Academia.eduAcademia.edu

Outline

Outsourcing privacy-preserving social networks to a cloud

2013, 2013 Proceedings IEEE INFOCOM

https://doi.org/10.1109/INFCOM.2013.6567099

Abstract

In the real world, companies would publish social networks to a third party, e.g., a cloud service provider, for marketing reasons. Preserving privacy when publishing social network data becomes an important issue. In this paper, we identify a novel type of privacy attack, termed 1*-neighborhood attack. We assume that an attacker has knowledge about the degrees of a target's one-hop neighbors, in addition to the target's 1-neighborhood graph, which consists of the one-hop neighbors of the target and the relationships among these neighbors. With this information, an attacker may re-identify the target from a k-anonymity social network with a probability higher than 1/k, where any node's 1-neighborhood graph is isomorphic with k − 1 other nodes' graphs. To resist the 1*-neighborhood attack, we define a key privacy property, probability indistinguishability, for an outsourced social network, and propose a heuristic indistinguishable group anonymization (HIGA) scheme to generate an anonymized social network with this privacy property. The empirical study indicates that the anonymized social networks can still be used to answer aggregate queries with high accuracy.

References (22)

  1. L. Getoor and C. Diehl, "Link mining: A survey," ACM SIGKDD Explorations Newsletter, 2005.
  2. M. Armbrust, A. Fox, R. Griffith, A. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica et al., "A view of cloud computing," Communications of the ACM, 2010.
  3. G. Wang, Q. Liu, and J. Wu, "Hierarchical attribute-based encryption for fine-grained access control in cloud storage services," in Proceedings of ACM CCS, 2010.
  4. J. Gao, J. Yu, R. Jin, J. Zhou, T. Wang, and D. Yang, "Neighborhood- privacy protected shortest distance computing in cloud," in Proc. of ACM COMAD, 2011.
  5. B. Zhou, J. Pei, and W. Luk, "A brief survey on anonymization techniques for privacy preserving publishing of social network data," ACM SIGKDD Explorations Newsletter, 2008.
  6. J. Potterat, L. Phillips-Plummer, S. Muth, R. Rothenberg, D. Woodhouse, T. Maldonado-Long, H. Zimmerman, and J. Muth, "Risk network structure in the early epidemic phase of HIV transmission in Colorado springs," Sexually Transmitted Infections, 2002.
  7. B. Zhou and J. Pei, "Preserving privacy in social networks against neighborhood attacks," in Proc. of IEEE ICDE, 2008.
  8. L. Page, S. Brin, R. Motwani, and T. Winograd, "The PageRank citation ranking: Bringing order to the web," Stanford InfoLab, Tech. Rep., 1999.
  9. M. Diligenti, M. Gori, and M. Maggini, "A unified probabilistic frame- work for web page scoring systems," IEEE Transactions on Knowledge and Data Engineering, 2004.
  10. E. Zheleva and L. Getoor, "Preserving the privacy of sensitive relation- ships in graph data," in Proc. of ACM PinKDD, 2007.
  11. M. Hay, C. Li, G. Miklau, and D. Jensen, "Accurate estimation of the degree distribution of private networks," in Proc. of IEEE ICDM, 2009.
  12. M. Gori, M. Maggini, and L. Sarti, "Exact and approximate graph matching using random walks," IEEE Transactions on Pattern Analysis and Machine Intelligence, 2005.
  13. K. Liu and E. Terzi, "Towards identity anonymization on graphs," in Proc. of ACM SIGMOD, 2008.
  14. J. Scott, "Social network analysis," Sociology, 1988.
  15. M. Hay, G. Miklau, D. Jensen, P. Weis, and S. Srivastava, "Anonymizing social networks," Tech. Rep., 2007.
  16. A. Barabási and R. Albert, "Emergence of scaling in random networks," Science, 1999.
  17. L. Backstrom, C. Dwork, and J. Kleinberg, "Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganog- raphy," in Proc. of ACM WWW, 2007.
  18. A. Campan and T. Truta, "A clustering approach for data and structural anonymity in social networks," in Proc. of PinKDD, 2008.
  19. L. Zou, L. Chen, and M. Özsu, "K-automorphism: A general framework for privacy preserving network publication," in Proc. of the VLDB, 2009.
  20. J. Cheng, A. Fu, and J. Liu, "K-isomorphism: privacy preserving net- work publication against structural attacks," in Proc. of ACM COMAD, 2010.
  21. X. Ying and X. Wu, "On link privacy in randomizing social networks," Knowledge and Information Systems, 2011.
  22. C. Tai, P. Yu, D. Yang, and M. Chen, "Privacy-preserving social network publication against friendship attacks," in Proc. of ACM KDD, 2011.