Social Network De-Anonymization Under Scale-Free User Relations

被引:30
作者
Chiasserini, Carla-Fabiana [1 ,2 ]
Garetto, Michele [3 ]
Leonardi, Emilio [1 ,2 ]
机构
[1] Politecn Torino, I-10129 Turin, Italy
[2] Natl Res Council Italy, Inst Elect Comp & Telecommun Engn, I-10129 Turin, Italy
[3] Univ Torino, I-10124 Turin, Italy
关键词
Computer networks; online social networks; user de-anonymization; BOOTSTRAP PERCOLATION;
D O I
10.1109/TNET.2016.2553843
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We tackle the problem of user de-anonymization in social networks characterized by scale-free relationships between users. The network is modeled as a graph capturing the impact of power-law node degree distribution, which is a fundamental and quite common feature of social networks. Using this model, we present a de-anonymization algorithm that exploits an initial set of users, called seeds, that are known a priori. By employing the bootstrap percolation theory and a novel graph slicing technique, we develop a rigorous analysis of the proposed algorithm under asymptotic conditions. Our analysis shows that large inhomogeneities in the node degree lead to a dramatic reduction in the size of the seed set that is necessary to successfully identify all the other users. We characterize this set size when seeds are properly selected based on the node degree as well as when seeds are uniformly distributed. We prove that, given n nodes, the number of seeds required for network de-anonymization can be as small as n(epsilon), for any small epsilon > 0. In addition, we discuss the complexity of our de-anonymization algorithm and validate our results through numerical experiments on a real social network graph.
引用
收藏
页码:3756 / 3769
页数:14
相关论文
共 17 条
[1]   Bootstrap Percolation in Power-Law Random Graphs [J].
Amini, Hamed ;
Fountoulakis, Nikolaos .
JOURNAL OF STATISTICAL PHYSICS, 2014, 155 (01) :72-92
[2]  
[Anonymous], 2003, Internet Mathematics
[3]   Emergence of scaling in random networks [J].
Barabási, AL ;
Albert, R .
SCIENCE, 1999, 286 (5439) :509-512
[4]  
Bringmann K, 2014, LECT NOTES COMPUT SC, V8737, P197, DOI 10.1007/978-3-662-44777-2_17
[5]  
Cheng-Ta Chiang, 2015, 2015 IEEE Sensors. Proceedings, P1, DOI 10.1109/ICSENS.2015.7370535
[6]  
Chiasserini C.-F., 2015, PROC ACM COSN, P83
[7]   Power-Law Distributions in Empirical Data [J].
Clauset, Aaron ;
Shalizi, Cosma Rohilla ;
Newman, M. E. J. .
SIAM REVIEW, 2009, 51 (04) :661-703
[8]   BOOTSTRAP PERCOLATION ON THE RANDOM GRAPH Gn,p [J].
Janson, Svante ;
Luczak, Tomasz ;
Turova, Tatyana ;
Vallier, Thomas .
ANNALS OF APPLIED PROBABILITY, 2012, 22 (05) :1989-2047
[9]   Structural Data De-anonymization: Quantification, Practice, and Implications [J].
Ji, Shouling ;
Li, Weiqing ;
Srivatsa, Mudhakar ;
Beyah, Raheem .
CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, :1040-1053
[10]   Growing a Graph Matching from a Handful of Seeds [J].
Kazemi, Ehsan ;
Hassani, S. Hamed ;
Grossglauser, Matthias .
PROCEEDINGS OF THE VLDB ENDOWMENT, 2015, 8 (10) :1010-1021