[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/1458082.1458123acmconferencesArticle/Chapter ViewAbstractPublication PagescikmConference Proceedingsconference-collections
research-article

Link privacy in social networks

Published: 26 October 2008 Publication History

Abstract

We consider a privacy threat to a social network in which the goal of an attacker is to obtain knowledge of a significant fraction of the links in the network. We formalize the typical social network interface and the information about links that it provides to its users in terms of lookahead. We consider a particular threat where an attacker subverts user accounts to get information about local neighborhoods in the network and pieces them together in order to get a global picture. We analyze, both experimentally and theoretically, the number of user accounts an attacker would need to subvert for a successful attack, as a function of his strategy for choosing users whose accounts to subvert and a function of lookahead provided by the network. We conclude that such an attack is feasible in practice, and thus any social network that wishes to protect the link privacy of its users should take great care in choosing the lookahead of its interface, limiting it to 1 or 2, whenever possible.

References

[1]
Facebook Press Release. http://www.facebook.com/press/info.php?statistics, 2008.
[2]
TechCrunch. http://www.techcrunch.com/2008/05/17/facebooks-glass-jaw/, 2008.
[3]
Technology Review. http://www.technologyreview.com/Wire/20825/, 2008.
[4]
L. Adamic, R. Lukose, A. Puniyani, and B. Huberman. Search in power-law networks. Phys. Rev. E, 2001.
[5]
W. Aiello, F. Chung, and L. Liu. A random graph model for power law graphs. IEEE Symposium on Foundations of Computer Science, 2000.
[6]
L. Backstrom, C. Dwork, and J. Kleinberg. Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography. In WWW '07: Proceedings of the 16th international conference on World Wide Web, pages 181--190, New York, NY, USA, 2007. ACM Press.
[7]
A. Barabasi and R. Albert. Emergence of scaling in random networks. Science, (509), 1999.
[8]
E. A. Bender and E. R. Canfield. The asymptotic number of labeled graphs with given degree sequences. Journal of Combinatorial Theory, Series A 24, pp. 296--307, 1978.
[9]
B. Bollobas, C. Borgs, T. Chayes, and O. Riordan. Directed scale-free graphs. ACM-SIAM Sypmosium on Discrete Algorithms, 2003.
[10]
C. Cooper and A. Frieze. A general model of web graphs. Random Structures and Algorithms, 22(3), pp.311--335, 2003.
[11]
G. Csanyi and B. Szendroi. Structure of a large social network. Physical Review E 69, 2004.
[12]
C. Gkantsidis, M. Mihail, and A. Saberi. Conductance and congestion in power law graphs. Sigmetrics, 2003.
[13]
M. Hay, G. Miklau, D. Jensen, P. Weis, and S. Srivastava. Anonymizing social networks. University of Massachusetts, Amherst Technical Report, 2007.
[14]
M. Kelly. Facebook Security: Fighting the good fight. Facebook blog, http://blog.new.facebook.com/blog.php?post=25844207130, August 7, 2008.
[15]
J. Kleinberg. Navigation in a small world. Nature, (845), 2000.
[16]
B. Krebs. Account Hijackings Force LiveJournal Changes. Washington Post, January 20, 2006.
[17]
R. Kumar, P. Raghavan, S. Rajagopalan, D. Sivakumar, A. Tomkins, and E. Upfal. Stochastic models for the web graph. IEEE Symposium on Foundations of Computer Science, 2000.
[18]
J. Leskovec, D. Chakrabarti, J. M. Kleinberg, and C. Faloutsos. Realistic, mathematically tractable graph generation and evolution, using kronecker multiplication. In PKDD, pages 133--145, 2005.
[19]
K. Liu, K. Das, T. Grandison, and H. Kargupta. Privacy-preserving data analysis on graphs and social networks. In H. Kargupta, J. Han, P. Yu, R. Motwani, and V. Kumar, editors, Next Generation Data Mining. CRC Press, 2008.
[20]
M. Mihail, A. Saberi, and P. Tetali. Random walks with lookahead in power law random graphs. Internet Mathematics.
[21]
R. Motwani and P. Raghavan. Cambridge University Press New York, NY, USA, 1995.
[22]
H. von Schelling. Coupon collecting for unequal probabilities. Am. Math. Monthly, 61:306--311, 1954.
[23]
S. Wasserman and K. Faust. Cambridge University Press, Cambridge, USA, 1994.
[24]
D. Watts and S. Strogatz. Collective dynamics of small-world networks. Nature 393 440--442, 1998.
[25]
E. Zheleva and L. Getoor. Preserving the privacy of sensitive relationships in graph data. In Proceedings of the International Workshop on Privacy, Security and Trust in KDD, 2007.
[26]
B. Zhou and J. Pei. Preserving privacy in social networks against neighborhood attacks. In Data Engineering, 2008. ICDE 2008. IEEE 24th International Conference on, pages 506--515, 2008.

