Against Signed Graph Deanonymization Attacks on Social Networks

被引:0
|
作者
Jianliang Gao
Jianxin Wang
Jianbiao He
Fengxia Yan
机构
[1] Central South University,School of Information Science and Engineering
[2] National University of Defense Technology,College of Science
关键词
Big graph; Deanonymization attack; Social network; Signed graph;
D O I
暂无
中图分类号
学科分类号
摘要
Privacy protection is one of the most challenging problems of social networks. Simple removal of the labels is unable to protect the privacy of social networks because the information of graph structures can be utilized to deanonymize target nodes. Previous related proposals mostly assume that attacker knows only the target’s neighborhood graph, but ignoring of signed edge attribute. The graph structure with signed edge attributes could cause serious privacy leakage of social networks. In this paper, we take the signed attribute of edges into account when achieving k-anonymity privacy protection for social networks. We propose a signed k-anonymity scheme to protect the privacy of key entities in social networks. With signed k-anonymity protection, these targets cannot be re-identified by attackers with confidence higher than 1 / k. The proposed scheme minimizes the modification, which preserves high utility of the original data. Extensive experiments on real data sets and synthetic graph illustrate the effectiveness of the proposed scheme.
引用
收藏
页码:725 / 739
页数:14
相关论文
共 50 条
  • [1] Against Signed Graph Deanonymization Attacks on Social Networks
    Gao, Jianliang
    Wang, Jianxin
    He, Jianbiao
    Yan, Fengxia
    [J]. INTERNATIONAL JOURNAL OF PARALLEL PROGRAMMING, 2019, 47 (04) : 725 - 739
  • [2] Toward Secrecy-Aware Attacks Against Trust Prediction in Signed Social Networks
    Zhu, Yulin
    Michalak, Tomasz
    Luo, Xiapu
    Zhang, Xiaoge
    Zhou, Kai
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 3567 - 3580
  • [3] A Two-Stage Deanonymization Attack against Anonymized Social Networks
    Peng, Wei
    Li, Feng
    Zou, Xukai
    Wu, Jie
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2014, 63 (02) : 290 - 303
  • [4] Inference Attacks Against Graph Neural Networks
    Zhang, Zhikun
    Chen, Min
    Backes, Michael
    Shen, Yun
    Zhang, Yang
    [J]. PROCEEDINGS OF THE 31ST USENIX SECURITY SYMPOSIUM, 2022, : 4543 - 4560
  • [5] Effective Social Graph Deanonymization Based on Graph Structure and Descriptive Information
    Fu, Hao
    Zhang, Aston
    Xie, Xing
    [J]. ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY, 2015, 6 (04)
  • [6] Graph kernel based link prediction for signed social networks
    Yuan, Weiwei
    He, Kangya
    Guan, Donghai
    Zhou, Li
    Li, Chenliang
    [J]. INFORMATION FUSION, 2019, 46 : 1 - 10
  • [7] Graph Structure Reshaping Against Adversarial Attacks on Graph Neural Networks
    Wang, Haibo
    Zhou, Chuan
    Chen, Xin
    Wu, Jia
    Pan, Shirui
    Li, Zhao
    Wang, Jilong
    Yu, Philip S.
    [J]. IEEE Transactions on Knowledge and Data Engineering, 2024, 36 (11) : 6344 - 6357
  • [8] DEFENDING GRAPH CONVOLUTIONAL NETWORKS AGAINST ADVERSARIAL ATTACKS
    Ioannidis, Vassilis N.
    Giannakis, Georgios B.
    [J]. 2020 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, 2020, : 8469 - 8473
  • [9] Model Inversion Attacks Against Graph Neural Networks
    Zhang, Zaixi
    Liu, Qi
    Huang, Zhenya
    Wang, Hao
    Lee, Chee-Kong
    Chen, Enhong
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2023, 35 (09) : 8729 - 8741
  • [10] Robust Graph Convolutional Networks Against Adversarial Attacks
    Zhu, Dingyuan
    Zhang, Ziwei
    Cui, Peng
    Zhu, Wenwu
    [J]. KDD'19: PROCEEDINGS OF THE 25TH ACM SIGKDD INTERNATIONAL CONFERENCCE ON KNOWLEDGE DISCOVERY AND DATA MINING, 2019, : 1399 - 1407