The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.01 - Jan. (2014 vol.26)
pp: 180-193
Javier Parra-Arnau , Universitat Politècnica de Catalunya, Barcelona
Andrea Perego , Joint Research Centre of the European Commission, Ispra
Elena Ferrari , University of Insubria, Varese
Jordi Forne , Universitat Politècnica de Catalunya, Barcelona
David Rebollo-Monedero , Universitat Politècnica de Catalunya, Barcelona
ABSTRACT
Collaborative tagging is one of the most popular services available online, and it allows end user to loosely classify either online or offline resources based on their feedback, expressed in the form of free-text labels (i.e., tags). Although tags may not be per se sensitive information, the wide use of collaborative tagging services increases the risk of cross referencing, thereby seriously compromising user privacy. In this paper, we make a first contribution toward the development of a privacy-preserving collaborative tagging service, by showing how a specific privacy-enhancing technology, namely tag suppression, can be used to protect end-user privacy. Moreover, we analyze how our approach can affect the effectiveness of a policy-based collaborative tagging system that supports enhanced web access functionalities, like content filtering and discovery, based on preferences specified by end users.
INDEX TERMS
Privacy, Collaboration, Entropy, Semantics, Tag clouds, Data privacy,privacy-utility tradeoff, Policy-based collaborative tagging, social bookmarking, tag suppression, privacy-enhancing technology, Shannon's entropy
CITATION
Javier Parra-Arnau, Andrea Perego, Elena Ferrari, Jordi Forne, David Rebollo-Monedero, "Privacy-Preserving Enhanced Collaborative Tagging", IEEE Transactions on Knowledge & Data Engineering, vol.26, no. 1, pp. 180-193, Jan. 2014, doi:10.1109/TKDE.2012.248
REFERENCES
[1] P. Mika, "Ontologies Are Us: A Unified Model of Social Networks and Semantics," Proc. Int'l Semantic Web Conf. (ISWC '05), Y. Gil, E. Motta, V. Benjamins, and M. Musen, eds., pp. 522-536, 2005.
[2] X. Wu, L. Zhang, and Y. Yu, "Exploring Social Annotations for the Semantic Web," Proc. 15th Int'l World Wide Web Conf. (WWW), pp. 417-426, 2006.
[3] B. Markines, C. Cattuto, F. Menczer, D. Benz, A. Hotho, and S. Gerd, "Evaluating Similarity Measures for Emergent Semantics of Social Tagging," Proc. 18th Int'l Conf. World Wide Web (WWW), pp. 641-650, 2009.
[4] C. Marlow, M. Naaman, D. Boyd, and M. Davis, "HT06, Tagging Paper, Taxonomy, Flickr, Academic Article, to Read," Proc. 17th Conf. Hypertext and Hypermedia (HYPERTEXT), pp. 31-40, 2006.
[5] B. Carminati, E. Ferrari, and A. Perego, "Combining Social Networks and Semantic Web Technologies for Personalizing Web Access," Proc. Fourth Int'l Conf. Collaborative Computing: Networking, Applications and Worksharing, pp. 126-144, 2008.
[6] R. Gross and A. Acquisti, "Information Revelation and Privacy in Online Social Networks," Proc. ACM Workshop Privacy Electronic Soc. (WPES), pp. 71-80, 2005.
[7] S.B. Barnes, "A Privacy Paradox: Social Networking in the United States," First Monday, vol. 11, no. 9, Sept. 2006.
[8] J. Parra-Arnau, D. Rebollo-Monedero, and J. Forné, "A Privacy-Preserving Architecture for the Semantic Web Based on Tag Suppression," Proc. Seventh Int'l Conf. Trust, Privacy, Security, Digital Business (TrustBus), pp. 58-68, Aug. 2010.
[9] J. Voß, "Tagging, Folksonomy & Co - Renaissance of Manual Indexing?" Computer Research Repository, vol. abs/cs/0701072, 2007.
