Using machine learning techniques for de-anonymization

被引:0
|
作者
Gulyas Gabor Gyorgy [1 ]
机构
[1] INRIA, Rocquencourt, France
来源
INFORMACIOS TARSADALOM | 2017年 / 17卷 / 01期
关键词
anonymity; de-anonymization; machine learning; private sphere protection;
D O I
暂无
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
Today we have unprecedented access to datasets bearing huge potential in regard to both business and research. However, beside their unquestionable utility, privacy breaches pose a significant risk to the release of these datasets (e.g., datasets originating from healthcare are good examples), thus service providers must use anonymization techniques to minimize the risk of unwanted disclosure. In this study, we focus on de-anonymization attacks, algorithms that are designed to "reverse" the anonymization process. In particular, we focus on a novel segment of these attacks that involve machine learning to improve robustness and efficiency. Furthermore, we highlight and discuss the similarity between de-anonymization and authentication: how can these algorithms, which are generally perceived as unethical, be used legitimately for security reasons under special constraints.
引用
收藏
页码:72 / +
页数:16
相关论文
共 50 条
  • [1] IDEAL: An Interactive De-Anonymization Learning System
    Li, Na
    Murugesan, Rajkumar
    Li, Lin
    Zheng, Hao
    2020 IEEE 44TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE (COMPSAC 2020), 2020, : 449 - 454
  • [2] Evaluating Privacy Metrics for Graph Anonymization and De-anonymization
    Zhao, Yuchen
    Wagner, Isabel
    PROCEEDINGS OF THE 2018 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS'18), 2018, : 817 - 819
  • [3] De-anonymization attack on geolocated data
    Gambs, Sebastien
    Killijian, Marc-Olivier
    Cortez, Miguel Niunez del Prado
    JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2014, 80 (08) : 1597 - 1614
  • [4] Programmers' de-anonymization using a hybrid approach of abstract syntax tree and deep learning
    Ullah, Farhan
    Jabbar, Sohail
    Al-Turjman, Fadi
    TECHNOLOGICAL FORECASTING AND SOCIAL CHANGE, 2020, 159
  • [5] On De-anonymization of Single Tweet Messages
    Le, Hoi
    Safavi-Naini, Reihaneh
    IWSPA '18: PROCEEDINGS OF THE FOURTH ACM INTERNATIONAL WORKSHOP ON SECURITY AND PRIVACY ANALYTICS, 2018, : 8 - 14
  • [6] De-anonymization Attacks on Neuroimaging Datasets
    Ravindra, Vikram
    Grama, Ananth
    SIGMOD '21: PROCEEDINGS OF THE 2021 INTERNATIONAL CONFERENCE ON MANAGEMENT OF DATA, 2021, : 2394 - 2398
  • [7] De-anonymization attack on geolocated data
    Gambs, Sebastien
    Killijian, Marc-Olivier
    Cortez, Miguel Nunez del Prado
    2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 789 - 797
  • [8] Fraud De-Anonymization For Fun and Profit
    Hernandez, Nestor
    Rahman, Mizanur
    Recabarren, Ruben
    Carbunar, Bogdan
    PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 115 - 130
  • [9] De-Anonymization of dynamic social networks
    Ding, X., 1600, Asian Network for Scientific Information (12):
  • [10] Privacy disclosure by de-anonymization using music preferences and selections
    Hirschprung, Ron S.
    Leshman, Ori
    TELEMATICS AND INFORMATICS, 2021, 59 (59)