Finding the Most Appropriate Auxiliary Data for Social Graph Deanonymization

نویسندگان

  • Priya Govindan
  • Sucheta Soundarajan
  • Tina Eliassi-Rad
چکیده

Given only a handful of local structural features about the nodes of an anonymized social graph, how can an adversary select an auxiliary (a.k.a. non-anonymized, known) graph to help him/her deanonymize (a.k.a. re-identify) the individuals in the graph? Examples of local structural features are node’s degree, node’s clustering coe cient, edge density of the node’s neighbors, etc. The objective of the adversary is to find an auxiliary graph that has the maximum nodeoverlap with the anonymized graph. We present conditions under which an adversary may estimate the node-overlap between the graphs; and thus be able to pick the most appropriate auxiliary graph. Specifically, we consider two scenarios. In the first scenario, the adversary has no information about the anonymized graph. We call this situation the no seeds case. In the second scenario, the adversary is able to gain some information about the anonymized graph. For example, the adversary is able to find out that a handful of individuals are present in the anonymized graph. We call this scenario the some seeds case. Our findings indicate that (1) in the no seeds case, an adversary can predict when the node-overlap between the anonymized and auxiliary graphs is low; (2) in the some seeds case, an adversary can identify pairs of anonymized and auxiliary graphs with high node-overlap; and (3) in the some seeds case, an adversary can e↵ectively learn to predict the node-overlap on di↵erent auxiliary graphs.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A suitable data model for HIV infection and epidemic detection

Background: In recent years, there has been an increase in the amount and variety of data generated in the field of healthcare, (e.g., data related to the prevalence of contagious diseases in the society). Various patterns of individuals’ relationships in the society make the analysis of the network a complex, highly important process in detecting and preventing the incidence of diseases....

متن کامل

Social Network De-anonymization: More Adversarial Knowledge, More Users Re-Identified?

Following the trend of data trading and data publishing, many online social networks have enabled potentially sensitive data to be exchanged or shared on the web. As a result, users’ privacy could be exposed to malicious third parties since they are extremely vulnerable to de-anonymization attacks, i.e., the attacker links the anonymous nodes in the social network to their real identities with ...

متن کامل

Quantification of De-anonymization Risks in Social Networks

The risks of publishing privacy-sensitive data have received considerable attention recently. Several deanonymization attacks have been proposed to re-identify individuals even if data anonymization techniques were applied. However, there is no theoretical quantification for relating the data utility that is preserved by the anonymization techniques and the data vulnerability against de-anonymi...

متن کامل

Typicality Matching for Pairs of Correlated Graphs

In this paper, the problem of matching pairs of correlated random graphs with multi-valued edge attributes is considered. Graph matching problems of this nature arise in several settings of practical interest including social network deanonymization, study of biological data, web graphs, etc. An achievable region for successful matching is derived by analyzing a new matching algorithm that we r...

متن کامل

On the Simultaneous Preservation of Privacy and Community Structure in Anonymized Networks

We consider the problem of performing community detection on a network, while maintaining privacy, assuming that the adversary has access to an auxiliary correlated network. We ask the question “Does there exist a regime where the network cannot be deanonymized perfectly, yet the community structure could be learned?.” To answer this question, we derive information theoretic converses for the p...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014