Online anonymity protection in computer-mediated communication
Document Type
Article
Publication Date
9-1-2010
Abstract
In any situation where a set of personal attributes are revealed, there is a chance that revealed data can be linked back to its owner. Examples of such situations are publishing user profile micro-data or information about social ties, sharing profile information on social networking sites, or revealing personal information in computer-mediated communication (CMC). Measuring user anonymity is the first step to ensuring that the identity of the owner of revealed information cannot be inferred. Most current measures of anonymity ignore important factors such as the probabilistic nature of identity inference, the inferrer's outside knowledge, and the correlation between user attributes. Furthermore, in the social computing domain, variations in personal information and various levels of information exchange among users make the problem more complicated. We present an information-entropy-based realistic estimation of the user anonymity level to deal with these issues in social computing in an effort to help predict the identity inference risks. We then address implementation issues of online protection by proposing complexity reduction methods that take advantage of basic information entropy properties. Our analysis and delay estimation based on experimental data show that our methods are viable, effective, and efficient in facilitating privacy in social computing and synchronous CMCs. © 2010 IEEE.
Identifier
77955682924 (Scopus)
Publication Title
IEEE Transactions on Information Forensics and Security
External Full Text Location
https://doi.org/10.1109/TIFS.2010.2051261
ISSN
15566013
First Page
570
Last Page
580
Issue
3
Volume
5
Grant
CNS 0454081
Fund Ref
National Science Foundation
Recommended Citation
    Motahari, Sara; Ziavras, Sotirios G.; and Jones, Quentin, "Online anonymity protection in computer-mediated communication" (2010). Faculty Publications.  6108.
    
    
    
        https://digitalcommons.njit.edu/fac_pubs/6108
    
 
				 
					