Cited By

View all
  • (2023)Adversarial NLP for Social Network Applications: Attacks, Defenses, and Research DirectionsIEEE Transactions on Computational Social Systems10.1109/TCSS.2022.321874310:6(3089-3108)Online publication date: Dec-2023
  • (2022)Collecting Triangle Counts with Edge Relationship Local Differential Privacy*2022 IEEE 38th International Conference on Data Engineering (ICDE)10.1109/ICDE53745.2022.00196(2008-2020)Online publication date: May-2022
  • (2022)A Brief Survey on Privacy-Preserving Methods for Graph-Structured DataThe International Conference on Image, Vision and Intelligent Systems (ICIVIS 2021)10.1007/978-981-16-6963-7_52(573-583)Online publication date: 3-Mar-2022
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
CIKM '08: Proceedings of the 17th ACM conference on Information and knowledge management
October 2008
1562 pages
ISBN:9781595939913
DOI:10.1145/1458082
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 26 October 2008

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. anonymization
  2. link analysis
  3. link privacy
  4. privacy in data mining
  5. social networks

Qualifiers

  • Research-article

Conference

CIKM08
CIKM08: Conference on Information and Knowledge Management
October 26 - 30, 2008
California, Napa Valley, USA

Acceptance Rates

Overall Acceptance Rate 1,861 of 8,427 submissions, 22%

Upcoming Conference

CIKM '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)22
  • Downloads (Last 6 weeks)3
Reflects downloads up to 12 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2023)Adversarial NLP for Social Network Applications: Attacks, Defenses, and Research DirectionsIEEE Transactions on Computational Social Systems10.1109/TCSS.2022.321874310:6(3089-3108)Online publication date: Dec-2023
  • (2022)Collecting Triangle Counts with Edge Relationship Local Differential Privacy*2022 IEEE 38th International Conference on Data Engineering (ICDE)10.1109/ICDE53745.2022.00196(2008-2020)Online publication date: May-2022
  • (2022)A Brief Survey on Privacy-Preserving Methods for Graph-Structured DataThe International Conference on Image, Vision and Intelligent Systems (ICIVIS 2021)10.1007/978-981-16-6963-7_52(573-583)Online publication date: 3-Mar-2022
  • (2021)Privacy Preserving Approaches for Online Social Network Data PublishingDigital Transformation and Challenges to Data Security and Privacy10.4018/978-1-7998-4201-9.ch007(119-132)Online publication date: 2021
  • (2021)Data Anonymization for Pervasive Health Care: Systematic Literature Mapping StudyJMIR Medical Informatics10.2196/298719:10(e29871)Online publication date: 15-Oct-2021
  • (2021)Manipulating Black-Box Networks for Centrality Promotion2021 IEEE 37th International Conference on Data Engineering (ICDE)10.1109/ICDE51399.2021.00014(73-84)Online publication date: Apr-2021
  • (2021)Anonymizing Global Edge Weighted Social Network GraphsSecurity and Privacy in Social Networks and Big Data10.1007/978-981-16-7913-1_9(119-130)Online publication date: 15-Nov-2021
  • (2021)Privacy Preservation Approaches for Social Network Data PublishingArtificial Intelligence for Cyber Security: Methods, Issues and Possible Horizons or Opportunities10.1007/978-3-030-72236-4_9(213-233)Online publication date: 1-Jun-2021
  • (2020)A Survey on Privacy in Social MediaACM/IMS Transactions on Data Science10.1145/33430381:1(1-38)Online publication date: 12-Mar-2020
  • (2020)Implicit Trust Recommendation Algorithm based on Item Meaning2020 IEEE 9th Joint International Information Technology and Artificial Intelligence Conference (ITAIC)10.1109/ITAIC49862.2020.9338889(1782-1791)Online publication date: 11-Dec-2020
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media