Hiding Information in Social Networks from De-anonymization Attacks by Using Identity Separation

被引:0
作者
Gulyas, Gabor Gyoergy [1 ]
Imre, Sandor [1 ]
机构
[1] Budapest Univ Technol & Econ, Dept Networked Syst & Serv, H-1117 Budapest, Hungary
来源
COMMUNICATIONS AND MULTIMEDIA SECURITY, CMS 2013 | 2013年 / 8099卷
关键词
social networks; privacy; de-anonymization; identity separation;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Social networks allow their users to mark their profile attributes, relationships as private in order to guarantee privacy, although private information get occasionally published within sanitized datasets offered to third parties, such as business partners. Today, powerful de-anonymization attacks exist that enable the finding of corresponding nodes within these datasets and public network data (e. g., crawls of other networks) solely by considering structural information. In this paper, we propose an identity management technique, namely identity separation, as a tool for hiding information from attacks aiming to achieve large-scale re-identification. By simulation experiments we compare the protective strength of identity management to the state-of-the-art attack. We show that while a large fraction of participating users are required to repel the attack, with the proper settings it is possible to effectively hide information, even for a handful of users. In addition, we propose a user-controllable method based on decoy nodes, which turn out to be successful for information hiding as at most 3.33% of hidden nodes are revealed in our experiments.
引用
收藏
页码:173 / 184
页数:12
相关论文
共 10 条
[1]  
[Anonymous], 2007, P 16 INT C WORLD WID
[2]  
Beato F., 2013, 5 IEEE INT WORKSH SE
[3]  
Clauss S., 2005, 2005 WORKSH DIG ID M, P83
[4]   Safebook: A Privacy-Preserving Online Social Network Leveraging on Real-Life Trust [J].
Cutillo, Leucio Antonio ;
Molva, Refik ;
Strufe, Thorsten .
IEEE COMMUNICATIONS MAGAZINE, 2009, 47 (12) :94-101
[5]  
Gulyás GG, 2011, INFOCOMMUNICATIONS J, V3, P11
[6]   Measuring Local Topological Anonymity in Social Networks [J].
Gulyas, Gabor Gyoergy ;
Imre, Sandor .
12TH IEEE INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOPS (ICDMW 2012), 2012, :563-570
[7]  
Narayanan A, 2011, 2011 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), P1825, DOI 10.1109/IJCNN.2011.6033446
[8]   De-anonymizing Social Networks [J].
Narayanan, Arvind ;
Shmatikov, Vitaly .
PROCEEDINGS OF THE 2009 30TH IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2009, :173-187
[9]  
Srivatsa Mudhakar., 2012, ACM C COMP COMM SEC, P628, DOI [https://doi.org/10.1145/2382196.2382262, DOI 10.1145/2382196.2382262]
[10]  
Wei Peng, 2012, 2012 9th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), P587, DOI 10.1109/SECON.2012.6275831