Enhanced Privacy Preservation in Facebook Databases Using an Combined Approach with K-Member Fuzzy Clustering and Lyrebird Optimization Algorithm
Keywords:
Facebook, Lyrebird Optimization Algorithm, Anonymization Technique, Fuzzy Clustering Algorithm, Digital Forensics.Abstract
Facebook's rapid growth has led to the collection of vast personal data, including age, location, occupation, and contact information, which poses significant privacy risks despite its utility in law enforcement and forensic investigations. The primary challenge is balancing the need for forensic access with protecting user privacy, ensuring that shared data does not allow for individual identification. Traditional anonymisation strategies like K-Anonymity (KA), l-diversity (LD), and t-closeness (TC) aim to safeguard personal data by removing or altering identifying information. However, these methods often prove inadequate, leaving data exposed to attribute and link disclosures, similarity attacks, and resulting in considerable information loss. This study introduces a more efficient anonymisation technique that combines K-member fuzzy clustering with the Modified Lyrebird Optimisation Algorithm (KFCMLOA). An Enhanced K-member version of the fuzzy c-means algorithm is first used to form balanced clusters, ensuring that each cluster has a minimum of K members. These clusters are then further refined and the data is anonymised using the Lyrebird Optimisation Algorithm (LOA). This discovery is important because it can protect anonymised Facebook databases from similarity attacks, identity, attribute, and link leaks, while reducing information loss.
Downloads
References
Tønnesson, S., Zaw Oo, M. and Aung, N. L., "Pretending to be States: The use of Facebook by Armed Groups in Myanmar". Journal of Contemporary Asia, 52(2), pp. 200-225, (2022). https://doi.org/10.1016/j.jretconser.2021.102501
Zhu, T., Li, J., Hu, X., Xiong, P. and Zhou, W., "The Dynamic Privacy-Preserving Mechanisms for Online Dynamic Social Networks". IEEE Transactions on Knowledge Data Engineering, 34(6), pp. 2962-2974, (2020). DOI: 10.1109/TKDE.2020.3015835
Powell, T. and Haynes, C., "Social Media Data in Digital Forensics Investigations". Digital Forensic Education: An Experiential Learning Approach, pp. 281-303, (2020). https://doi.org/10.1007/978-3-030-23547-5_14
Stoyanova, M., Nikoloudakis, Y., Panagiotakis, S., Pallis, E. and Markakis, E. K., "A Survey on the Internet of Things (Iot) Forensics: Challenges, Approaches, and Open Issues". IEEE Communication Survey & Tutorials, 22(2), pp. 1191-1221, (2020). DOI: 10.1109/COMST.2019.2962586
Quan‐Haase, A. and Ho, D., "Online Privacy Concerns and Privacy Protection Strategies Among Older Adults in East York, Canada". Journal of the Association for Information Science and Technology, 71(9), pp. 1089-1102, (2020). https://doi.org/10.1002/asi.24364
Gangarde, R., Sharma, A., Pawar, A., Joshi, R. and Gonge, S., "Privacy Preservation in Online Social Networks Using Multiple-Graph-Properties-Based Clustering to Ensure K-Anonymity, L-Diversity, and T-Closeness". Electronics, 10(22), pp. 2877, (2021). https://doi.org/10.3390/electronics10222877
Mehta, B. B. and Rao, U. P., "Improved L-Diversity: Scalable Anonymization Approach for Privacy Preserving Big Data Publishing". Journal of King Saud University- Computer and Information Science, 34(4), pp. 1423-1430, (2022). https://doi.org/10.1016/j.jksuci.2019.08.006
Chu, Z., He, J., Li, J., Wang, Q., Zhang, X. and Zhu, N., "SSKM_DP: Differential Privacy Data Publishing Method Via SFLA-Kohonen Network". Applied Science, 13(6), pp. 3823, (2023). https://doi.org/10.3390/app13063823
Zigomitros, A., Casino, F., Solanas, A. and Patsakis, C., "A Survey on Privacy Properties for Data Publishing of Relational Data". IEEE Access, 8, pp. 51071-51099, (2020). DOI: 10.1109/ACCESS.2020.2980235
