Research Article

Cross-Platform Strong Privacy Protection Mechanism for Review Publication

Table 4

The privacy leakage level and attributes that the adversary can obtain in different levels.

LevelAttributes that the adversary can obtain

0None
1Display name, avatar
2Display name, avatar, real photo, name
3Attributes involved in level 2 and associate them with the user’s attributes across other social networks to determine gender, age, or location
4Attributes involved in level 3, education background
5Attributes involved in level 4, organization, contact information, home address