• DocumentCode
    34030
  • Title

    A Two-Stage Deanonymization Attack against Anonymized Social Networks

  • Author

    Wei Peng ; Feng Li ; Xukai Zou ; Jie Wu

  • Author_Institution
    Dept. of Comput. & Inf. Sci., Indiana Univ.-Purdue Univ. Indianapolis, Indianapolis, IN, USA
  • Volume
    63
  • Issue
    2
  • fYear
    2014
  • fDate
    Feb. 2014
  • Firstpage
    290
  • Lastpage
    303
  • Abstract
    Digital traces left by users of online social networking services, even after anonymization, are susceptible to privacy breaches. This is exacerbated by the increasing overlap in user-bases among various services. To alert fellow researchers in both the academia and the industry to the feasibility of such an attack, we propose an algorithm, Seed-and-Grow, to identify users from an anonymized social graph, based solely on graph structure. The algorithm first identifies a seed subgraph, either planted by an attacker or divulged by a collusion of a small group of users, and then grows the seed larger based on the attacker´s existing knowledge of the users´ social relations. Our work identifies and relaxes implicit assumptions taken by previous works, eliminates arbitrary parameters, and improves identification effectiveness and accuracy. Simulations on real-world collected data sets verify our claim.
  • Keywords
    data privacy; graph theory; social networking (online); anonymized social graph; anonymized social networks; digital traces; graph structure; online social networking services; privacy breaches; seed subgraph; seed-and-grow algorithm; two-stage deanonymization; user social relations; Accuracy; Communities; Context; Data privacy; Facebook; Privacy; Accuracy; Communities; Context; Data privacy; Facebook; Privacy; Social networks; anonymity; attack; graph; privacy;
  • fLanguage
    English
  • Journal_Title
    Computers, IEEE Transactions on
  • Publisher
    ieee
  • ISSN
    0018-9340
  • Type

    jour

  • DOI
    10.1109/TC.2012.202
  • Filename
    6275441