Majeed, A. and Lee, S., "Anonymization Techniques for Privacy Preserving Data Publishing: A Comprehensive Survey". IEEE Access, 9, pp. 8512-8545, (2020). DOI: 10.1109/ACCESS.2020.3045700
Torra, V. and Navarro-Arribas, G., "Attribute Disclosure Risk for K-Anonymity: The Case of Numerical Data". International Journal of Information Security, 22(6), pp. 2015-2024, (2023). https://doi.org/10.1007/s10207-023-00730-x
Lawrance, J. U., Jesudhasan, J. V. N. and Thampiraj Rittammal, J. B., "Parallel Fuzzy C-Means Clustering Based Big Data Anonymization Using Hadoop Mapreduce". Wireless Personal Communications, pp. 1-28, (2024). https://doi.org/10.1007/s11277-024-11101-7
Narwal, A., "Resource Utilization Based on Hybrid WOA-LOA Optimization With Credit Based Resource Aware Load Balancing and Scheduling Algorithm for Cloud Computing". Journal of Grid Computer, 22(3), pp. 1-24, (2024). https://doi.org/10.1007/s10723-024-09776-0
Majeed, A. and Lee, S., "Attribute Susceptibility and Entropy Based Data Anonymization To Improve Users Community Privacy and Utility in Publishing Data". Applied Intelligent, 50(8), pp. 2555-2574, (2020). https://doi.org/10.1007/s10489-020-01656-w
Ikotun, A. M. and Ezugwu, A. E., "Enhanced Firefly-K-Means Clustering with Adaptive Mutation and Central Limit Theorem for Automatic Clustering of High-Dimensional Datasets". Applied Science, 12(23), pp. 12275, (2022). https://doi.org/10.3390/app122312275
Ewees, A. A., Elaziz, M. A. and Oliva, D., "A New Multi-Objective Optimization Algorithm Combined With Opposition-Based Learning". Expert Systems with Applications, 165, pp. 113844, (2021). https://doi.org/10.1016/j.eswa.2020.113844
Khan, R., Tao, X., Anjum, A., Sajjad, H., Malik, S. U. R., Khan, A. and Amiri, F., "Privacy Preserving for Multiple Sensitive Attributes Against Fingerprint Correlation Attack Satisfying C‐Diversity". Wireless Communications and Mobile Computing 2020, 1, pp. 8416823, (2020). https://doi.org/10.1155/2020/8416823
Langari, R. K., Sardar, S., Abdollah, S., Mousavi, A. and Radfar, R., "Combined Fuzzy Clustering and Firefly Algorithm for Privacy Preserving in Social Networksm". Expert Systems Applications, 141, pp. 112968, (2020). https://doi.org/10.1016/j.eswa.2019.112968
Zhang, C., Jiang, H., Cheng, X., Zhao, F., Cai, Z. and Tian, Z., "Utility Analysis on Privacy-Preservation Algorithms for Online Social Networks: An Empirical Study". Personal and Ubiquitous Computing, 25, pp. 1063-1079, (2021). https://doi.org/10.1007/s00779-019-01287-0
Frimpong, S. A., Han, M., Boahen, E. K., Sosu, R. N. A., Hanson, I., Larbi-Siaw, O. and Senkyire, I. B., "RecGuard: An Efficient Privacy Preservation Blockchain-Based System for Online Social Network Users". Blockchain: Research Applications, 4(1), pp. 100111, (2023). https://doi.org/10.1016/j.bcra.2022.100111
Jain, A. K., Sahoo, S. R. and Kaubiyal, J., "Online Social Networks Security and Privacy: Comprehensive Review and Analysis". Complex Intelligent Systems, 7(5), pp. 2157-2177, (2021). https://doi.org/10.1007/s40747-021-00409-7
Dehghani, M., Bektemyssova, G., Montazeri, Z., Shaikemelev, G., Malik, O. P. and Dhiman, G., "Lyrebird Optimization Algorithm: A New Bio-Inspired Metaheuristic Algorithm for Solving Optimization Problems," Biomimetics, 8(6), pp. 507, 2023. https://doi.org/10.3390/biomimetics8060507
Canbay, Y., "On the Complexity of Optimal K-Anonymity: A New Proof Based on Graph Coloring". IEEE Access, (2024). DOI: 10.1109/ACCESS.2024.3424399
Yang, Y., Li, M. and Ma, X., "A Point Cloud Simplification Method Based On Modified Fuzzy C‐Means Clustering Algorithm with Feature Information Reserved". Mathematical Problems in Engineering 2020, 1, pp. 5713137, (2020). https://doi.org/10.1155/2020/5713137
Subramaniam, M., Kathirvel, A., Sabitha, E. and Basha, H. A., "Modified Firefly Algorithm and Fuzzy C-Mean Clustering Based Semantic Information Retrieval". Journal of Web Engineering, 20(1), pp. 33-52, (2021). DOI: 10.13052/jwe1540-9589.2012
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.