Academia.eduAcademia.edu

Outline

Social Network De-anonymization

2019, ACM Transactions on Internet Technology

https://doi.org/10.1145/3310363

Abstract

Previous works on social network de-anonymization focus on designing accurate and efficient de-anonymization methods. We attempt to investigate the intrinsic relationship between the attacker’s knowledge and the expected de-anonymization gain. A common intuition is that more knowledge results in more successful de-anonymization. However, our analysis shows this is not necessarily true if the attacker uses the full background knowledge for de-anonymization. Our findings leave intriguing implications for the attacker to make better use of the background knowledge for de-anonymization and for the data owners to better measure the privacy risk when releasing their data to third parties.

References (37)

  1. Ralph Gross and Alessandro Acquisti, "Information revelation and privacy in online social networks," in Proceedings of the 2005 ACM workshop on Privacy in the electronic society. ACM, 2005, pp. 71-80.
  2. Shah Chirag, Capra Robert, and Preben Hansen, "Collaborative infor- mation seeking: guest editors' introduction," Computer, vol. 47, no. 3, pp. 22-25, 2014.
  3. Zhe Xu, Jay Ramanathan, and Rajiv Ramnath, "Identifying knowledge brokers and their role in enterprise research through social media," Computer, , no. 3, pp. 26-31, 2014.
  4. Arvind Narayanan and Vitaly Shmatikov, "De-anonymizing social networks," in IEEE S&P, 2009, pp. 173-187.
  5. Lars Backstrom, Cynthia Dwork, and Jon Kleinberg, "Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography," in WWW. ACM, 2007, pp. 181-190.
  6. Shouling Ji, Weiqing Li, Mudhakar Srivatsa, and Raheem Beyah, "Struc- tural data de-anonymization: Quantification, practice, and implications," in CCS. ACM, 2014, pp. 1040-1053.
  7. Shouling Ji, Weiqing Li, Neil Zhenqiang Gong, Prateek Mittal, and Ra- heem Beyah, "On your social network de-anonymizablity: Quantification and large scale evaluation with seed knowledge," in NDSS. ISOC, 2015.
  8. James Cheng, Ada Wai-chee Fu, and Jia Liu, "K-isomorphism: privacy preserving network publication against structural attacks," in SIGMOD. ACM, 2010, pp. 459-470.
  9. Lei Zou, Lei Chen, and M Tamer Özsu, "K-automorphism: A general framework for privacy preserving network publication," PVLDB, vol. 2, no. 1, pp. 946-957, 2009.
  10. Bin Zhou and Jian Pei, "Preserving privacy in social networks against neighborhood attacks," in IEEE ICDE, 2008, pp. 506-515.
  11. Guojun Wang, Qin Liu, Feng Li, Shuhui Yang, and Jie Wu, "Outsourcing privacy-preserving social networks to a cloud," in IEEE INFOCOM, 2013, pp. 2886-2894.
  12. Michael Hay, Gerome Miklau, David Jensen, Philipp Weis, and Sid- dharth Srivastava, "Anonymizing social networks," Computer Science Department Faculty Publication Series, p. 180, 2007.
  13. Paul Erdös and Alfréd Rényi, "On the evolution of random graphs," Publ. Math. Inst. Hung. Acad. Sci, vol. 5, pp. 17-61, 1960.
  14. Fan Chung and Linyuan Lu, "Connected components in random graphs with given expected degree sequences," Annals of combinatorics, vol. 6, no. 2, pp. 125-145, 2002.
  15. Stephen A Cook, "The complexity of theorem-proving procedures," in STOC. ACM, 1971, pp. 151-158.
  16. Latanya Sweeney, "k-anonymity: A model for protecting privacy," International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol. 10, no. 05, pp. 557-570, 2002.
  17. Per O Seglen, "The skewness of science," Journal of the American Society for Information Science, vol. 43, no. 9, pp. 628-638, 1992.
  18. Lev Muchnik, Sen Pei, Lucas C Parra, Saulo DS Reis, José S Andrade Jr, Shlomo Havlin, and Hernán A Makse, "Origins of power-law degree distribution in the heterogeneity of human activity in social networks," Scientific reports, vol. 3, 2013.
  19. Krzysztof Choromański, Michał Matuszak, and Jacek Mikisz, "Scale- free graph with preferential attachment and evolving internal vertex structure," Journal of Statistical Physics, vol. 151, no. 6, pp. 1175- 1183, 2013.
  20. Réka Albert and Albert-László Barabási, "Statistical mechanics of complex networks," Reviews of modern physics, vol. 74, no. 1, pp. 47, 2002.
  21. Jianwei Qian, Xiang-Yang Li, Chunhong Zhang, and Linlin Chen, "De-anonymizing social networks and inferring private attributes using knowledge graphs," in INFOCOM. IEEE, 2016.
  22. Chih-Hua Tai, Philip S Yu, De-Nian Yang, and Ming-Syan Chen, "Structural diversity for privacy in publishing social networks.," in SDM. SIAM, 2011, pp. 35-46.
  23. George M Slota and Kamesh Madduri, "Fast approximate subgraph counting and enumeration," in ICPP. IEEE, 2013, pp. 210-219.
  24. László Babai, "Graph isomorphism in quasipolynomial time," arXiv preprint arXiv:1512.03547, 2015.
  25. Venkatesan T Chakaravarthy, Michael Kapralov, Prakash Murali, Fab- rizio Petrini, Xinyu Que, Yogish Sabharwal, and Baruch Schieber, "Subgraph counting: Color coding beyond trees," arXiv preprint arXiv:1602.04478, 2016.
  26. Chih-Hua Tai, Philip S Yu, De-Nian Yang, and Ming-Syan Chen, "Privacy-preserving social network publication against friendship at- tacks," in SIGKDD. ACM, 2011, pp. 1262-1270.
  27. Pedram Pedarsani, Daniel R Figueiredo, and Matthias Grossglauser, "A bayesian method for matching two similar graphs without seeds.," in Allerton, 2013, pp. 1598-1607.
  28. Huahai He and Ambuj K Singh, "Graphs-at-a-time: query language and access methods for graph databases," in SIGMOD. ACM, 2008, pp. 405-418.
  29. Gjergji Kasneci, Fabian M Suchanek, Georgiana Ifrim, Maya Ramanath, and Gerhard Weikum, "Naga: Searching and ranking knowledge," in ICDE. IEEE, 2008, pp. 953-962.
  30. Shijie Zhang, Jiong Yang, and Wei Jin, "Sapper: Subgraph indexing and approximate matching in large graphs," PVLDB, vol. 3, no. 1-2, pp. 1185-1194, 2010.
  31. Eric PrudHommeaux, Andy Seaborne, et al., "Sparql query language for rdf," W3C recommendation, vol. 15, 2008.
  32. Rosalba Giugno and Dennis Shasha, "Graphgrep: A fast and universal method for querying graphs," in Pattern Recognition, 2002. Proceedings. 16th International Conference on. IEEE, 2002, vol. 2, pp. 112-115.
  33. Lei Zou, Lei Chen, and M Tamer Özsu, "Distance-join: Pattern match query in a large graph database," PVLDB, vol. 2, no. 1, pp. 886-897, 2009.
  34. Zhao Sun, Hongzhi Wang, Haixun Wang, Bin Shao, and Jianzhong Li, "Efficient subgraph matching on billion node graphs," PVLDB, vol. 5, no. 9, pp. 788-799, 2012.
  35. Noga Alon, Phuong Dao, Iman Hajirasouliha, Fereydoun Hormozdiari, and S Cenk Sahinalp, "Biomolecular network motif counting and discovery by color coding," Bioinformatics, vol. 24, no. 13, pp. i241- i249, 2008.
  36. Svante Janson, "Poisson approximation for large deviations," Random Structures & Algorithms, vol. 1, no. 2, pp. 221-229, 1990.
  37. Svante Janson, Krzysztof Oleszkiewicz, and Andrzej Ruciński, "Upper tails for subgraph counts in random graphs," Israel Journal of Mathe- matics, vol. 142, no. 1, pp. 61-92, 2004.