Social Network De-anonymization
2019, ACM Transactions on Internet Technology
https://doi.org/10.1145/3310363Abstract
Previous works on social network de-anonymization focus on designing accurate and efficient de-anonymization methods. We attempt to investigate the intrinsic relationship between the attacker’s knowledge and the expected de-anonymization gain. A common intuition is that more knowledge results in more successful de-anonymization. However, our analysis shows this is not necessarily true if the attacker uses the full background knowledge for de-anonymization. Our findings leave intriguing implications for the attacker to make better use of the background knowledge for de-anonymization and for the data owners to better measure the privacy risk when releasing their data to third parties.
References (37)
- Ralph Gross and Alessandro Acquisti, "Information revelation and privacy in online social networks," in Proceedings of the 2005 ACM workshop on Privacy in the electronic society. ACM, 2005, pp. 71-80.
- Shah Chirag, Capra Robert, and Preben Hansen, "Collaborative infor- mation seeking: guest editors' introduction," Computer, vol. 47, no. 3, pp. 22-25, 2014.
- Zhe Xu, Jay Ramanathan, and Rajiv Ramnath, "Identifying knowledge brokers and their role in enterprise research through social media," Computer, , no. 3, pp. 26-31, 2014.
- Arvind Narayanan and Vitaly Shmatikov, "De-anonymizing social networks," in IEEE S&P, 2009, pp. 173-187.
- Lars Backstrom, Cynthia Dwork, and Jon Kleinberg, "Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography," in WWW. ACM, 2007, pp. 181-190.
- Shouling Ji, Weiqing Li, Mudhakar Srivatsa, and Raheem Beyah, "Struc- tural data de-anonymization: Quantification, practice, and implications," in CCS. ACM, 2014, pp. 1040-1053.
- Shouling Ji, Weiqing Li, Neil Zhenqiang Gong, Prateek Mittal, and Ra- heem Beyah, "On your social network de-anonymizablity: Quantification and large scale evaluation with seed knowledge," in NDSS. ISOC, 2015.
- James Cheng, Ada Wai-chee Fu, and Jia Liu, "K-isomorphism: privacy preserving network publication against structural attacks," in SIGMOD. ACM, 2010, pp. 459-470.
- Lei Zou, Lei Chen, and M Tamer Özsu, "K-automorphism: A general framework for privacy preserving network publication," PVLDB, vol. 2, no. 1, pp. 946-957, 2009.
- Bin Zhou and Jian Pei, "Preserving privacy in social networks against neighborhood attacks," in IEEE ICDE, 2008, pp. 506-515.
- Guojun Wang, Qin Liu, Feng Li, Shuhui Yang, and Jie Wu, "Outsourcing privacy-preserving social networks to a cloud," in IEEE INFOCOM, 2013, pp. 2886-2894.
- Michael Hay, Gerome Miklau, David Jensen, Philipp Weis, and Sid- dharth Srivastava, "Anonymizing social networks," Computer Science Department Faculty Publication Series, p. 180, 2007.
- Paul Erdös and Alfréd Rényi, "On the evolution of random graphs," Publ. Math. Inst. Hung. Acad. Sci, vol. 5, pp. 17-61, 1960.
- Fan Chung and Linyuan Lu, "Connected components in random graphs with given expected degree sequences," Annals of combinatorics, vol. 6, no. 2, pp. 125-145, 2002.
- Stephen A Cook, "The complexity of theorem-proving procedures," in STOC. ACM, 1971, pp. 151-158.
- Latanya Sweeney, "k-anonymity: A model for protecting privacy," International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol. 10, no. 05, pp. 557-570, 2002.
- Per O Seglen, "The skewness of science," Journal of the American Society for Information Science, vol. 43, no. 9, pp. 628-638, 1992.
- Lev Muchnik, Sen Pei, Lucas C Parra, Saulo DS Reis, José S Andrade Jr, Shlomo Havlin, and Hernán A Makse, "Origins of power-law degree distribution in the heterogeneity of human activity in social networks," Scientific reports, vol. 3, 2013.
