Data De-anonymization: From Mobility Traces to On-line Social Networks

نویسندگان

  • Shouling Ji
  • Weiqing Li
  • Mudhakar Srivatsa
  • Jing He
  • Raheem Beyah
چکیده

When people utilize social applications and services, their privacy suffers potential serious threat. In this paper, we present a novel, robust, and effective de-anonymization attack to mobility trace data and social data. First, we design a Unified Similarity (US) measurement which takes account of local and global structural characteristics of data, information obtained from auxiliary data, and knowledge inherited from on-going de-anonymization results. By analyzing the measurement on real data sets, we find that some data can potentially be de-anonymized accurately and the other can be de-anonymized in a coarse granularity. Utilizing this property, we present a US based De-Anonymization (DA) framework, which iteratively de-anonymizes data with accuracy guarantee. Then, to de-anonymize large scale data without the knowledge on the overlap size between the anonymized data and the auxiliary data, we generalize DA to an Adaptive De-Anonymization (ADA) framework. By smartly working on two core matching subgraphs, ADA achieves high de-anonymization accuracy and reduces computational overhead. Finally, we examine the presented de-anonymization attack on three well known mobility traces: St Andrews, Infocom06, and Smallblue, and three social data sets: ArnetMiner, Google+, and Facebook. The experimental results demonstrate that the presented de-anonymization framework is very effective and robust to noise. For instance, utilizing the knowledge of one seed mapping merely, 93.2% of the data in Smallblue can be successfully de-anonymized; utilizing the knowledge of ten seed mappings, August 13, 2014 DRAFT

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Structure Based Data De-Anonymization of Social Networks and Mobility Traces

We present a novel de-anonymization attack on mobility trace data and social data. First, we design an Unified Similarity (US) measurement, based on which we present a US based De-Anonymization (DA) framework which iteratively de-anonymizes data with an accuracy guarantee. Then, to de-anonymize data without the knowledge of the overlap size between the anonymized data and the auxiliary data, we...

متن کامل

Radenkovic, Milena and Vaghi, Ivan and Zakhary, Sameh and Benslimane, Abderrahim (2013) AdaptAnon: adaptive anonymity for service queries in mobile opportunistic networks. In: 2013 IEEE International Conference on Communications

Social routing protocols are typically used to transfer messages among users and services in mobile opportunistic networks. Adaptive mechanisms are needed for achieving user anonymization and providing sufficient level of user anonymity due to the constant changes in underlying topology, mobility patterns and density of users and their queries. This paper describes a novel flexible and adaptive...

متن کامل

De-anonymization of Mobility Trajectories: Dissecting the Gaps between Theory and Practice

Human mobility trajectories are increasingly collected by ISPs to assist academic research and commercial applications. Meanwhile, there is a growing concern that individual trajectories can be de-anonymized when the data is shared, using information from external sources (e.g. online social networks). To understand this risk, prior works either estimate the theoretical privacy bound or simulat...

متن کامل

On Your Social Network De-anonymizablity: Quantification and Large Scale Evaluation with Seed Knowledge

In this paper, we conduct the first comprehensive quantification on the perfect de-anonymizability and partial deanonymizability of real world social networks with seed information in general scenarios, where a social network can follow an arbitrary distribution model. This quantification provides the theoretical foundation for existing structure based de-anonymization attacks (e.g., [1][2][3])...

متن کامل

Chapter 10 PRIVACY IN SOCIAL NETWORKS: A SURVEY

In this chapter, we survey the literature on privacy in social networks. We focus both on online social networks and online af liation networks. We formally de ne the possible privacy breaches and describe the privacy attacks that have been studied. We present de nitions of privacy in the context of anonymization together with existing anonymization techniques.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014