Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
A two-stage deanonymization attack against anonymized social networks
Peng W., Li F., Zou X., Wu J. IEEE Transactions on Computers63 (2):290-303,2014.Type:Article
Date Reviewed: Nov 4 2014

We live in an era of social networks where privacy control is a massive concern. Users leave digital traces, which may breach privacy even after anonymization. Social networking service providers collect user-provided data, and the users (naturally) want to share their information with their connections and with the outside world in a controlled manner while preserving their privacy. One naive way to control privacy is to anonymize the user through omission of basic identification information. Though a number of defense and attack algorithms have been proposed concerning privacy control, the area is still quite new and a lot of work needs to be done. In this paper, the authors propose a deanonymization algorithm to orchestrate an attack against anonymized social networks.

In the graph model of the social network, the authors define privacy as the “knowledge of existence or absence of vertices, edges, or labels,” as well as “betweenness, closeness, and centrality” in metric terms. They also use utility as a dimension to measure “information loss and distortion in the anonymization process,” and the attacker’s background knowledge as a possible way to “compromise privacy protection.” Both the anonymized network and the attacker’s background knowledge are graphs. The seed-and-grow algorithm “first identifies a seed subgraph, either planted by an attacker or divulged by collusion of a small group of users, and then grows the seed larger based on the attacker’s existing knowledge of the users’ social relations.” Simulation on real-world data verifies the authors’ claims on the effectiveness and accuracy of user identification in anonymized social networks using their method.

The paper is good for easy reading and I recommend it to readers interested in graphs and networks.

Reviewer:  Tanbir Ahmed Review #: CR142894 (1502-0167)
Bookmark and Share
 
Graph Theory (G.2.2 )
 
 
Social Networking (H.3.4 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Graph Theory": Date
Graphs and algorithms
Gondran M., Minoux M. (ed), Vajda S., John Wiley & Sons, Inc., New York, NY, 1984. Type: Book (9789780471103745)
Jan 1 1985
On graph rewritings
Raoult J. Theoretical Computer Science 32(1-2): 1-24, 1984. Type: Article
Sep 1 1985
Non-partitionable point sets
Avis D. Information Processing Letters 19(3): 125-129, 1984. Type: Article
Jul 1 1985
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy