Social Network Privacy for Attribute Disclosure Attacks
Abstract
Increasing research on social networks stresses the urgency for producing effective means of ensuring user privacy. Represented ubiquitously as graphs, social networks have a myriad of recently developed techniques to prevent identity disclosure, but the equally important attribute disclosure attacks have been neglected. To address this gap, we introduce an approach to anonymize social networks that have labeled nodes, alpha-nearness, which requires that the label distribution in every neighbourhood of the graph be close to that throughout the entire network. We present an effective greedy algorithm to achieve alpha-nearness and experimentally validate the quality of the solutions it derives.
References (12)
- G. Aggarwal, T. Feder, K. Kenthapadi, R. Motwani, R. Pani- grahy, D. Thomas, and A. Zhu. Anonymizing tables. In ICDT 2005, pages 246-258, 2005.
- J. Cheng, A. W.-C. Fu, and J. Liu. K-isomorphism: privacy preserving network publication against structural attacks. In SIGMOD 2010, pages 459-470, 2010.
- G. Cormode, D. Srivastava, T. Yu, and Q. Zhang. Anonymizing bipartite graph data using safe groupings. VLDB J., 19(1):115- 139, 2010.
- N. Li, T. Li, and S. Venkatasubramanian. t-closeness: Privacy beyond k-anonymity and l-diversity. In ICDE, pages 106-115, 2007.
- K. Liu and E. Terzi. Towards identity anonymization on graphs. In SIGMOD 2008, pages 93-106, 2008.
- A. Machanavajjhala, D. Kifer, J. Gehrke, and M. Venkitasubra- maniam. -diversity: Privacy beyond -anonymity. TKDD, 1(1), 2007.
- A. Meyerson and R. Williams. General k-anonymization is hard. In Principles of Database Systems, 2004.
- B. Thompson and D. Yao. The union-split algorithm and cluster-based anonymization of social networks. In ASIACCS 2009, pages 218-227, 2009.
- B. K. Tripathy and G. K. Panda. A new approach to manage security against neighborhood attacks in social networks. In ASONAM, pages 264-269, 2010.
- W. Wu, Y. Xiao, W. Wang, Z. He, and Z. Wang. k-symmetry model for identity anonymization in social networks. In EDBT 2010, pages 111-122, 2010.
- E. Zheleva and L. Getoor. To join or not to join: the illusion of privacy in social networks with mixed public and private user profiles. In WWW, pages 531-540, 2009.
- B. Zhou and J. Pei. Preserving privacy in social networks against neighborhood attacks. In ICDE 2008, pages 506-515, 2008.