Publication | Closed Access
A Two-Stage Deanonymization Attack against Anonymized Social Networks
66
Citations
30
References
2012
Year
EngineeringInformation SecurityNetwork AnalysisInformation ForensicsCommunicationPseudonymizationComputational Social ScienceSocial MediaData ScienceData AnonymizationSocial Network SecurityDigital TracesSocial Network AnalysisSocial NetworksTwo-stage Deanonymization AttackKnowledge DiscoveryData PrivacyComputer ScienceSocial Data ManagementSocial Network AggregationPrivacyData SecurityNetwork ScienceGraph TheorySocial ComputingBusinessSeed SubgraphGraph Structure
Digital traces left by users of online social networking services, even after anonymization, are susceptible to privacy breaches. This is exacerbated by the increasing overlap in user-bases among various services. To alert fellow researchers in both the academia and the industry to the feasibility of such an attack, we propose an algorithm, Seed-and-Grow, to identify users from an anonymized social graph, based solely on graph structure. The algorithm first identifies a seed subgraph, either planted by an attacker or divulged by a collusion of a small group of users, and then grows the seed larger based on the attacker's existing knowledge of the users' social relations. Our work identifies and relaxes implicit assumptions taken by previous works, eliminates arbitrary parameters, and improves identification effectiveness and accuracy. Simulations on real-world collected data sets verify our claim.
| Year | Citations | |
|---|---|---|
Page 1
Page 1