Structure based data de-anonymization of social networks and mobility traces

被引:41
作者
Ji, Shouling [1 ]
Li, Weiqing [1 ]
Srivatsa, Mudhakar [2 ]
He, Jing Selena [3 ]
Beyah, Raheem [1 ]
机构
[1] Georgia Institute of Technology, Atlanta, GA
[2] IBM T.J. Watson Research Center, Yorktown Heights, NY
[3] KSU, Kennesaw, GA
来源
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2014年 / 8783卷
关键词
Computers;
D O I
10.1007/978-3-319-13257-0_14
中图分类号
学科分类号
摘要
We present a novel de-anonymization attack on mobility trace data and social data. First, we design an Unified Similarity (US) measurement, based on which we present a US based De-Anonymization (DA) framework which iteratively de-anonymizes data with an accuracy guarantee. Then, to de-anonymize data without the knowledge of the overlap size between the anonymized data and the auxiliary data, we generalize DA to an Adaptive De-Anonymization (ADA) framework. Finally, we examine DA/ADA on mobility traces and social data sets. © Springer International Publishing Switzerland 2014.
引用
收藏
页码:237 / 254
页数:17
相关论文
共 16 条
[1]  
Backstrom L., Dwork C., Kleinberg J., Wherefore Art Thou R3579X? Anonymized Social Networks, Hidden Patterns, and Structural Steganography, WWW 2007, (2007)
[2]  
Narayanan A., Shmatikov V., De-anonymizing Social Networks, S&P 2009, (2009)
[3]  
Srivatsa M., Hicks M., Deanonymizing Mobility Traces: Using Social Networks as a Side-Channel, CCS 2012, (2012)
[4]  
Narayanan A., Shmatikov V., Robust De-anonymization of Large Sparse Datasets (De-anonymizing the Netflix Prize Dataset), S&P 2008, (2008)
[5]  
Goodin D., Poorly anonymized logs reveal NYC cab drivers detailed whereabouts
[6]  
Singh K., Bhola S., Lee W., xBook: Redesigning Privacy Control in Social Networking Platforms, USENIX 2009, (2009)
[7]  
Hornyack P., Han S., Jung J., Schechter S., Wetherall D., “These Aren’t the Droids You’re Looking For”: Retrofitting Android to Protect Data from Imperious Applications, CCS 2011, (2011)
[8]  
Egele M., Kruegel C., Kirda E., Vigna G., PiOS: Detecting Privacy Leaks in iOS Applications, NDSS 2011, (2011)
[9]  
Opsahl T., Agneessens F., Skvoretz J., Node Centrality in Weighted Networks: Generalizing Degree and Shortest Paths, Social Networks, 32, pp. 245-251, (2010)
[10]  
Gong N.Z., Talwalkar A., Mackey L., Huang L., Shin E.C.R., Stefanov E., Shi E., Song D., Jointly Predicting Links and Inferring Attributes using a Social- Attribute Network (SAN), SNA-KDD 2012, (2012)