DocumentCode
34030
Title
A Two-Stage Deanonymization Attack against Anonymized Social Networks
Author
Wei Peng ; Feng Li ; Xukai Zou ; Jie Wu
Author_Institution
Dept. of Comput. & Inf. Sci., Indiana Univ.-Purdue Univ. Indianapolis, Indianapolis, IN, USA
Volume
63
Issue
2
fYear
2014
fDate
Feb. 2014
Firstpage
290
Lastpage
303
Abstract
Digital traces left by users of online social networking services, even after anonymization, are susceptible to privacy breaches. This is exacerbated by the increasing overlap in user-bases among various services. To alert fellow researchers in both the academia and the industry to the feasibility of such an attack, we propose an algorithm, Seed-and-Grow, to identify users from an anonymized social graph, based solely on graph structure. The algorithm first identifies a seed subgraph, either planted by an attacker or divulged by a collusion of a small group of users, and then grows the seed larger based on the attacker´s existing knowledge of the users´ social relations. Our work identifies and relaxes implicit assumptions taken by previous works, eliminates arbitrary parameters, and improves identification effectiveness and accuracy. Simulations on real-world collected data sets verify our claim.
Keywords
data privacy; graph theory; social networking (online); anonymized social graph; anonymized social networks; digital traces; graph structure; online social networking services; privacy breaches; seed subgraph; seed-and-grow algorithm; two-stage deanonymization; user social relations; Accuracy; Communities; Context; Data privacy; Facebook; Privacy; Accuracy; Communities; Context; Data privacy; Facebook; Privacy; Social networks; anonymity; attack; graph; privacy;
fLanguage
English
Journal_Title
Computers, IEEE Transactions on
Publisher
ieee
ISSN
0018-9340
Type
jour
DOI
10.1109/TC.2012.202
Filename
6275441
Link To Document