[10] G. Adomavicius and A. Tuzhilin, "Toward the Next Generation of Recommender Systems: A Survey of the State-of-the-Art and Possible Extensions," IEEE Trans. Knowledge Data Eng., vol. 17, no. 6, pp. 734-749, June 2005.
[11] P. Heymann, D. Ramage, and H. Garcia-Molina, "Social Tag Prediction," Proc. 31st Ann. Int'l ACM SIGIR Conf. Research Development Information Retrieval, pp. 531-538, 2008.
[12] E. Frías-Martinez, M. Cebrián, and A. Jaimes, "A Study on the Granularity of User Modeling for Tag Prediction," Proc. IEEE/WIC/ACM Int'l Conf. Web Intelligence Intelligent Agent Technology (WIIAT), pp. 828-831, 2008.
[13] Z. Yun and F. Boqin, "Tag-Based User Modeling Using Formal Concept Analysis," Proc. IEEE Eighth Int'l Conf. Computer Information Technology (CIT), pp. 485-490, 2008.
[14] A. Shepitsen, J. Gemmell, B. Mobasher, and R. Burke, "Personalized Recommendation in Social Tagging Systems Using Hierarchical Clustering," Proc. ACM Conf. Recommender Systems (RecSys), pp. 259-266, 2008.
[15] M. Bundschus, S. Yu, V. Tresp, A. Rettinger, M. Dejori, and H.-P. Kriegel, "Hierarchical Bayesian Models for Collaborative Tagging Systems," Proc. IEEE Int'l Conf. Data Mining (ICDM), pp. 728-733, 2009.
[16] X. Li, C.G.M. Snoek, and M. Worring, "Learning Social Tag Relevance by Neighbor Voting," IEEE Trans. Multimedia, vol. 11, no. 7, pp. 1310-1322, Nov. 2009.
[17] S. Marti and H. Garcia-Molina, "Taxonomy of Trust: Categorizing P2P Reputation Systems," Computer Networks, vol. 50, pp. 472-484, Mar. 2006.
[18] K. Bischoff, C.S. Firan, W. Nejdl, and R. Paiu, "Can All Tags Be Used for Search?" Proc. 17th ACM Conf. Information and Knowledge Management (CIKM), pp. 193-202, 2008.
[19] P. Heymann, G. Koutrika, and H. Garcia-Molina, "Can Social Bookmarking Improve Web Search?" Proc. Int'l Conf. Web Search Data Mining (WSDM), pp. 195-206, 2008.
[20] J. Golbeck, "Combining Provenance with Trust in Social Networks for Semantic Web Content Filtering," Proc. Int'l Conf. Provenance and Annotation of Data, pp. 101-108, 2006.
[21] H. Polat and W. Du, "Privacy-Preserving Collaborative Filtering Using Randomized Perturbation Techniques," Proc. SIAM Int'l Conf. Data Mining (SDM), 2003.
[22] H. Polat and W. Du, "SVD-Based Collaborative Filtering with Privacy," Proc. ACM Int'l Symp. Applied Computing (SASC), pp. 791-795, 2005.
[23] H. Kargupta, S. Datta, Q. Wang, and K. Sivakumar, "On the Privacy Preserving Properties of Random Data Perturbation Techniques," Proc. IEEE Int'l Conf. Data Mining (ICDM), pp. 99-106, 2003.
[24] Z. Huang, W. Du, and B. Chen, "Deriving Private Information from Randomized Data," Proc. ACM SIGMOD Int'l Conf. Management Data, pp. 37-48, 2005.
[25] T.M. Cover and J.A. Thomas, Elements of Information Theory, second ed. Wiley, 2006.
[26] D. Rebollo-Monedero, J. Forné, and J. Domingo-Ferrer, "Coprivate Query Profile Obfuscation by Means of Optimal Query Exchange between Users," IEEE Trans. Dependable and Secure Computing, vol. 9, no. 5, pp. 641-654, Sept.-Oct. 2012.
