Using machine learning techniques for de-anonymization

被引:0
作者
Gulyas Gabor Gyorgy [1 ]
机构
[1] INRIA, Rocquencourt, France
来源
INFORMACIOS TARSADALOM | 2017年 / 17卷 / 01期
关键词
anonymity; de-anonymization; machine learning; private sphere protection;
D O I
暂无
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
Today we have unprecedented access to datasets bearing huge potential in regard to both business and research. However, beside their unquestionable utility, privacy breaches pose a significant risk to the release of these datasets (e.g., datasets originating from healthcare are good examples), thus service providers must use anonymization techniques to minimize the risk of unwanted disclosure. In this study, we focus on de-anonymization attacks, algorithms that are designed to "reverse" the anonymization process. In particular, we focus on a novel segment of these attacks that involve machine learning to improve robustness and efficiency. Furthermore, we highlight and discuss the similarity between de-anonymization and authentication: how can these algorithms, which are generally perceived as unethical, be used legitimately for security reasons under special constraints.
引用
收藏
页码:72 / +
页数:16
相关论文
共 50 条
[31]   De-SAG: On the De-Anonymization of Structure-Attribute Graph Data [J].
Ji, Shouling ;
Wang, Ting ;
Chen, Jianhai ;
Li, Weiqing ;
Mittal, Prateek ;
Beyah, Raheem .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2019, 16 (04) :594-607
[32]   Integration of Static and Dynamic Code Stylometry Analysis for Programmer De-anonymization [J].
Wang, Ningfei ;
Ji, Shouling ;
Wang, Ting .
AISEC'18: PROCEEDINGS OF THE 11TH ACM WORKSHOP ON ARTIFICIAL INTELLIGENCE AND SECURITY, 2018, :74-84
[33]   Consensus Robustness and Transaction De-Anonymization in the Ripple Currency Exchange System [J].
Di Luzio, Adriano ;
Mei, Alessandro ;
Stefa, Julinda .
2017 IEEE 37TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2017), 2017, :140-150
[34]   Mutex-Based De-anonymization of an Anonymous Read/Write Memory [J].
Godard, Emmanuel ;
Imbs, Damien ;
Raynal, Michel ;
Taubenfeld, Gadi .
NETWORKED SYSTEMS, NETYS 2019, 2019, 11704 :311-326
[35]   Deeply Understanding Structure-based Social Network De-anonymization [J].
Tian, Wenqian ;
Mao, Jian ;
Jiang, Jingbo ;
He, Zhaoyuan ;
Zhou, Zhihong ;
Liu, Jianwei .
2017 INTERNATIONAL CONFERENCE ON IDENTIFICATION, INFORMATION AND KNOWLEDGE IN THE INTERNET OF THINGS, 2018, 129 :52-58
[36]   Behavior-Aware Account De-Anonymization on Ethereum Interaction Graph [J].
Zhou, Jiajun ;
Hu, Chenkai ;
Chi, Jianlei ;
Wu, Jiajing ;
Shen, Meng ;
Xuan, Qi .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 :3433-3448
[37]   Distribution-Agnostic Database De-Anonymization Under Synchronization Errors [J].
Bakirtas, Serhat ;
Erkip, Elza .
2023 IEEE INTERNATIONAL WORKSHOP ON INFORMATION FORENSICS AND SECURITY, WIFS, 2023,
[38]   An Enhanced Structure-Based De-anonymization of Online Social Networks [J].
Li, Hong ;
Zhang, Cheng ;
He, Yunhua ;
Cheng, Xiuzhen ;
Liu, Yan ;
Sun, Limin .
WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2016, 2016, 9798 :331-342
[39]   De-anonymization of Mobility Trajectories: Dissecting the Gaps between Theory and Practice [J].
Wang, Huandong ;
Gao, Chen ;
Li, Yong ;
Wang, Gang ;
Jin, Depeng ;
Sun, Jingbo .
25TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2018), 2018,
[40]   De-anonymization of Dynamic Online Social Networks via Persistent Structures [J].
Gao, Tianchong ;
Li, Feng .
ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2019,