[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1109/ICDMW.2012.87guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Measuring Local Topological Anonymity in Social Networks

Published: 10 December 2012 Publication History

Abstract

Service providers of social network based services release their sanitized graph structure for third parties (e.g., business partners) from time to time. However, as these releases contain valuable information additionally to what is publicly available in the network, these may be targeted by re-identification attacks, i.e., where an attacker tries to recover the identities of the nodes that were removed during the sanitization process. One powerful type of these, called structural re-identification attacks consider only structural properties, and work according to a specific strategy: first they re-identify some nodes by their globally unique properties, and then in an optional second phase, nodes related to these are re-identified by their locally unique properties. Global re-identifiability or global node anonymity is a well studied concept, however, node anonymity for local re-identification has not yet been analyzed. Therefore in this paper, after discussing the related literature on anonymity and re-identification, we introduce the novel term of Local Topological Anonymity (LTA), which describes the resistant power of a node against local re-identification attacks, or, in other words, indicates how well the node is structurally hidden in her neighborhood. Regarding these attacks in the literature, we propose three measure variants of LTA based on structural similarity measures, and evaluate them by visual inspection and simulation in multiple networks. We show that one of the proposed measures provides good prediction on local node re-identifiability as there is correlation between the LTA values and the re-identification statistics provided by the state-of-the-art algorithm.

Cited By

View all
  • (2021)Real-time privacy risk quantification in online social networksProceedings of the 2021 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining10.1145/3487351.3488272(74-81)Online publication date: 8-Nov-2021
  • (2019)Hiding information against structural re-identificationInternational Journal of Information Security10.1007/s10207-018-0400-x18:2(125-139)Online publication date: 1-Apr-2019
  • (2016)An Efficient and Robust Social Network De-anonymization AttackProceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society10.1145/2994620.2994632(1-11)Online publication date: 24-Oct-2016

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
ICDMW '12: Proceedings of the 2012 IEEE 12th International Conference on Data Mining Workshops
December 2012
974 pages
ISBN:9780769549255

Publisher

IEEE Computer Society

United States

Publication History

Published: 10 December 2012

Author Tags

  1. anonymity
  2. re-identification
  3. social networks

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 11 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2021)Real-time privacy risk quantification in online social networksProceedings of the 2021 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining10.1145/3487351.3488272(74-81)Online publication date: 8-Nov-2021
  • (2019)Hiding information against structural re-identificationInternational Journal of Information Security10.1007/s10207-018-0400-x18:2(125-139)Online publication date: 1-Apr-2019
  • (2016)An Efficient and Robust Social Network De-anonymization AttackProceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society10.1145/2994620.2994632(1-11)Online publication date: 24-Oct-2016

View Options

View options

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media