Injecting Uncertainty in Graphs for Identity Obfuscation

نویسندگان

  • Paolo Boldi
  • Francesco Bonchi
  • Aristides Gionis
  • Tamir Tassa
چکیده

Data collected nowadays by social-networking applications create fascinating opportunities for building novel services, as well as expanding our understanding about social structures and their dynamics. Unfortunately, publishing socialnetwork graphs is considered an ill-advised practice due to privacy concerns. To alleviate this problem, several anonymization methods have been proposed, aiming at reducing the risk of a privacy breach on the published data, while still allowing to analyze them and draw relevant conclusions. In this paper we introduce a new anonymization approach that is based on injecting uncertainty in social graphs and publishing the resulting uncertain graphs. While existing approaches obfuscate graph data by adding or removing edges entirely, we propose using a finer-grained perturbation that adds or removes edges partially : this way we can achieve the same desired level of obfuscation with smaller changes in the data, thus maintaining higher utility. Our experiments on real-world networks confirm that at the same level of identity obfuscation our method provides higher usefulness than existing randomized methods that publish standard graphs.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Attacking an Obfuscated Cipher by Injecting Faults

We study the strength of certain obfuscation techniques used to protect software from reverse engineering and tampering. We show that some common obfuscation methods can be defeated using a fault injection attack, namely an attack where during program execution an attacker injects errors into the program environment. By observing how the program fails under certain errors the attacker can deduc...

متن کامل

Culture and Identity: Linking Iranian Identity Components and Cultural Dimensions

Iranian identity cannot be conceived of as a uniform monolithic concept. But, thanks to certain upheavals in the history of the country, it has turned into the triple concept of national/Islamic/modern. Hofstede’s (2001) cultural framework represents a well-validated operationalization of culture based on six cultural dimensions  (power distance, individualism/collectivism, masculinity/feminini...

متن کامل

A Metric to Evaluate Interaction Obfuscation in Online Social Networks

Online social networks (OSNs) have become one of the main communication channels in today’s information society, and their emergence has raised new privacy concerns. The content uploaded to OSNs (such as pictures, status updates, comments) is by default available to the OSN provider, and often to other people to whom the user who uploaded the content did not intend to give access. A different c...

متن کامل

Control Flow Graphs as Malware Signatures

This study proposes a malware detection strategy based on control flow graphs. It carries out experiments to evaluates the false-positive ratios of the proposed methods. Moreover, it presents some insight to establish detection methods sound with respect to some obfuscation techniques.

متن کامل

An Analysis of Altered Fingerprint Detection, Recognition and Verification

The common positioning of Automated Fingerprint Identification Systems (AFIS) in law enforcement and border control submissions has sensitive the need for safeguarding that these systems are not compromised. Whereas numerous problems associated to fingerprint system safekeeping have been considered, including the use of phony fingerprints for masquerading personality, the problem of fingerprint...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • PVLDB

دوره 5  شماره 

صفحات  -

تاریخ انتشار 2012