Using Identity Separation Against De-anonymization of Social Networks

被引:0
作者
Gulyas, Gabor Gyoergy [1 ,2 ]
Imre, Sandor [2 ]
机构
[1] BME, Lab Cryptog & Syst Secur, Budapest, Hungary
[2] BME, Mobile Commun & Quantum Technol Lab, Budapest, Hungary
关键词
social networks; privacy; de-anonymization; identity separation;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Due to the nature of the data that is accumulated in social networking services, there are a great variety of data-driven uses. However, private information occasionally gets published within sanitized datasets offered to third parties. In this paper we consider a strong class of de-anonymization attacks that can re-identify these datasets using structural information crawled from other networks. We provide the model level analysis of a technique called identity separation that could be used for hiding information even from these attacks. We show that in case of non-collaborating users ca. 5 0 % of them need to adopt the technique in order to tackle re-identification over the network. We additionally highlight several settings of the technique that allows preserving privacy on the personal level. In the second part of our experiments we evaluate a measure of anonymity, and show that if users with low anonymity values apply identity separation, the minimum adoption rate for repelling the attack drops down to 3 - 15 %. Additionally, we show that it is necessary for top degree nodes to participate.
引用
收藏
页码:113 / 140
页数:28
相关论文
共 23 条
[1]  
Backstrom L, 2007, P 16 INT C WORLD WID, P181, DOI DOI 10.1145/1242572.1242598
[2]  
Bartunov S., 2012, P 6 WORKSH SOC NETW
[3]  
Beato F, 2013, INT CONF PERVAS COMP, P279
[4]  
Beato F, 2011, LECT NOTES COMPUT SC, V6794, P211, DOI 10.1007/978-3-642-22263-4_12
[5]  
Chen Danqi, 2012, DE ANONYMIZING SOCIA
[6]  
Clau S., 2005, P 2005 WORKSH DIG ID, P84, DOI DOI 10.1145/1102486.1102501
[7]   Safebook: A Privacy-Preserving Online Social Network Leveraging on Real-Life Trust [J].
Cutillo, Leucio Antonio ;
Molva, Refik ;
Strufe, Thorsten .
IEEE COMMUNICATIONS MAGAZINE, 2009, 47 (12) :94-101
[8]  
Goga O., 2013, PROC 22 INT WORLD WI, P447, DOI DOI 10.1145/2488388.2488428
[9]  
Gulyas GG, 2011, INFOCOMMUNICATIONS J, V3, P11
[10]  
GULYAS GG, 2009, EM SEC INF SYST TECH, P173