Effective Social Graph Deanonymization Based on Graph Structure and Descriptive Information

被引:27
作者
Fu, Hao [1 ]
Zhang, Aston [2 ]
Xie, Xing [3 ]
机构
[1] Univ Sci & Technol China, Sch Comp Sci & Technol, Hefei, Anhui, Peoples R China
[2] Univ Illinois, Dept Comp Sci, Urbana, IL 61801 USA
[3] Microsoft Res, Beijing, Peoples R China
关键词
Algorithms; Experimentation; Security; Deanonymization; privacy protection; social network; SIMILARITY; NETWORKS; PRIVACY;
D O I
10.1145/2700836
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The study of online social networks has attracted increasing interest. However, concerns are raised for the privacy risks of user data since they have been frequently shared among researchers, advertisers, and application developers. To solve this problem, a number of anonymization algorithms have been recently developed for protecting the privacy of social graphs. In this article, we proposed a graph node similarity measurement in consideration with both graph structure and descriptive information, and a deanonymization algorithm based on the measurement. Using the proposed algorithm, we evaluated the privacy risks of several typical anonymization algorithms on social graphs with thousands of nodes from Microsoft Academic Search, LiveJournal, and the Enron email dataset, and a social graph with millions of nodes from Tencent Weibo. Our results showed that the proposed algorithm was efficient and effective to deanonymize social graphs without any initial seed mappings. Based on the experiments, we also pointed out suggestions on how to better maintain the data utility while preserving privacy.
引用
收藏
页数:29
相关论文
共 46 条
  • [11] A measure of similarity between graph vertices: Applications to synonym extraction and web searching
    Blondel, VD
    Gajardo, A
    Heymans, M
    Senellart, P
    Van Dooren, P
    [J]. SIAM REVIEW, 2004, 46 (04) : 647 - 666
  • [12] BONACICH P, 1987, AM J SOCIOL, V92, P1170, DOI 10.1086/228631
  • [13] Bonchi F, 2011, PROC INT CONF DATA, P924, DOI 10.1109/ICDE.2011.5767905
  • [14] Campan A, 2009, LECT NOTES COMPUT SC, V5456, P33, DOI 10.1007/978-3-642-01718-6_4
  • [15] Cheng J., 2010, P ACM SIGMOD INT C M, P459, DOI DOI 10.1145/1807167.1807218
  • [16] Cook S. A., 1971, Proceedings of the 3rd annual ACM symposium on theory of computing, P151
  • [17] Anonymizing Bipartite Graph Data using Safe Groupings
    Cormode, Graham
    Srivastava, Divesh
    Yu, Ting
    Zhang, Qing
    [J]. PROCEEDINGS OF THE VLDB ENDOWMENT, 2008, 1 (01): : 833 - 844
  • [18] Dwork C, 2006, LECT NOTES COMPUT SC, V4052, P1
  • [19] Gundecha P., 2011, Proceedings of the 17th ACM SIGKDD international conference on knowledge discovery and data mining, P511
  • [20] Resisting Structural Re-identification in Anonymized Social Networks
    Hay, Michael
    Miklau, Gerome
    Jensen, David
    Towsley, Don
    Weis, Philipp
    [J]. PROCEEDINGS OF THE VLDB ENDOWMENT, 2008, 1 (01): : 102 - 114