Analysis of De-anonymization Attacks on Social Networks with Identity Separation

被引:0
作者
Gulyas, Gabor Gy. [1 ]
Imre, Sander [1 ]
机构
[1] Budapest Univ Technol & Econ, Dept Telecommun, Magyar Tudosok Korutja 2, H-1117 Budapest, Hungary
来源
INFOCOMMUNICATIONS JOURNAL | 2011年 / 3卷 / 04期
关键词
De-anonymization; Identity Separation; Social Network; Seed Identification;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Most of today's online social networking services have a flat structure, i.e., these services only al low a single choice of connection type (usually called "friends") for t heir users, and lack the functionality of identity separation. Howe ver, identity partitioning allows users to group their contacts, to share different or even diverse information, and therefor e offer privacy protection against third parties looking to re-iden tify users in sanitized social graph data. In this paper, we anal yze the protective strength of identity separation against these types of structural de-anonymization attacks by introducing a statistical user behavior model and defining attack failure pro bability formally. It turns out from simulations and the par ameter analysis of the model that in case of even a relati vely small number of users applying identity separation, an at tacker is likely to fail.
引用
收藏
页码:11 / 20
页数:10
相关论文
共 25 条
[1]  
Adams P., 2010, VOIC MATT WEB DES C
[2]  
Anderson, 2009, P 2009 AUSTR CURR ST, P1
[3]  
[Anonymous], 2008, TECH REP
[4]  
Backstrom L, 2007, P 16 INT C WORLD WID, P181, DOI DOI 10.1145/1242572.1242598
[5]  
Borcea K., 2005, P WORKSH PRIV ENH PE
[6]  
Borcea-Pfitzmann K., 2005, P DIM05 ACM FAIRF VA, P70
[7]  
Clau S., 2005, P 2005 WORKSH DIG ID, P84, DOI DOI 10.1145/1102486.1102501
[8]   Safebook: A Privacy-Preserving Online Social Network Leveraging on Real-Life Trust [J].
Cutillo, Leucio Antonio ;
Molva, Refik ;
Strufe, Thorsten .
IEEE COMMUNICATIONS MAGAZINE, 2009, 47 (12) :94-101
[9]  
DiMicco JM, 2007, GROUP'07: PROCEEDINGS OF THE 2007 INTERNATIONAL ACM CONFERENCE ON SUPPORTING GROUP WORK, P383
[10]   A comprehensive approach for context-dependent privacy management [J].
Franz, Elke ;
Groba, Christin ;
Springer, Thomas ;
Bergmann, Mike .
ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, :903-910