Finding the Most Appropriate Auxiliary Data for Social Graph Deanonymization
نویسندگان
چکیده
Given only a handful of local structural features about the nodes of an anonymized social graph, how can an adversary select an auxiliary (a.k.a. non-anonymized, known) graph to help him/her deanonymize (a.k.a. re-identify) the individuals in the graph? Examples of local structural features are node’s degree, node’s clustering coe cient, edge density of the node’s neighbors, etc. The objective of the adversary is to find an auxiliary graph that has the maximum nodeoverlap with the anonymized graph. We present conditions under which an adversary may estimate the node-overlap between the graphs; and thus be able to pick the most appropriate auxiliary graph. Specifically, we consider two scenarios. In the first scenario, the adversary has no information about the anonymized graph. We call this situation the no seeds case. In the second scenario, the adversary is able to gain some information about the anonymized graph. For example, the adversary is able to find out that a handful of individuals are present in the anonymized graph. We call this scenario the some seeds case. Our findings indicate that (1) in the no seeds case, an adversary can predict when the node-overlap between the anonymized and auxiliary graphs is low; (2) in the some seeds case, an adversary can identify pairs of anonymized and auxiliary graphs with high node-overlap; and (3) in the some seeds case, an adversary can e↵ectively learn to predict the node-overlap on di↵erent auxiliary graphs.
منابع مشابه
A suitable data model for HIV infection and epidemic detection
Background: In recent years, there has been an increase in the amount and variety of data generated in the field of healthcare, (e.g., data related to the prevalence of contagious diseases in the society). Various patterns of individuals’ relationships in the society make the analysis of the network a complex, highly important process in detecting and preventing the incidence of diseases....
متن کاملSocial Network De-anonymization: More Adversarial Knowledge, More Users Re-Identified?
Following the trend of data trading and data publishing, many online social networks have enabled potentially sensitive data to be exchanged or shared on the web. As a result, users’ privacy could be exposed to malicious third parties since they are extremely vulnerable to de-anonymization attacks, i.e., the attacker links the anonymous nodes in the social network to their real identities with ...
متن کاملQuantification of De-anonymization Risks in Social Networks
The risks of publishing privacy-sensitive data have received considerable attention recently. Several deanonymization attacks have been proposed to re-identify individuals even if data anonymization techniques were applied. However, there is no theoretical quantification for relating the data utility that is preserved by the anonymization techniques and the data vulnerability against de-anonymi...
متن کاملTypicality Matching for Pairs of Correlated Graphs
In this paper, the problem of matching pairs of correlated random graphs with multi-valued edge attributes is considered. Graph matching problems of this nature arise in several settings of practical interest including social network deanonymization, study of biological data, web graphs, etc. An achievable region for successful matching is derived by analyzing a new matching algorithm that we r...
متن کاملOn the Simultaneous Preservation of Privacy and Community Structure in Anonymized Networks
We consider the problem of performing community detection on a network, while maintaining privacy, assuming that the adversary has access to an auxiliary correlated network. We ask the question “Does there exist a regime where the network cannot be deanonymized perfectly, yet the community structure could be learned?.” To answer this question, we derive information theoretic converses for the p...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014