Using machine learning techniques for de-anonymization

被引:0
|
作者
Gulyas Gabor Gyorgy [1 ]
机构
[1] INRIA, Rocquencourt, France
来源
INFORMACIOS TARSADALOM | 2017年 / 17卷 / 01期
关键词
anonymity; de-anonymization; machine learning; private sphere protection;
D O I
暂无
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
Today we have unprecedented access to datasets bearing huge potential in regard to both business and research. However, beside their unquestionable utility, privacy breaches pose a significant risk to the release of these datasets (e.g., datasets originating from healthcare are good examples), thus service providers must use anonymization techniques to minimize the risk of unwanted disclosure. In this study, we focus on de-anonymization attacks, algorithms that are designed to "reverse" the anonymization process. In particular, we focus on a novel segment of these attacks that involve machine learning to improve robustness and efficiency. Furthermore, we highlight and discuss the similarity between de-anonymization and authentication: how can these algorithms, which are generally perceived as unethical, be used legitimately for security reasons under special constraints.
引用
收藏
页码:72 / +
页数:16
相关论文
共 50 条
  • [1] IDEAL: An Interactive De-Anonymization Learning System
    Li, Na
    Murugesan, Rajkumar
    Li, Lin
    Zheng, Hao
    2020 IEEE 44TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE (COMPSAC 2020), 2020, : 449 - 454
  • [2] De-anonymization attack on geolocated data
    Gambs, Sebastien
    Killijian, Marc-Olivier
    Cortez, Miguel Niunez del Prado
    JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2014, 80 (08) : 1597 - 1614
  • [3] An Efficient and Robust Social Network De-anonymization Attack
    Gulyas, Gabor Gyorgy
    Simon, Benedek
    Imre, Sandor
    PROCEEDINGS OF THE 2016 ACM WORKSHOP ON PRIVACY IN THE ELECTRONIC SOCIETY (WPES'16), 2016, : 1 - 11
  • [4] De-anonymization attack on geolocated data
    Gambs, Sebastien
    Killijian, Marc-Olivier
    Cortez, Miguel Nunez del Prado
    2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 789 - 797
  • [5] On De-anonymization of Single Tweet Messages
    Le, Hoi
    Safavi-Naini, Reihaneh
    IWSPA '18: PROCEEDINGS OF THE FOURTH ACM INTERNATIONAL WORKSHOP ON SECURITY AND PRIVACY ANALYTICS, 2018, : 8 - 14
  • [6] Defeating deep learning based de-anonymization attacks with adversarial example
    Yin, Haoyu
    Liu, Yingjian
    Li, Yue
    Guo, Zhongwen
    Wang, Yu
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2023, 220
  • [7] Privacy disclosure by de-anonymization using music preferences and selections
    Hirschprung, Ron S.
    Leshman, Ori
    TELEMATICS AND INFORMATICS, 2021, 59 (59)
  • [8] Using Identity Separation Against De-anonymization of Social Networks
    Gulyas, Gabor Gyoergy
    Imre, Sandor
    TRANSACTIONS ON DATA PRIVACY, 2015, 8 (02) : 113 - 140
  • [9] Graph Data Anonymization, De-Anonymization Attacks, and De-Anonymizability Quantification: A Survey
    Ji, Shouling
    Mittal, Prateek
    Beyah, Raheem
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2017, 19 (02): : 1305 - 1326
  • [10] Structural Data De-Anonymization: Theory and Practice
    Ji, Shouling
    Li, Weiqing
    Srivatsa, Mudhakar
    Beyah, Raheem
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2016, 24 (06) : 3523 - 3536