Composition attack against social network data

被引:5
|
作者
Medkova, Jana [1 ]
机构
[1] Univ Hradec Kralove, Fac Informat & Management, Rokitanskeho 62, Hradec Kralove 50003, Czech Republic
关键词
Privacy; Data anonymization; Social network; Composition attack; Scale-free network; ANONYMIZATION; PERSONALITY;
D O I
10.1016/j.cose.2018.01.002
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The importance of social networks is growing with the fast development of social network technologies and the steady growth in their user communities. Given that the collection of data from social networks is essential for academic research and commercial applications, the prevention of leakage of sensitive information has become very crucial. The majority of anonymization techniques are focused on the threats associated with publishing one social network dataset. As most Internet users participate in more than one social network, a user's records are likely to appear in two published social network datasets. The level of anonymity of each dataset may present only a small security risk; however, there is no guarantee that a combination of the two datasets has the same level of anonymity. An attack on the privacy of an individual using two published datasets containing his/her records is called a composition attack. The composition attack was recently investigated as a threat to two relational datasets; however, it has not yet been considered as a potential danger to two datasets containing social network data. The novel contribution of this paper is that the composition attack is applied to anonymized social network data. A new algorithm for the composition attack is proposed and its usability is demonstrated with experiments using pairs of synthetic scale-free networks substituting real social networks. (C) 2018 Elsevier Ltd. All rights reserved.
引用
收藏
页码:115 / 129
页数:15
相关论文
共 50 条
  • [1] A Defense Mechanism against Location Cheating Attack in Social Network
    Li, Qing
    Ye, Ayong
    Xu, Li
    2017 IEEE SECOND INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC), 2017, : 549 - 553
  • [2] Mutual Friend Attack Prevention in Social Network Data Publishing
    Macwan, Kamalkumar R.
    Patel, Sankita J.
    SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING, SPACE 2017, 2017, 10662 : 210 - 225
  • [3] A Privacy Protection Method for Social Network Data against Content/Degree Attacks
    Sung, Min Kyoung
    Lee, Ki Yong
    Shin, Jun-Bum
    Chung, Yon Dohn
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2012, E95D (01): : 152 - 160
  • [4] Coordination Approach to Mitigate Composition Attack
    Wahida, Farah
    Sattar, A. H. M. Sarowar
    Hossain, Md Muktar
    2020 23RD INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY (ICCIT 2020), 2020,
  • [5] An Efficient and Robust Social Network De-anonymization Attack
    Gulyas, Gabor Gyorgy
    Simon, Benedek
    Imre, Sandor
    PROCEEDINGS OF THE 2016 ACM WORKSHOP ON PRIVACY IN THE ELECTRONIC SOCIETY (WPES'16), 2016, : 1 - 11
  • [6] Privacy-Preserving Sketching for Online Social Network Data Publication
    Gao, Tianchong
    Li, Feng
    2019 16TH ANNUAL IEEE INTERNATIONAL CONFERENCE ON SENSING, COMMUNICATION, AND NETWORKING (SECON), 2019,
  • [7] Privacy Inference Attack Against Users in Online Social Networks: A Literature Review
    Piao, Yangheran
    Ye, Kai
    Cui, Xiaohui
    IEEE ACCESS, 2021, 9 : 40417 - 40431
  • [8] Triangle randomization for social network data anonymization
    Brankovic, Ljiljana
    Lopez, Nacho
    Miller, Mirka
    Sebe, Francesc
    ARS MATHEMATICA CONTEMPORANEA, 2014, 7 (02) : 461 - 477
  • [9] A traffic analysis attack to compute social network measures
    Alejandra Guadalupe Silva Trujillo
    Ana Lucila Sandoval Orozco
    Luis Javier García Villalba
    Tai-Hoon Kim
    Multimedia Tools and Applications, 2019, 78 : 29731 - 29745
  • [10] A traffic analysis attack to compute social network measures
    Silva Trujillo, Alejandra Guadalupe
    Sandoval Orozco, Ana Lucila
    Garcia Villalba, Luis Javier
    Kim, Tai-Hoon
    MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (21) : 29731 - 29745