[27] J. Parra-Arnau, D. Rebollo-Monedero, and J. Forné, "A Privacy-Protecting Architecture for Collaborative Filtering via Forgery and Suppression of Ratings," Proc. Int'l Workshop Data Privacy Management, Autonomous Spontaneus Security (DPM), pp. 42-57, Sept. 2011.
[28] D. Rebollo-Monedero and J. Forné, "Optimal Query Forgery for Private Information Retrieval," IEEE Trans. Information Theory, vol. 56, no. 9, pp. 4631-4642, Sept. 2010.
[29] D. Rebollo-Monedero, J. Parra-Arnau, and J. Forné, "An Information-Theoretic Privacy Criterion for Query Forgery in Information Retrieval," Proc. Int'l Conf. Security Technology (SecTech), pp. 146-154, Dec. 2011.
[30] E.T. Jaynes, "On the Rationale of Maximum-Entropy Methods," Proc. IEEE, vol. 70, no. 9, pp. 939-952, Sept. 1982.
[31] C.E. Shannon, "Communication Theory of Secrecy Systems," Bell Systems Technical J., vol. 28, pp. 656-715, 1949.
[32] A. Wyner, "The Wiretap Channel," Bell Systems Technical J., vol. 54, pp. 1355-1367, 1975.
[33] C. Díaz, S. Seys, J. Claessens, and B. Preneel, "Towards Measuring Anonymity," Proc. Workshop Priv. Enhanc. Technology (PET), pp. 54-68, Apr. 2002.
[34] C. Díaz, "Anonymity and Privacy in Electronic Services," PhD dissertation, Katholieke Univ. Leuven, Dec. 2005.
[35] S. Boyd and L. Vandenberghe, Convex Optimization. Cambridge Univ. Press, 2004.
[36] E. Ferrari and B. Thuraisingham, "Secure Database Systems," Advanced Database Technology and Design, M. Piattini and O. Diaz, eds., ch. 11, pp. 353-403, Artech House, Inc., 2000.
[37] http://www.dai-labor.de/en/competence_centers/ irml datasets/. 2013.
[38] S.P. Lloyd, "Least Squares Quantization in PCM," IEEE Trans. Information Theory, vol. IT-28, no. 2, pp. 129-137, Mar. 1982.
[39] R.H. Byrd, J.C. Gilbert, and J. Nocedal, "A Trust Region Method Based on Interior Point Techniques for Nonlinear Programming," Math. Programming, vol. 89, no. 1, pp. 149-185, 2000.
[40] R.H. Byrd, M.E. Hribar, and J. Nocedal, "An Interior Point Algorithm for Large-Scale Nonlinear Programming," SIAM J. Optimization, vol. 9, no. 4, pp. 877-900, 1999.
[41] R.A. Waltz, J.L. Morales, J. Nocedal, and D. Orban, "An Interior Algorithm for Nonlinear Optimization that Combines Line Search and Trust Region Steps," Math. Programming, vol. 107, no. 3, pp. 391-408, 2006.
[42] W.E. Mackay, "Triggers and Barriers to Customizing Software," Proc. SIGCHI Conf. Human Factor Computing Systems, pp. 153-160, 1991.
[43] M. Grahl, A. Hotho, and G. Stumme, "Conceptual Clustering of Social Bookmarking Sites," Proc. Int'l Conf. Knowledge Management (I-KNOW), pp. 356-364, Sept. 2007.
[44] L. Specia and E. Motta, "Integrating Folksonomies with the Semantic Web," Proc. Int'l Semantic Web Conf., pp. 624-639, 2007.
[45] D.S. Hochbaum and D.B. Shmoys, "A Best Possible Heuristic for the $k$ -Center Problem," Math. Operations Research, vol. 10, no. 2, pp. 180-184, 1985.
[46] G. Hamerly and C. Elkan, "Alternatives to the $k$ -Means Algorithm that Find Better Clusterings," Proc. 11th Int'l Conf. Information Knowledge Management (CIKM), pp. 600-607, 2002.
58 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool