Xuan Ding
School of Software, Tsinghua University, Beijing, 100084, China
Lan Zhang
School of Software, Tsinghua University, Beijing, 100084, China
Zhiguo Wan
School of Software, Tsinghua University, Beijing, 100084, China
Ming Gu
School of Software, Tsinghua University, Beijing, 100084, China
ABSTRACT
Nowadays, online social network data are being increasingly published to third parties. It has been shown that individually sensitive information can be recovered from the released data and several anonymization techniques have been proposed. However, most of these defenses have focused on one-time releases and do not take into account the re-publication of dynamic social network data. Re-publishing data periodically is a natural result of social network evolution and an emerging requirement of dynamic social network analysis. In this paper, we show that by utilizing correlations between sequential releases, the adversary can achieve high precision in de-anonymization of the released data, suppressing the uncertainty of re-identifying each release separately and synthesizing the results afterwards. Besides, we combine structural knowledge with node attributes to compromise graph modification based defenses. With experiments on real data, this work is the first to demonstrate feasibility of de-anonymizing dynamic social networks and should arouse concern for future works on privacy preservation in social network data publishing.
PDF References Citation
How to cite this article
Xuan Ding, Lan Zhang, Zhiguo Wan and Ming Gu, 2013. De-Anonymization of Dynamic Social Networks. Information Technology Journal, 12: 4882-4888.
DOI: 10.3923/itj.2013.4882.4888
URL: https://scialert.net/abstract/?doi=itj.2013.4882.4888
DOI: 10.3923/itj.2013.4882.4888
URL: https://scialert.net/abstract/?doi=itj.2013.4882.4888
REFERENCES
- Backstrom, L., C. Dwork and J. Kleinberg, 2007. Wherefore art thou r3579x? anonymized social networks, hidden patterns and structural steganography. Proceedings of the 16th International Conference on World Wide Web, May 8-12, 2007, Banff, Alberta, Canada, pp: 181-190.
CrossRef - Hay, M., G. Miklau, D. Jensen, D. Towsley and P. Weis, 2008. Resisting structural reidentification in anonymized social networks. Proceedings of the VLDB Endowment, Volume 1, August 23-28, 2008, Auckland, New Zealand, pp: 102-114.
Direct Link - Liu, K. and E. Terzi, 2008. Towards identity anonymization on graphs. Proceedings of the ACM SIGMOD International Conference on Management of Data, June 9-12, 2008, Vancouver, BC., Canada, pp: 93-106.
Direct Link - Narayanan, A. and V. Shmatikov, 2008. Robust de- anonymization of large sparse datasets. Proceedings of the IEEE Symposium on Security and Privacy, May 18-22, 2008, Oakland, CA., pp: 111-125.
CrossRef - Narayanan, A. and V. Shmatikov, 2009. De-anonymizing social networks. Proceedings of the 30th IEEE Symposium on Security and Privacy, May 17-20, 2009, Berkeley, CA., pp: 173-187.
CrossRefDirect Link - Wondracek, G., T. Holz, E. Kirda and C. Kruegel, 2010. A practical attack to de-anonymize social network users. Proceedings of the IEEE Symposium on Security and Privacy, May 16-19, 2010, Oakland, CA, USA., pp: 223-238.
CrossRef - Wu, X., X. Ying, K. Liu and L. Chen, 2010. A survey of privacy-preservation of graphs and social networks. Adv. Database Syst., 40: 421-453.
CrossRef - Zhou, B. and J. Pei, 2008. Preserving privacy in social networks against neighborhood attacks. Proceedings of the 24th IEEE International Conference on Data Engineering, April 7-12, 2008, Cancun, pp: 506-515.
CrossRefDirect Link - Zhou, B., J. Pei and W.S. Luk, 2008. A brief survey on anonymization techniques for privacy preserving publishing of social network data. ACM SIGKDD Explo Rations Newslett., 10: 12-22.
CrossRef