Enhanced Privacy Preservation in Facebook Databases Using an Combined Approach with K-Member Fuzzy Clustering and Lyrebird Optimization Algorithm

Authors

  • Suresh R, Rajavarman V N, Kevin Andrews S

Keywords:

Facebook, Lyrebird Optimization Algorithm, Anonymization Technique, Fuzzy Clustering Algorithm, Digital Forensics.

Abstract

Facebook's rapid growth has led to the collection of vast personal data, including age, location, occupation, and contact information, which poses significant privacy risks despite its utility in law enforcement and forensic investigations. The primary challenge is balancing the need for forensic access with protecting user privacy, ensuring that shared data does not allow for individual identification. Traditional anonymisation strategies like K-Anonymity (KA), l-diversity (LD), and t-closeness (TC) aim to safeguard personal data by removing or altering identifying information. However, these methods often prove inadequate, leaving data exposed to attribute and link disclosures, similarity attacks, and resulting in considerable information loss. This study introduces a more efficient anonymisation technique that combines K-member fuzzy clustering with the Modified Lyrebird Optimisation Algorithm (KFCMLOA). An Enhanced K-member version of the fuzzy c-means algorithm is first used to form balanced clusters, ensuring that each cluster has a minimum of K members. These clusters are then further refined and the data is anonymised using the Lyrebird Optimisation Algorithm (LOA). This discovery is important because it can protect anonymised Facebook databases from similarity attacks, identity, attribute, and link leaks, while reducing information loss.

Downloads

Download data is not yet available.

References

Tønnesson, S., Zaw Oo, M. and Aung, N. L., "Pretending to be States: The use of Facebook by Armed Groups in Myanmar". Journal of Contemporary Asia, 52(2), pp. 200-225, (2022). https://doi.org/10.1016/j.jretconser.2021.102501

Zhu, T., Li, J., Hu, X., Xiong, P. and Zhou, W., "The Dynamic Privacy-Preserving Mechanisms for Online Dynamic Social Networks". IEEE Transactions on Knowledge Data Engineering, 34(6), pp. 2962-2974, (2020). DOI: 10.1109/TKDE.2020.3015835

Powell, T. and Haynes, C., "Social Media Data in Digital Forensics Investigations". Digital Forensic Education: An Experiential Learning Approach, pp. 281-303, (2020). https://doi.org/10.1007/978-3-030-23547-5_14

Stoyanova, M., Nikoloudakis, Y., Panagiotakis, S., Pallis, E. and Markakis, E. K., "A Survey on the Internet of Things (Iot) Forensics: Challenges, Approaches, and Open Issues". IEEE Communication Survey & Tutorials, 22(2), pp. 1191-1221, (2020). DOI: 10.1109/COMST.2019.2962586

Quan‐Haase, A. and Ho, D., "Online Privacy Concerns and Privacy Protection Strategies Among Older Adults in East York, Canada". Journal of the Association for Information Science and Technology, 71(9), pp. 1089-1102, (2020). https://doi.org/10.1002/asi.24364

Gangarde, R., Sharma, A., Pawar, A., Joshi, R. and Gonge, S., "Privacy Preservation in Online Social Networks Using Multiple-Graph-Properties-Based Clustering to Ensure K-Anonymity, L-Diversity, and T-Closeness". Electronics, 10(22), pp. 2877, (2021). https://doi.org/10.3390/electronics10222877

Mehta, B. B. and Rao, U. P., "Improved L-Diversity: Scalable Anonymization Approach for Privacy Preserving Big Data Publishing". Journal of King Saud University- Computer and Information Science, 34(4), pp. 1423-1430, (2022). https://doi.org/10.1016/j.jksuci.2019.08.006

Chu, Z., He, J., Li, J., Wang, Q., Zhang, X. and Zhu, N., "SSKM_DP: Differential Privacy Data Publishing Method Via SFLA-Kohonen Network". Applied Science, 13(6), pp. 3823, (2023). https://doi.org/10.3390/app13063823

Zigomitros, A., Casino, F., Solanas, A. and Patsakis, C., "A Survey on Privacy Properties for Data Publishing of Relational Data". IEEE Access, 8, pp. 51071-51099, (2020). DOI: 10.1109/ACCESS.2020.2980235

Majeed, A. and Lee, S., "Anonymization Techniques for Privacy Preserving Data Publishing: A Comprehensive Survey". IEEE Access, 9, pp. 8512-8545, (2020). DOI: 10.1109/ACCESS.2020.3045700

Torra, V. and Navarro-Arribas, G., "Attribute Disclosure Risk for K-Anonymity: The Case of Numerical Data". International Journal of Information Security, 22(6), pp. 2015-2024, (2023). https://doi.org/10.1007/s10207-023-00730-x