- Krzysztof Choromański, Michał Matuszak, and Jacek Mikisz, "Scale- free graph with preferential attachment and evolving internal vertex structure," Journal of Statistical Physics, vol. 151, no. 6, pp. 1175- 1183, 2013.
- Réka Albert and Albert-László Barabási, "Statistical mechanics of complex networks," Reviews of modern physics, vol. 74, no. 1, pp. 47, 2002.
- Jianwei Qian, Xiang-Yang Li, Chunhong Zhang, and Linlin Chen, "De-anonymizing social networks and inferring private attributes using knowledge graphs," in INFOCOM. IEEE, 2016.
- Chih-Hua Tai, Philip S Yu, De-Nian Yang, and Ming-Syan Chen, "Structural diversity for privacy in publishing social networks.," in SDM. SIAM, 2011, pp. 35-46.
- George M Slota and Kamesh Madduri, "Fast approximate subgraph counting and enumeration," in ICPP. IEEE, 2013, pp. 210-219.
- László Babai, "Graph isomorphism in quasipolynomial time," arXiv preprint arXiv:1512.03547, 2015.
- Venkatesan T Chakaravarthy, Michael Kapralov, Prakash Murali, Fab- rizio Petrini, Xinyu Que, Yogish Sabharwal, and Baruch Schieber, "Subgraph counting: Color coding beyond trees," arXiv preprint arXiv:1602.04478, 2016.
- Chih-Hua Tai, Philip S Yu, De-Nian Yang, and Ming-Syan Chen, "Privacy-preserving social network publication against friendship at- tacks," in SIGKDD. ACM, 2011, pp. 1262-1270.
- Pedram Pedarsani, Daniel R Figueiredo, and Matthias Grossglauser, "A bayesian method for matching two similar graphs without seeds.," in Allerton, 2013, pp. 1598-1607.
- Huahai He and Ambuj K Singh, "Graphs-at-a-time: query language and access methods for graph databases," in SIGMOD. ACM, 2008, pp. 405-418.
- Gjergji Kasneci, Fabian M Suchanek, Georgiana Ifrim, Maya Ramanath, and Gerhard Weikum, "Naga: Searching and ranking knowledge," in ICDE. IEEE, 2008, pp. 953-962.
- Shijie Zhang, Jiong Yang, and Wei Jin, "Sapper: Subgraph indexing and approximate matching in large graphs," PVLDB, vol. 3, no. 1-2, pp. 1185-1194, 2010.
- Eric PrudHommeaux, Andy Seaborne, et al., "Sparql query language for rdf," W3C recommendation, vol. 15, 2008.
- Rosalba Giugno and Dennis Shasha, "Graphgrep: A fast and universal method for querying graphs," in Pattern Recognition, 2002. Proceedings. 16th International Conference on. IEEE, 2002, vol. 2, pp. 112-115.
- Lei Zou, Lei Chen, and M Tamer Özsu, "Distance-join: Pattern match query in a large graph database," PVLDB, vol. 2, no. 1, pp. 886-897, 2009.
- Zhao Sun, Hongzhi Wang, Haixun Wang, Bin Shao, and Jianzhong Li, "Efficient subgraph matching on billion node graphs," PVLDB, vol. 5, no. 9, pp. 788-799, 2012.
- Noga Alon, Phuong Dao, Iman Hajirasouliha, Fereydoun Hormozdiari, and S Cenk Sahinalp, "Biomolecular network motif counting and discovery by color coding," Bioinformatics, vol. 24, no. 13, pp. i241- i249, 2008.
- Svante Janson, "Poisson approximation for large deviations," Random Structures & Algorithms, vol. 1, no. 2, pp. 221-229, 1990.
- Svante Janson, Krzysztof Oleszkiewicz, and Andrzej Ruciński, "Upper tails for subgraph counts in random graphs," Israel Journal of Mathe- matics, vol. 142, no. 1, pp. 61-92, 2004.