How to Quantify Graph De-anonymization Risks

被引:0
|
作者
Lee, Wei-Han [1 ]
Liu, Changchang [1 ]
Ji, Shouling [2 ,3 ]
Mittal, Prateek [1 ]
Lee, Ruby B. [1 ]
机构
[1] Princeton Univ, Princeton, NJ 08544 USA
[2] Zhejiang Univ, Hangzhou, Peoples R China
[3] Georgia Tech, Atlanta, GA USA
来源
关键词
Structure-based de-anonymization attacks; Anonymization utility; De-anonymization capability; Theoretical bounds;
D O I
10.1007/978-3-319-93354-2_5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
An increasing amount of data are becoming publicly available over the Internet. These data are released after applying some anonymization techniques. Recently, researchers have paid significant attention to analyzing the risks of publishing privacy-sensitive data. Even if data anonymization techniques were applied to protect privacy-sensitive data, several de-anonymization attacks have been proposed to break their privacy. However, no theoretical quantification for relating the data vulnerability against de-anonymization attacks and the data utility that is preserved by the anonymization techniques exists. In this paper, we first address several fundamental open problems in the structure-based de-anonymization research by establishing a formal model for privacy breaches on anonymized data and quantifying the conditions for successful de-anonymization under a general graph model. To the best of our knowledge, this is the first work on quantifying the relationship between anonymized utility and de-anonymization capability. Our quantification works under very general assumptions about the distribution from which the data are drawn, thus providing a theoretical guide for practical de-anonymization/anonymization techniques. Furthermore, we use multiple real-world datasets including a Facebook dataset, a Collaboration dataset, and two Twitter datasets to show the limitations of the state-of-the-art de-anonymization attacks. From these experimental results, we demonstrate the ineffectiveness of previous de-anonymization attacks and the potential of more powerful de-anonymization attacks in the future, by comparing the theoretical de-anonymization capability proposed by us with the practical experimental results of the state-of-the-art de-anonymization methods.
引用
收藏
页码:84 / 104
页数:21
相关论文
共 50 条
  • [21] IDEAL: An Interactive De-Anonymization Learning System
    Li, Na
    Murugesan, Rajkumar
    Li, Lin
    Zheng, Hao
    2020 IEEE 44TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE (COMPSAC 2020), 2020, : 449 - 454
  • [22] A Concentration of Measure Approach to Database De-anonymization
    Shirani, Farhad
    Garg, Siddharth
    Erkip, Elza
    2019 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2019, : 2748 - 2752
  • [23] User Identity De-anonymization Based on Attributes
    Zhang, Cheng
    Jiang, Honglu
    Wang, Yawei
    Hu, Qin
    Yu, Jiguo
    Cheng, Xiuzhen
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2019, 2019, 11604 : 458 - 469
  • [24] De-anonymization of Social Networks: the Power of Collectiveness
    Zhang, Jiapeng
    Fu, Luoyi
    Wang, Xinbing
    Lu, Songwu
    IEEE INFOCOM 2020 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, 2020, : 89 - 98
  • [25] Darknet and Bitcoin De-anonymization: Emerging Development
    Han, Wenlin
    Viet Duong
    Long Nguyen
    Mier, Caesar
    2020 ZOOMING INNOVATION IN CONSUMER TECHNOLOGIES CONFERENCE (ZINC), 2020, : 222 - 226
  • [26] Structural Data De-Anonymization: Theory and Practice
    Ji, Shouling
    Li, Weiqing
    Srivatsa, Mudhakar
    Beyah, Raheem
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2016, 24 (06) : 3523 - 3536
  • [27] A De-anonymization Attack against Downloaders in Freenet
    Xu, Yonghuan
    Yang, Ming
    Ling, Zhen
    Liu, Zixia
    Gu, Xiaodan
    Luo, Lan
    IEEE INFOCOM 2024-IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, 2024, : 201 - 210
  • [28] Anonymization and De-Anonymization of Mobility Trajectories: Dissecting the Gaps Between Theory and Practice
    Wang, Huandong
    Li, Yong
    Gao, Chen
    Wang, Gang
    Tao, Xiaoming
    Jin, Depeng
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2021, 20 (03) : 796 - 815
  • [29] Link Prediction by De-anonymization: How We Won the Kaggle Social Network Challenge
    Narayanan, Arvind
    Shi, Elaine
    Rubinstein, Benjamin I. P.
    2011 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2011, : 1825 - 1834
  • [30] SA Framework based De-anonymization of Social Networks
    Jiang, Honglu
    Yu, Jiguo
    Hu, Chunqiang
    Zhang, Cheng
    Cheng, Xiuzhen
    2017 INTERNATIONAL CONFERENCE ON IDENTIFICATION, INFORMATION AND KNOWLEDGE IN THE INTERNET OF THINGS, 2018, 129 : 358 - 363