Using machine learning techniques for de-anonymization

被引:0
作者
Gulyas Gabor Gyorgy [1 ]
机构
[1] INRIA, Rocquencourt, France
来源
INFORMACIOS TARSADALOM | 2017年 / 17卷 / 01期
关键词
anonymity; de-anonymization; machine learning; private sphere protection;
D O I
暂无
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
Today we have unprecedented access to datasets bearing huge potential in regard to both business and research. However, beside their unquestionable utility, privacy breaches pose a significant risk to the release of these datasets (e.g., datasets originating from healthcare are good examples), thus service providers must use anonymization techniques to minimize the risk of unwanted disclosure. In this study, we focus on de-anonymization attacks, algorithms that are designed to "reverse" the anonymization process. In particular, we focus on a novel segment of these attacks that involve machine learning to improve robustness and efficiency. Furthermore, we highlight and discuss the similarity between de-anonymization and authentication: how can these algorithms, which are generally perceived as unethical, be used legitimately for security reasons under special constraints.
引用
收藏
页码:72 / +
页数:16
相关论文
共 50 条
[1]   IDEAL: An Interactive De-Anonymization Learning System [J].
Li, Na ;
Murugesan, Rajkumar ;
Li, Lin ;
Zheng, Hao .
2020 IEEE 44TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE (COMPSAC 2020), 2020, :449-454
[2]   Survey of Bitcoin de-anonymization technology [J].
Cheng, Jie ;
Jin, Wei ;
Xia, Qing ;
Li, Miao ;
Dai, Wei ;
Zhang, Yafeng ;
Dai, Peng ;
Li, Yucheng .
Tongxin Xuebao/Journal on Communications, 2024, 45 (11) :244-266
[3]   De-anonymization attack on geolocated data [J].
Gambs, Sebastien ;
Killijian, Marc-Olivier ;
Cortez, Miguel Niunez del Prado .
JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2014, 80 (08) :1597-1614
[4]   On De-anonymization of Single Tweet Messages [J].
Le, Hoi ;
Safavi-Naini, Reihaneh .
IWSPA '18: PROCEEDINGS OF THE FOURTH ACM INTERNATIONAL WORKSHOP ON SECURITY AND PRIVACY ANALYTICS, 2018, :8-14
[5]   An Efficient and Robust Social Network De-anonymization Attack [J].
Gulyas, Gabor Gyorgy ;
Simon, Benedek ;
Imre, Sandor .
PROCEEDINGS OF THE 2016 ACM WORKSHOP ON PRIVACY IN THE ELECTRONIC SOCIETY (WPES'16), 2016, :1-11
[6]   De-anonymization attack on geolocated data [J].
Gambs, Sebastien ;
Killijian, Marc-Olivier ;
Cortez, Miguel Nunez del Prado .
2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, :789-797
[7]   Defeating deep learning based de-anonymization attacks with adversarial example [J].
Yin, Haoyu ;
Liu, Yingjian ;
Li, Yue ;
Guo, Zhongwen ;
Wang, Yu .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2023, 220
[8]   Privacy disclosure by de-anonymization using music preferences and selections [J].
Hirschprung, Ron S. ;
Leshman, Ori .
TELEMATICS AND INFORMATICS, 2021, 59 (59)
[9]   Using Identity Separation Against De-anonymization of Social Networks [J].
Gulyas, Gabor Gyoergy ;
Imre, Sandor .
TRANSACTIONS ON DATA PRIVACY, 2015, 8 (02) :113-140
[10]   Graph Data Anonymization, De-Anonymization Attacks, and De-Anonymizability Quantification: A Survey [J].
Ji, Shouling ;
Mittal, Prateek ;
Beyah, Raheem .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2017, 19 (02) :1305-1326