Friend in the Middle (FiM): Tackling De-Anonymization in Social Networks

被引:0
|
作者
Beato, Filipe [1 ]
Conti, Mauro
Preneel, Bart [1 ]
机构
[1] ESAT COSIC KU Leuven, Louvain, Belgium
来源
2013 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS (PERCOM WORKSHOPS) | 2013年
关键词
Online Social Networks; Security; Privacy;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the large growth of Online Social Networks (OSNs), several privacy threats have been highlighted, as well as solutions to mitigate them. Most solutions focus on restricting the visibility of users information. However, OSNs also represent a threat for contextual information, such as the OSN structure and how users communicate among each other. Recently proposed de-anonymization techniques proved to be effective in re-identifying users in anonymized social network. In this paper, we present Friend in the Middle (FiM): a novel approach to make OSNs more resilient against de-anonymization techniques. Additionally we evaluate and demonstrate throughout experimental results the feasibility and effectiveness of our proposal.
引用
收藏
页码:279 / 284
页数:6
相关论文
共 50 条
  • [41] Using machine learning techniques for de-anonymization
    Gulyas Gabor Gyorgy
    INFORMACIOS TARSADALOM, 2017, 17 (01): : 72 - +
  • [42] IDEAL: An Interactive De-Anonymization Learning System
    Li, Na
    Murugesan, Rajkumar
    Li, Lin
    Zheng, Hao
    2020 IEEE 44TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE (COMPSAC 2020), 2020, : 449 - 454
  • [43] A Concentration of Measure Approach to Database De-anonymization
    Shirani, Farhad
    Garg, Siddharth
    Erkip, Elza
    2019 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2019, : 2748 - 2752
  • [44] User Identity De-anonymization Based on Attributes
    Zhang, Cheng
    Jiang, Honglu
    Wang, Yawei
    Hu, Qin
    Yu, Jiguo
    Cheng, Xiuzhen
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2019, 2019, 11604 : 458 - 469
  • [45] Graph Data Anonymization, De-Anonymization Attacks, and De-Anonymizability Quantification: A Survey
    Ji, Shouling
    Mittal, Prateek
    Beyah, Raheem
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2017, 19 (02): : 1305 - 1326
  • [46] Darknet and Bitcoin De-anonymization: Emerging Development
    Han, Wenlin
    Viet Duong
    Long Nguyen
    Mier, Caesar
    2020 ZOOMING INNOVATION IN CONSUMER TECHNOLOGIES CONFERENCE (ZINC), 2020, : 222 - 226
  • [47] Structural Data De-Anonymization: Theory and Practice
    Ji, Shouling
    Li, Weiqing
    Srivatsa, Mudhakar
    Beyah, Raheem
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2016, 24 (06) : 3523 - 3536
  • [48] A De-anonymization Attack against Downloaders in Freenet
    Xu, Yonghuan
    Yang, Ming
    Ling, Zhen
    Liu, Zixia
    Gu, Xiaodan
    Luo, Lan
    IEEE INFOCOM 2024-IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, 2024, : 201 - 210
  • [49] Anonymization and De-Anonymization of Mobility Trajectories: Dissecting the Gaps Between Theory and Practice
    Wang, Huandong
    Li, Yong
    Gao, Chen
    Wang, Gang
    Tao, Xiaoming
    Jin, Depeng
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2021, 20 (03) : 796 - 815
  • [50] Neural-based inexact graph de-anonymization
    Lu, Guangxi
    Li, Kaiyang
    Wang, Xiaotong
    Liu, Ziyue
    Cai, Zhipeng
    Li, Wei
    HIGH-CONFIDENCE COMPUTING, 2024, 4 (01):