[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

Social Network De-Anonymization and Privacy Inference with Knowledge Graph Model

Published: 01 July 2019 Publication History

Abstract

Social network data is widely shared, transferred and published for research purposes and business interests, but it has raised much concern on users? privacy. Even though users? identity information is always removed, attackers can still de-anonymize users with the help of auxiliary information. To protect against de-anonymization attack, various privacy protection techniques for social networks have been proposed. However, most existing approaches assume specific and restrict network structure as background knowledge and ignore semantic level prior belief of attackers, which are not always realistic in practice and do not apply to arbitrary privacy scenarios. Moreover, the privacy inference attack in the presence of semantic background knowledge is barely investigated. To address these shortcomings, in this work, we introduce knowledge graphs to explicitly express arbitrary prior belief of the attacker for any individual user. The processes of de-anonymization and privacy inference are accordingly formulated based on knowledge graphs. Our experiment on data of real social networks shows that knowledge graphs can power de-anonymization and inference attacks, and thus increase the risk of privacy disclosure. This suggests the validity of knowledge graphs as a general effective model of attackers? background knowledge for social network attack and privacy preservation.

Cited By

View all
  • (2024)PerceptAnonProceedings of the 41st International Conference on Machine Learning10.5555/3692070.3693688(39955-39971)Online publication date: 21-Jul-2024
  • (2024)MetaHKG: Meta Hyperbolic Learning for Few-shot Temporal ReasoningProceedings of the 47th International ACM SIGIR Conference on Research and Development in Information Retrieval10.1145/3626772.3657711(59-69)Online publication date: 10-Jul-2024
  • (2024)PRIMϵ: Novel Privacy-Preservation Model With Pattern Mining and Genetic AlgorithmIEEE Transactions on Information Forensics and Security10.1109/TIFS.2023.332476919(571-585)Online publication date: 1-Jan-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image IEEE Transactions on Dependable and Secure Computing
IEEE Transactions on Dependable and Secure Computing  Volume 16, Issue 4
July 2019
178 pages

Publisher

IEEE Computer Society Press

Washington, DC, United States

Publication History

Published: 01 July 2019

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 15 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)PerceptAnonProceedings of the 41st International Conference on Machine Learning10.5555/3692070.3693688(39955-39971)Online publication date: 21-Jul-2024
  • (2024)MetaHKG: Meta Hyperbolic Learning for Few-shot Temporal ReasoningProceedings of the 47th International ACM SIGIR Conference on Research and Development in Information Retrieval10.1145/3626772.3657711(59-69)Online publication date: 10-Jul-2024
  • (2024)PRIMϵ: Novel Privacy-Preservation Model With Pattern Mining and Genetic AlgorithmIEEE Transactions on Information Forensics and Security10.1109/TIFS.2023.332476919(571-585)Online publication date: 1-Jan-2024
  • (2024)Secure Semantic Communications: Challenges, Approaches, and OpportunitiesIEEE Network: The Magazine of Global Internetworking10.1109/MNET.2023.332711138:4(197-206)Online publication date: 1-Jul-2024
  • (2024)A privacy‐sensitive data identification model in online social networksTransactions on Emerging Telecommunications Technologies10.1002/ett.487635:1Online publication date: 15-Jan-2024
  • (2023)Application of Automatic Completion Algorithm of Power Professional Knowledge Graphs in View of Convolutional Neural NetworkInternational Journal of Information Technologies and Systems Approach10.4018/IJITSA.32364816:2(1-14)Online publication date: 23-May-2023
  • (2023)Mutually-paced Knowledge Distillation for Cross-lingual Temporal Knowledge Graph ReasoningProceedings of the ACM Web Conference 202310.1145/3543507.3583407(2621-2632)Online publication date: 30-Apr-2023
  • (2023)Anchor Link Prediction for Privacy Leakage via De-Anonymization in Multiple Social NetworksIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2023.324200920:6(5197-5213)Online publication date: 1-Nov-2023
  • (2023)Anomaly Detection in Cloud Computing using Knowledge Graph Embedding and Machine Learning MechanismsJournal of Grid Computing10.1007/s10723-023-09727-122:1Online publication date: 29-Dec-2023
  • (2023)Priv-S: Privacy-Sensitive Data Identification in Online Social NetworksWeb Information Systems Engineering – WISE 202310.1007/978-981-99-7254-8_17(220-234)Online publication date: 25-Oct-2023
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media