Using machine learning techniques for de-anonymization

被引:0
作者
Gulyas Gabor Gyorgy [1 ]
机构
[1] INRIA, Rocquencourt, France
来源
INFORMACIOS TARSADALOM | 2017年 / 17卷 / 01期
关键词
anonymity; de-anonymization; machine learning; private sphere protection;
D O I
暂无
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
Today we have unprecedented access to datasets bearing huge potential in regard to both business and research. However, beside their unquestionable utility, privacy breaches pose a significant risk to the release of these datasets (e.g., datasets originating from healthcare are good examples), thus service providers must use anonymization techniques to minimize the risk of unwanted disclosure. In this study, we focus on de-anonymization attacks, algorithms that are designed to "reverse" the anonymization process. In particular, we focus on a novel segment of these attacks that involve machine learning to improve robustness and efficiency. Furthermore, we highlight and discuss the similarity between de-anonymization and authentication: how can these algorithms, which are generally perceived as unethical, be used legitimately for security reasons under special constraints.
引用
收藏
页码:72 / +
页数:16
相关论文
共 50 条
[41]   Privacy Leakage via De-Anonymization and Aggregation in Heterogeneous Social Networks [J].
Li, Huaxin ;
Chen, Qingrong ;
Zhu, Haojin ;
Ma, Di ;
Wen, Hong ;
Shen, Xuemin .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (02) :350-362
[42]   The De-anonymization Method Based on User Spatio-Temporal Mobility Trace [J].
Chen, Zhenyu ;
Fu, Yanyan ;
Zhang, Min ;
Zhang, Zhenfeng ;
Li, Hao .
INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2017, 2018, 10631 :459-471
[43]   Hierarchical Network With Local-Global Awareness for Ethereum Account De-anonymization [J].
Huang, Jiahui ;
Huang, Teng ;
Dong, Changyu ;
Duan, Sisi ;
Pang, Yan .
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2025,
[44]   Distribution-Agnostic Database De-Anonymization Under Obfuscation and Synchronization Errors [J].
Bakirtas, Serhat ;
Erkip, Elza .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2025, 20 :3190-3203
[45]   Anchor Link Prediction for Privacy Leakage via De-Anonymization in Multiple Social Networks [J].
Wang, Huanran ;
Yang, Wu ;
Man, Dapeng ;
Wang, Wei ;
Lv, Jiguang .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (06) :5197-5213
[46]   Social Network De-anonymization: More Adversarial Knowledge, More Users Re-identified? [J].
Qian, Jianwei ;
Li, Xiang-Yang ;
Jung, Taeho ;
Fan, Yang ;
Wang, Yu ;
Tang, Shaojie .
ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2019, 19 (03)
[47]   Multi-View Low-Rank Coding-Based Network Data De-Anonymization [J].
Xian, Xingping ;
Wu, Tao ;
Qiao, Shaojie ;
Wang, Wei ;
Liu, Yanbing ;
Han, Nan .
IEEE ACCESS, 2020, 8 :94575-94593
[48]   Two de-anonymization attacks on real-world location data based on a hidden Markov model [J].
Eshun, Samuel N. ;
Palmieri, Paolo .
7TH IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (EUROS&PW 2022), 2022, :524-532
[49]   Data Anonymization for Privacy Aware Machine Learning [J].
Jaidan, David Nizar ;
Carrere, Maxime ;
Chemli, Zakaria ;
Poisvert, Remi .
MACHINE LEARNING, OPTIMIZATION, AND DATA SCIENCE, 2019, 11943 :725-737
[50]   Machine Learning Privacy Aware Anonymization Using MapReduce Based Neural Network [J].
Selvi, U. ;
Pushpa, S. .
INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2022, 31 (02) :1185-1196