Lawrance, J. U., Jesudhasan, J. V. N. and Thampiraj Rittammal, J. B., "Parallel Fuzzy C-Means Clustering Based Big Data Anonymization Using Hadoop Mapreduce". Wireless Personal Communications, pp. 1-28, (2024). https://doi.org/10.1007/s11277-024-11101-7

Narwal, A., "Resource Utilization Based on Hybrid WOA-LOA Optimization With Credit Based Resource Aware Load Balancing and Scheduling Algorithm for Cloud Computing". Journal of Grid Computer, 22(3), pp. 1-24, (2024). https://doi.org/10.1007/s10723-024-09776-0

Majeed, A. and Lee, S., "Attribute Susceptibility and Entropy Based Data Anonymization To Improve Users Community Privacy and Utility in Publishing Data". Applied Intelligent, 50(8), pp. 2555-2574, (2020). https://doi.org/10.1007/s10489-020-01656-w

Ikotun, A. M. and Ezugwu, A. E., "Enhanced Firefly-K-Means Clustering with Adaptive Mutation and Central Limit Theorem for Automatic Clustering of High-Dimensional Datasets". Applied Science, 12(23), pp. 12275, (2022). https://doi.org/10.3390/app122312275

Ewees, A. A., Elaziz, M. A. and Oliva, D., "A New Multi-Objective Optimization Algorithm Combined With Opposition-Based Learning". Expert Systems with Applications, 165, pp. 113844, (2021). https://doi.org/10.1016/j.eswa.2020.113844

Khan, R., Tao, X., Anjum, A., Sajjad, H., Malik, S. U. R., Khan, A. and Amiri, F., "Privacy Preserving for Multiple Sensitive Attributes Against Fingerprint Correlation Attack Satisfying C‐Diversity". Wireless Communications and Mobile Computing 2020, 1, pp. 8416823, (2020). https://doi.org/10.1155/2020/8416823

Langari, R. K., Sardar, S., Abdollah, S., Mousavi, A. and Radfar, R., "Combined Fuzzy Clustering and Firefly Algorithm for Privacy Preserving in Social Networksm". Expert Systems Applications, 141, pp. 112968, (2020). https://doi.org/10.1016/j.eswa.2019.112968

Zhang, C., Jiang, H., Cheng, X., Zhao, F., Cai, Z. and Tian, Z., "Utility Analysis on Privacy-Preservation Algorithms for Online Social Networks: An Empirical Study". Personal and Ubiquitous Computing, 25, pp. 1063-1079, (2021). https://doi.org/10.1007/s00779-019-01287-0

Frimpong, S. A., Han, M., Boahen, E. K., Sosu, R. N. A., Hanson, I., Larbi-Siaw, O. and Senkyire, I. B., "RecGuard: An Efficient Privacy Preservation Blockchain-Based System for Online Social Network Users". Blockchain: Research Applications, 4(1), pp. 100111, (2023). https://doi.org/10.1016/j.bcra.2022.100111

Jain, A. K., Sahoo, S. R. and Kaubiyal, J., "Online Social Networks Security and Privacy: Comprehensive Review and Analysis". Complex Intelligent Systems, 7(5), pp. 2157-2177, (2021). https://doi.org/10.1007/s40747-021-00409-7

Dehghani, M., Bektemyssova, G., Montazeri, Z., Shaikemelev, G., Malik, O. P. and Dhiman, G., "Lyrebird Optimization Algorithm: A New Bio-Inspired Metaheuristic Algorithm for Solving Optimization Problems," Biomimetics, 8(6), pp. 507, 2023. https://doi.org/10.3390/biomimetics8060507

Canbay, Y., "On the Complexity of Optimal K-Anonymity: A New Proof Based on Graph Coloring". IEEE Access, (2024). DOI: 10.1109/ACCESS.2024.3424399

Yang, Y., Li, M. and Ma, X., "A Point Cloud Simplification Method Based On Modified Fuzzy C‐Means Clustering Algorithm with Feature Information Reserved". Mathematical Problems in Engineering 2020, 1, pp. 5713137, (2020). https://doi.org/10.1155/2020/5713137

Subramaniam, M., Kathirvel, A., Sabitha, E. and Basha, H. A., "Modified Firefly Algorithm and Fuzzy C-Mean Clustering Based Semantic Information Retrieval". Journal of Web Engineering, 20(1), pp. 33-52, (2021). DOI: 10.13052/jwe1540-9589.2012

Downloads

Published

12.06.2024

How to Cite

Suresh R. (2024). Enhanced Privacy Preservation in Facebook Databases Using an Combined Approach with K-Member Fuzzy Clustering and Lyrebird Optimization Algorithm. International Journal of Intelligent Systems and Applications in Engineering, 12(4), 4700–4708. Retrieved from https://www.ijisae.org/index.php/IJISAE/article/view/7167

Issue

Section

Research Article