Preventing active re-identification attacks on social graphs via sybil subgraph obfuscation

被引:2
|
作者
Mauw, Sjouke [1 ]
Ramirez-Cruz, Yunior [1 ]
Trujillo-Rasua, Rolando [2 ]
机构
[1] Univ Luxembourg, SnT, DCS, Esch Sur Alzette, Luxembourg
[2] Deakin Univ, Sch Informat Technol, Burwood, Vic, Australia
关键词
Private social graph publication; Anonymisation; Active adversaries; K-DEGREE ANONYMITY; PRIVACY; ANONYMIZATION; NETWORKS; UTILITY; MODEL;
D O I
10.1007/s10115-022-01662-z
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Active re-identification attacks constitute a serious threat to privacy-preserving social graph publication, because of the ability of active adversaries to leverage fake accounts, a.k.a. sybil nodes, to enforce structural patterns that can be used to re-identify their victims on anonymised graphs. Several formal privacy properties have been enunciated with the purpose of characterising the resistance of a graph against active attacks. However, anonymisation methods devised on the basis of these properties have so far been able to address only restricted special cases, where the adversaries are assumed to leverage a very small number of sybil nodes. In this paper, we present a new probabilistic interpretation of active re-identification attacks on social graphs. Unlike the aforementioned privacy properties, which model the protection from active adversaries as the task of making victim nodes indistinguishable in terms of their fingerprints with respect to all potential attackers, our new formulation introduces a more complete view, where the attack is countered by jointly preventing the attacker from retrieving the set of sybil nodes, and from using these sybil nodes for re-identifying the victims. Under the new formulation, we show that k-symmetry, a privacy property introduced in the context of passive attacks, provides a sufficient condition for the protection against active re-identification attacks leveraging an arbitrary number of sybil nodes. Moreover, we show that the algorithm K-Match, originally devised for efficiently enforcing the related notion of k-automorphism, also guarantees k-symmetry. Empirical results on real-life and synthetic graphs demonstrate that our formulation allows, for the first time, to publish anonymised social graphs (with formal privacy guarantees) that effectively resist the strongest active re-identification attack reported in the literature, even when it leverages a large number of sybil nodes.
引用
收藏
页码:1077 / 1100
页数:24
相关论文
共 50 条
  • [1] Preventing active re-identification attacks on social graphs via sybil subgraph obfuscation
    Sjouke Mauw
    Yunior Ramírez-Cruz
    Rolando Trujillo-Rasua
    Knowledge and Information Systems, 2022, 64 : 1077 - 1100
  • [2] Active Re-identification Attacks on Periodically Released Dynamic Social Graphs
    Chen, Xihui
    Kepuska, Ema
    Mauw, Sjouke
    Ramirez-Cruz, Yunior
    COMPUTER SECURITY - ESORICS 2020, PT II, 2020, 12309 : 185 - 205
  • [3] The risk of node re-identification in labeled social graphs
    Sameera Horawalavithana
    Juan Arroyo Flores
    John Skvoretz
    Adriana Iamnitchi
    Applied Network Science, 4
  • [4] The risk of node re-identification in labeled social graphs
    Horawalavithana, Sameera
    Flores, Juan Arroyo
    Skvoretz, John
    Iamnitchi, Adriana
    APPLIED NETWORK SCIENCE, 2019, 4 (01)
  • [5] Diversity, Homophily and the Risk of Node Re-identification in Labeled Social Graphs
    Horawalavithana, Sameera
    Gandy, Clayton
    Flores, Juan Arroyo
    Skvoretz, John
    Iamnitchi, Adriana
    COMPLEX NETWORKS AND THEIR APPLICATIONS VII, VOL 2, 2019, 813 : 400 - 411
  • [6] Privacy Re-Identification Attacks on Tabular GANs
    Alshantti, Abdallah
    Rasheed, Adil
    Westad, Frank
    SECURITY AND PRIVACY, 2025, 8 (01):
  • [7] Re-Identification Attacks against the Topics API
    Jha, Nikhil
    Trevisan, Martino
    Leonardi, Emilio
    Mellia, Marco
    ACM TRANSACTIONS ON THE WEB, 2024, 18 (03)
  • [8] Occluded Person Re-Identification via Defending Against Attacks From Obstacles
    Wang, Shujuan
    Liu, Run
    Li, Huafeng
    Qi, Guanqiu
    Yu, Zhengtao
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 147 - 161
  • [9] SybilGuard: Defending against sybil attacks via social networks
    Yu, Haifeng
    Kaminsky, Michael
    Gibbons, Phillip B.
    Flaxman, Abraham D.
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2008, 16 (03) : 576 - 589
  • [10] Preventing Sybil Attacks by Privilege Attenuation: A Design Principle for Social Network Systems
    Fong, Philip W. L.
    2011 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2011), 2011, : 263 - 278