How to Quantify Graph De-anonymization Risks

被引:0
|
作者
Lee, Wei-Han [1 ]
Liu, Changchang [1 ]
Ji, Shouling [2 ,3 ]
Mittal, Prateek [1 ]
Lee, Ruby B. [1 ]
机构
[1] Princeton Univ, Princeton, NJ 08544 USA
[2] Zhejiang Univ, Hangzhou, Peoples R China
[3] Georgia Tech, Atlanta, GA USA
来源
关键词
Structure-based de-anonymization attacks; Anonymization utility; De-anonymization capability; Theoretical bounds;
D O I
10.1007/978-3-319-93354-2_5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
An increasing amount of data are becoming publicly available over the Internet. These data are released after applying some anonymization techniques. Recently, researchers have paid significant attention to analyzing the risks of publishing privacy-sensitive data. Even if data anonymization techniques were applied to protect privacy-sensitive data, several de-anonymization attacks have been proposed to break their privacy. However, no theoretical quantification for relating the data vulnerability against de-anonymization attacks and the data utility that is preserved by the anonymization techniques exists. In this paper, we first address several fundamental open problems in the structure-based de-anonymization research by establishing a formal model for privacy breaches on anonymized data and quantifying the conditions for successful de-anonymization under a general graph model. To the best of our knowledge, this is the first work on quantifying the relationship between anonymized utility and de-anonymization capability. Our quantification works under very general assumptions about the distribution from which the data are drawn, thus providing a theoretical guide for practical de-anonymization/anonymization techniques. Furthermore, we use multiple real-world datasets including a Facebook dataset, a Collaboration dataset, and two Twitter datasets to show the limitations of the state-of-the-art de-anonymization attacks. From these experimental results, we demonstrate the ineffectiveness of previous de-anonymization attacks and the potential of more powerful de-anonymization attacks in the future, by comparing the theoretical de-anonymization capability proposed by us with the practical experimental results of the state-of-the-art de-anonymization methods.
引用
收藏
页码:84 / 104
页数:21
相关论文
共 50 条
  • [41] Structural Data De-anonymization: Quantification, Practice, and Implications
    Ji, Shouling
    Li, Weiqing
    Srivatsa, Mudhakar
    Beyah, Raheem
    CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, : 1040 - 1053
  • [42] Fast De-anonymization of Social Networks with Structural Information
    Shao, Yingxia
    Liu, Jialin
    Shi, Shuyang
    Zhang, Yuemei
    Cui, Bin
    DATA SCIENCE AND ENGINEERING, 2019, 4 (01) : 76 - 92
  • [43] Optimal De-Anonymization in Random Graphs with Community Structure
    Onaran, Efe
    Garg, Siddharth
    Erkip, Elza
    2016 IEEE 37TH SARNOFF SYMPOSIUM, 2016,
  • [44] Exploring de-anonymization risks in PET imaging: Insights from a comprehensive analysis of 853 patient scans
    Hanna, Emma Bou
    Partarrieu, Sebastian
    Berenbaum, Arnaud
    Allassonniere, Stephanie
    Besson, Florent L.
    SCIENTIFIC DATA, 2024, 11 (01)
  • [45] Friend in the Middle (FiM): Tackling De-Anonymization in Social Networks
    Beato, Filipe
    Conti, Mauro
    Preneel, Bart
    2013 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS (PERCOM WORKSHOPS), 2013, : 279 - 284
  • [46] Community-Enhanced De-anonymization of Online Social Networks
    Nilizadeh, Shirin
    Kapadia, Apu
    Ahn, Yong-Yeol
    CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, : 537 - 548
  • [47] Anonymous Read/Write Memory: Leader Election and De-anonymization
    Godard, Emmanuel
    Imbs, Damien
    Raynal, Michel
    Taubenfeld, Gadi
    STRUCTURAL INFORMATION AND COMMUNICATION COMPLEXITY, SIROCCO 2019, 2019, 11639 : 246 - 261
  • [48] Spatio-temporal de-anonymization attack on geolocated data
    Wang R.
    Xie W.
    Liao X.
    Feng S.
    Bai K.
    Harbin Gongcheng Daxue Xuebao/Journal of Harbin Engineering University, 2021, 42 (03): : 400 - 406
  • [49] DeSAN: De-anonymization against Background Knowledge in Social Networks
    Desai, Nidhi
    Das, Manik Lal
    2021 12TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION SYSTEMS (ICICS), 2021, : 99 - 105
  • [50] Analysis of De-anonymization Attacks on Social Networks with Identity Separation
    Gulyas, Gabor Gy.
    Imre, Sander
    INFOCOMMUNICATIONS JOURNAL, 2011, 3 (04): : 11 - 20