumar

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Confidentiality of the social media data during analysis is a major concern. Several real evidences show how the privacy and security of the data is compromised. One of the essential processes with social media data is to find the shortest paths between selected pair of nodes. This paper proposes a technique to modify the original data before analysis. The algorithm calculates shortest paths (data utility) between target nodes and then classifies edges into partially visited, all-visited and unvisited edges. Each category of edges is then perturbed using a dynamic variable value that is bound to satisfy specific constraints such that the shortest path as well as the shortest paths lengths, between the target node pairs remains the same. This paper proposes an approach to preserve the privacy of the weights and also generates an accurate length of the shortest path. It is also observed that the shortest path lengths between any target pairs of nodes are retained. The output is in the form of graphs, that shows that the proposed perturbation strategy perturbs the sensitive edge weights up to a maximum 72%, while keeping the difference in shortest path lengths minimum (up to 3%). It is hence demonstrated that along with preserving the sensitive information by perturbing the edge weights, the data utility is preserved i.e. the shortest path lengths are kept as near as potential to the original ones.

Original languageEnglish
Title of host publication2019 International Conference on Automation, Computational and Technology Management, ICACTM 2019
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages315-319
Number of pages5
ISBN (Electronic)9781538680100
DOIs
Publication statusPublished - 01-04-2019
Event2019 International Conference on Automation, Computational and Technology Management, ICACTM 2019 - London, United Kingdom
Duration: 24-04-201926-04-2019

Publication series

Name2019 International Conference on Automation, Computational and Technology Management, ICACTM 2019

Conference

Conference2019 International Conference on Automation, Computational and Technology Management, ICACTM 2019
CountryUnited Kingdom
CityLondon
Period24-04-1926-04-19

All Science Journal Classification (ASJC) codes

  • Strategy and Management
  • Artificial Intelligence
  • Management of Technology and Innovation
  • Computer Science Applications
  • Information Systems and Management
  • Control and Optimization
  • Instrumentation

Fingerprint Dive into the research topics of 'Secure Analysis of Social Media Data'. Together they form a unique fingerprint.

  • Cite this

    Siddaramappa, H. K., Maradithaya, S., & Kumar, S. (2019). Secure Analysis of Social Media Data. In 2019 International Conference on Automation, Computational and Technology Management, ICACTM 2019 (pp. 315-319). [8776834] (2019 International Conference on Automation, Computational and Technology Management, ICACTM 2019). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/ICACTM.2019.8776834