How to Quantify Graph De-anonymization Risks

被引:0
|
作者
Lee, Wei-Han [1 ]
Liu, Changchang [1 ]
Ji, Shouling [2 ,3 ]
Mittal, Prateek [1 ]
Lee, Ruby B. [1 ]
机构
[1] Princeton Univ, Princeton, NJ 08544 USA
[2] Zhejiang Univ, Hangzhou, Peoples R China
[3] Georgia Tech, Atlanta, GA USA
来源
关键词
Structure-based de-anonymization attacks; Anonymization utility; De-anonymization capability; Theoretical bounds;
D O I
10.1007/978-3-319-93354-2_5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
An increasing amount of data are becoming publicly available over the Internet. These data are released after applying some anonymization techniques. Recently, researchers have paid significant attention to analyzing the risks of publishing privacy-sensitive data. Even if data anonymization techniques were applied to protect privacy-sensitive data, several de-anonymization attacks have been proposed to break their privacy. However, no theoretical quantification for relating the data vulnerability against de-anonymization attacks and the data utility that is preserved by the anonymization techniques exists. In this paper, we first address several fundamental open problems in the structure-based de-anonymization research by establishing a formal model for privacy breaches on anonymized data and quantifying the conditions for successful de-anonymization under a general graph model. To the best of our knowledge, this is the first work on quantifying the relationship between anonymized utility and de-anonymization capability. Our quantification works under very general assumptions about the distribution from which the data are drawn, thus providing a theoretical guide for practical de-anonymization/anonymization techniques. Furthermore, we use multiple real-world datasets including a Facebook dataset, a Collaboration dataset, and two Twitter datasets to show the limitations of the state-of-the-art de-anonymization attacks. From these experimental results, we demonstrate the ineffectiveness of previous de-anonymization attacks and the potential of more powerful de-anonymization attacks in the future, by comparing the theoretical de-anonymization capability proposed by us with the practical experimental results of the state-of-the-art de-anonymization methods.
引用
收藏
页码:84 / 104
页数:21
相关论文
共 50 条
  • [1] Evaluating Privacy Metrics for Graph Anonymization and De-anonymization
    Zhao, Yuchen
    Wagner, Isabel
    PROCEEDINGS OF THE 2018 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS'18), 2018, : 817 - 819
  • [2] Quantification of De-anonymization Risks in Social Networks
    Lee, Wei-Han
    Liu, Changchang
    Ji, Shouling
    Mittal, Prateek
    Lee, Ruby
    ICISSP: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2017, : 126 - 135
  • [3] Neural-based inexact graph de-anonymization
    Lu, Guangxi
    Li, Kaiyang
    Wang, Xiaotong
    Liu, Ziyue
    Cai, Zhipeng
    Li, Wei
    HIGH-CONFIDENCE COMPUTING, 2024, 4 (01):
  • [4] Graph Data Anonymization, De-Anonymization Attacks, and De-Anonymizability Quantification: A Survey
    Ji, Shouling
    Mittal, Prateek
    Beyah, Raheem
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2017, 19 (02): : 1305 - 1326
  • [5] A Technique to Improve De-anonymization Attacks on Graph Data
    Aliakbari, Javad
    Delavar, Mahshid
    Mohajeri, Javad
    Salmasizadeh, Mahmoud
    26TH IRANIAN CONFERENCE ON ELECTRICAL ENGINEERING (ICEE 2018), 2018, : 704 - 709
  • [6] Graph-Signal-to-Graph Matching for Network De-Anonymization Attacks
    Liu, Hang
    Scaglione, Anna
    Peisert, Sean
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 10043 - 10057
  • [7] De-SAG: On the De-Anonymization of Structure-Attribute Graph Data
    Ji, Shouling
    Wang, Ting
    Chen, Jianhai
    Li, Weiqing
    Mittal, Prateek
    Beyah, Raheem
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2019, 16 (04) : 594 - 607
  • [8] SecGraph: A Uniform and Open-source Evaluation System for Graph Data Anonymization and De-anonymization
    Ji, Shouling
    Li, Weiqing
    Mittal, Prateek
    Hu, Xin
    Beyah, Raheem
    PROCEEDINGS OF THE 24TH USENIX SECURITY SYMPOSIUM, 2015, : 303 - 318
  • [9] Social Network De-Anonymization and Privacy Inference with Knowledge Graph Model
    Qian, Jianwei
    Li, Xiang-Yang
    Zhang, Chunhong
    Chen, Linlin
    Jung, Taeho
    Han, Junze
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2019, 16 (04) : 679 - 692
  • [10] Behavior-Aware Account De-Anonymization on Ethereum Interaction Graph
    Zhou, Jiajun
    Hu, Chenkai
    Chi, Jianlei
    Wu, Jiajing
    Shen, Meng
    Xuan, Qi
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 3433 - 3448