De-anonymizing Clustered Social Networks by Percolation Graph Matching

被引:14
|
作者
Chiasserini, Carla-Fabiana [1 ]
Garetto, Michele [2 ]
Leonardi, Emilio [1 ]
机构
[1] Politecn Torino, Dipartimento Elettron & Telecomunicaz, Corso Duca Abruzzi 24, I-10129 Turin, Italy
[2] Univ Torino, Dipartimento Informat, Corso Svizzera 185, I-10149 Turin, Italy
关键词
Graph matching; bootstrap percolation; de-anonymization; ALGORITHM;
D O I
10.1145/3127876
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Online social networks offer the opportunity to collect a huge amount of valuable information about billions of users. The analysis of this data by service providers and unintended third parties are posing serious treats to user privacy. In particular, recent work has shown that users participating in more than one online social network can be identified based only on the structure of their links to other users. An effective tool to de-anonymize social network users is represented by graph matching algorithms. Indeed, by exploiting a sufficiently large set of seed nodes, a percolation process can correctly match almost all nodes across the different social networks. In this article, we show the crucial role of clustering, which is a relevant feature of social network graphs (and many other systems). Clustering has both the effect of making matching algorithms more prone to errors, and the potential to greatly reduce the number of seeds needed to trigger percolation. We show these facts by considering a fairly general class of random geometric graphs with variable clustering level. We assume that seeds can be identified in particular sub-regions of the network graph, while no a priori knowledge about the location of the other nodes is required. Under these conditions, we show how clever algorithms can achieve surprisingly good performance while limiting the number of matching errors.
引用
收藏
页数:39
相关论文
共 50 条
  • [21] De-Anonymizing Avatars in Virtual Reality: Attacks and Countermeasures
    Meng, Yan
    Zhan, Yuxia
    Li, Jiachun
    Du, Suguo
    Zhu, Haojin
    Shen, Xuemin
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2024, 23 (12) : 13342 - 13357
  • [22] PDGM: Percolation-based Directed Graph Matching in Social Networks
    Wang, Lijing
    Cho, Jin-Hee
    Chen, Ing-Ray
    Chen, Jiangzhuo
    2017 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2017,
  • [23] An Active De-anonymizing Attack Against Tor Web Traffic
    Ming Yang
    Xiaodan Gu
    Zhen Ling
    Changxin Yin
    Junzhou Luo
    Tsinghua Science and Technology, 2017, 22 (06) : 702 - 713
  • [24] An Active De-anonymizing Attack Against Tor Web Traffic
    Yang, Ming
    Gu, Xiaodan
    Ling, Zhen
    Yin, Changxin
    Luo, Junzhou
    TSINGHUA SCIENCE AND TECHNOLOGY, 2017, 22 (06) : 702 - 713
  • [25] De-anonymizing Ethereum blockchain smart contracts through code attribution
    Linoy, Shlomi
    Stakhanova, Natalia
    Ray, Suprio
    INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, 2021, 31 (01)
  • [26] Regulating Cryptocurrencies: A Supervised Machine Learning Approach to De-Anonymizing the Bitcoin Blockchain
    Yin, Hao Hua Sun
    Langenheldt, Klaus
    Harlev, Mikkel
    Mukkamala, Raghava Rao
    Vatrapu, Ravi
    JOURNAL OF MANAGEMENT INFORMATION SYSTEMS, 2019, 36 (01) : 37 - 73
  • [27] What your Fitbit Says about You: De-anonymizing Users in Lifelogging Datasets
    Kazlouski, Andrei
    Marchioro, Thomas
    Markatos, Evangelos
    SECRYPT : PROCEEDINGS OF THE 19TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2022, : 341 - 348
  • [28] When Coding Style Survives Compilation: De-anonymizing Programmers from Executable Binaries
    Caliskan, Aylin
    Yamaguchi, Fabian
    Dauber, Edwin
    Harang, Richard
    Rieck, Konrad
    Greenstadt, Rachel
    Narayanan, Arvind
    25TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2018), 2018,
  • [29] De-anonymizing VR Avatars using Non-VR Motion Side-channels
    Sabra, Mohd
    Vinayaga-Sureshkanth, Nisha
    Sharma, Ari
    Maiti, Anindya
    Jadliwala, Murtuza
    PROCEEDINGS OF THE 17TH ACM CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS, WISEC 2024, 2024, : 54 - 65
  • [30] Percolation and epidemic thresholds in clustered networks
    Serrano, M. Angeles
    Boguna, Marian
    PHYSICAL REVIEW LETTERS, 2006, 97 (08)