Social Network De-Anonymization Under Scale-Free User Relations

被引:30
作者
Chiasserini, Carla-Fabiana [1 ,2 ]
Garetto, Michele [3 ]
Leonardi, Emilio [1 ,2 ]
机构
[1] Politecn Torino, I-10129 Turin, Italy
[2] Natl Res Council Italy, Inst Elect Comp & Telecommun Engn, I-10129 Turin, Italy
[3] Univ Torino, I-10124 Turin, Italy
关键词
Computer networks; online social networks; user de-anonymization; BOOTSTRAP PERCOLATION;
D O I
10.1109/TNET.2016.2553843
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We tackle the problem of user de-anonymization in social networks characterized by scale-free relationships between users. The network is modeled as a graph capturing the impact of power-law node degree distribution, which is a fundamental and quite common feature of social networks. Using this model, we present a de-anonymization algorithm that exploits an initial set of users, called seeds, that are known a priori. By employing the bootstrap percolation theory and a novel graph slicing technique, we develop a rigorous analysis of the proposed algorithm under asymptotic conditions. Our analysis shows that large inhomogeneities in the node degree lead to a dramatic reduction in the size of the seed set that is necessary to successfully identify all the other users. We characterize this set size when seeds are properly selected based on the node degree as well as when seeds are uniformly distributed. We prove that, given n nodes, the number of seeds required for network de-anonymization can be as small as n(epsilon), for any small epsilon > 0. In addition, we discuss the complexity of our de-anonymization algorithm and validate our results through numerical experiments on a real social network graph.
引用
收藏
页码:3756 / 3769
页数:14
相关论文
共 17 条
[11]   An efficient reconciliation algorithm for social networks [J].
Korula, Nitish ;
Lattanzi, Silvio .
PROCEEDINGS OF THE VLDB ENDOWMENT, 2014, 7 (05) :377-388
[12]   De-anonymizing Social Networks [J].
Narayanan, Arvind ;
Shmatikov, Vitaly .
PROCEEDINGS OF THE 2009 30TH IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2009, :173-187
[13]  
Pedarsani P., 2011, P 17 ACM SIGKDD INT
[14]  
Pedarsani P, 2013, ANN ALLERTON CONF, P1598, DOI 10.1109/Allerton.2013.6736720
[15]  
Srivatsa Mudhakar., 2012, ACM C COMP COMM SEC, P628, DOI [https://doi.org/10.1145/2382196.2382262, DOI 10.1145/2382196.2382262]
[16]  
Viswanath B, 2009, 2ND ACM SIGCOMM WORKSHOP ON ONLINE SOCIAL NETWORKS (WOSN 09), P37
[17]  
Yartseva L., 2013, P 1 ACM C ONL SOC NE, P119