Title :
A Two-Stage Deanonymization Attack against Anonymized Social Networks
Author :
Wei Peng ; Feng Li ; Xukai Zou ; Jie Wu
Author_Institution :
Dept. of Comput. & Inf. Sci., Indiana Univ.-Purdue Univ. Indianapolis, Indianapolis, IN, USA
Abstract :
Digital traces left by users of online social networking services, even after anonymization, are susceptible to privacy breaches. This is exacerbated by the increasing overlap in user-bases among various services. To alert fellow researchers in both the academia and the industry to the feasibility of such an attack, we propose an algorithm, Seed-and-Grow, to identify users from an anonymized social graph, based solely on graph structure. The algorithm first identifies a seed subgraph, either planted by an attacker or divulged by a collusion of a small group of users, and then grows the seed larger based on the attacker´s existing knowledge of the users´ social relations. Our work identifies and relaxes implicit assumptions taken by previous works, eliminates arbitrary parameters, and improves identification effectiveness and accuracy. Simulations on real-world collected data sets verify our claim.
Keywords :
data privacy; graph theory; social networking (online); anonymized social graph; anonymized social networks; digital traces; graph structure; online social networking services; privacy breaches; seed subgraph; seed-and-grow algorithm; two-stage deanonymization; user social relations; Accuracy; Communities; Context; Data privacy; Facebook; Privacy; Accuracy; Communities; Context; Data privacy; Facebook; Privacy; Social networks; anonymity; attack; graph; privacy;
Journal_Title :
Computers, IEEE Transactions on
DOI :
10.1109/TC.2012.202