Using machine learning techniques for de-anonymization

被引:0
作者
Gulyas Gabor Gyorgy [1 ]
机构
[1] INRIA, Rocquencourt, France
来源
INFORMACIOS TARSADALOM | 2017年 / 17卷 / 01期
关键词
anonymity; de-anonymization; machine learning; private sphere protection;
D O I
暂无
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
Today we have unprecedented access to datasets bearing huge potential in regard to both business and research. However, beside their unquestionable utility, privacy breaches pose a significant risk to the release of these datasets (e.g., datasets originating from healthcare are good examples), thus service providers must use anonymization techniques to minimize the risk of unwanted disclosure. In this study, we focus on de-anonymization attacks, algorithms that are designed to "reverse" the anonymization process. In particular, we focus on a novel segment of these attacks that involve machine learning to improve robustness and efficiency. Furthermore, we highlight and discuss the similarity between de-anonymization and authentication: how can these algorithms, which are generally perceived as unethical, be used legitimately for security reasons under special constraints.
引用
收藏
页码:72 / +
页数:16
相关论文
共 50 条
[21]   Understanding structure-based social network de-anonymization techniques via empirical analysis [J].
Mao, Jian ;
Tian, Wenqian ;
Jiang, Jingbo ;
He, Zhaoyuan ;
Zhou, Zhihong ;
Liu, Jianwei .
EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2018,
[22]   Graph Anonymization using Machine Learning [J].
Maag, Maria Laura ;
Denoyer, Ludovic ;
Gallinari, Patrick .
2014 IEEE 28TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2014, :1111-1118
[23]   Spatio-temporal de-anonymization attack on geolocated data [J].
Wang R. ;
Xie W. ;
Liao X. ;
Feng S. ;
Bai K. .
Harbin Gongcheng Daxue Xuebao/Journal of Harbin Engineering University, 2021, 42 (03) :400-406
[24]   Analysis of De-anonymization Attacks on Social Networks with Identity Separation [J].
Gulyas, Gabor Gy. ;
Imre, Sander .
INFOCOMMUNICATIONS JOURNAL, 2011, 3 (04) :11-20
[25]   Analysis of grasshopper, a novel social network de-anonymization algorithm [J].
Simon, Benedek ;
Gulyás, Gábor György ;
Imre, Sándor .
Periodica polytechnica Electrical engineering and computer science, 2014, 58 (04) :161-173
[26]   DeSAN: De-anonymization against Background Knowledge in Social Networks [J].
Desai, Nidhi ;
Das, Manik Lal .
2021 12TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION SYSTEMS (ICICS), 2021, :99-105
[27]   Discovery privacy threats via device de-anonymization in LoRaWAN [J].
Spadaccino, Pietro ;
Garlisi, Domenico ;
Cuomo, Francesca ;
Pillon, Giorgio ;
Pisani, Patrizio .
COMPUTER COMMUNICATIONS, 2022, 189 :1-10
[28]   Hiding Information in Social Networks from De-anonymization Attacks by Using Identity Separation [J].
Gulyas, Gabor Gyoergy ;
Imre, Sandor .
COMMUNICATIONS AND MULTIMEDIA SECURITY, CMS 2013, 2013, 8099 :173-184
[29]   Attribute-Enhanced De-anonymization of Online Social Networks [J].
Zhang, Cheng ;
Wu, Shang ;
Jiang, Honglu ;
Wang, Yawei ;
Yu, Jiguo ;
Cheng, Xiuzhen .
COMPUTATIONAL DATA AND SOCIAL NETWORKS, 2019, 11917 :256-267
[30]   DART: De-Anonymization of personal gazetteers through social trajectories [J].
Francia, Matteo ;
Gallinucci, Enrico ;
Golfarelli, Matteo ;
Santolini, Nicola .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 55