skip to main content
10.1145/1458082.1458123acmconferencesArticle/Chapter ViewAbstractPublication PagescikmConference Proceedingsconference-collections
research-article

Link privacy in social networks

Published:26 October 2008Publication History

ABSTRACT

We consider a privacy threat to a social network in which the goal of an attacker is to obtain knowledge of a significant fraction of the links in the network. We formalize the typical social network interface and the information about links that it provides to its users in terms of lookahead. We consider a particular threat where an attacker subverts user accounts to get information about local neighborhoods in the network and pieces them together in order to get a global picture. We analyze, both experimentally and theoretically, the number of user accounts an attacker would need to subvert for a successful attack, as a function of his strategy for choosing users whose accounts to subvert and a function of lookahead provided by the network. We conclude that such an attack is feasible in practice, and thus any social network that wishes to protect the link privacy of its users should take great care in choosing the lookahead of its interface, limiting it to 1 or 2, whenever possible.

References

  1. Facebook Press Release. http://www.facebook.com/press/info.php?statistics, 2008.Google ScholarGoogle Scholar
  2. TechCrunch. http://www.techcrunch.com/2008/05/17/facebooks-glass-jaw/, 2008.Google ScholarGoogle Scholar
  3. Technology Review. http://www.technologyreview.com/Wire/20825/, 2008.Google ScholarGoogle Scholar
  4. L. Adamic, R. Lukose, A. Puniyani, and B. Huberman. Search in power-law networks. Phys. Rev. E, 2001.Google ScholarGoogle ScholarCross RefCross Ref
  5. W. Aiello, F. Chung, and L. Liu. A random graph model for power law graphs. IEEE Symposium on Foundations of Computer Science, 2000.Google ScholarGoogle Scholar
  6. L. Backstrom, C. Dwork, and J. Kleinberg. Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography. In WWW '07: Proceedings of the 16th international conference on World Wide Web, pages 181--190, New York, NY, USA, 2007. ACM Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. A. Barabasi and R. Albert. Emergence of scaling in random networks. Science, (509), 1999.Google ScholarGoogle Scholar
  8. E. A. Bender and E. R. Canfield. The asymptotic number of labeled graphs with given degree sequences. Journal of Combinatorial Theory, Series A 24, pp. 296--307, 1978. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. B. Bollobas, C. Borgs, T. Chayes, and O. Riordan. Directed scale-free graphs. ACM-SIAM Sypmosium on Discrete Algorithms, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. C. Cooper and A. Frieze. A general model of web graphs. Random Structures and Algorithms, 22(3), pp.311--335, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. G. Csanyi and B. Szendroi. Structure of a large social network. Physical Review E 69, 2004.Google ScholarGoogle Scholar
  12. C. Gkantsidis, M. Mihail, and A. Saberi. Conductance and congestion in power law graphs. Sigmetrics, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. M. Hay, G. Miklau, D. Jensen, P. Weis, and S. Srivastava. Anonymizing social networks. University of Massachusetts, Amherst Technical Report, 2007.Google ScholarGoogle Scholar
  14. M. Kelly. Facebook Security: Fighting the good fight. Facebook blog, http://blog.new.facebook.com/blog.php?post=25844207130, August 7, 2008.Google ScholarGoogle Scholar
  15. J. Kleinberg. Navigation in a small world. Nature, (845), 2000.Google ScholarGoogle Scholar
  16. B. Krebs. Account Hijackings Force LiveJournal Changes. Washington Post, January 20, 2006.Google ScholarGoogle Scholar
  17. R. Kumar, P. Raghavan, S. Rajagopalan, D. Sivakumar, A. Tomkins, and E. Upfal. Stochastic models for the web graph. IEEE Symposium on Foundations of Computer Science, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. J. Leskovec, D. Chakrabarti, J. M. Kleinberg, and C. Faloutsos. Realistic, mathematically tractable graph generation and evolution, using kronecker multiplication. In PKDD, pages 133--145, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. K. Liu, K. Das, T. Grandison, and H. Kargupta. Privacy-preserving data analysis on graphs and social networks. In H. Kargupta, J. Han, P. Yu, R. Motwani, and V. Kumar, editors, Next Generation Data Mining. CRC Press, 2008.Google ScholarGoogle Scholar
  20. M. Mihail, A. Saberi, and P. Tetali. Random walks with lookahead in power law random graphs. Internet Mathematics.Google ScholarGoogle Scholar
  21. R. Motwani and P. Raghavan. Cambridge University Press New York, NY, USA, 1995.Google ScholarGoogle Scholar
  22. H. von Schelling. Coupon collecting for unequal probabilities. Am. Math. Monthly, 61:306--311, 1954.Google ScholarGoogle ScholarCross RefCross Ref
  23. S. Wasserman and K. Faust. Cambridge University Press, Cambridge, USA, 1994.Google ScholarGoogle Scholar
  24. D. Watts and S. Strogatz. Collective dynamics of small-world networks. Nature 393 440--442, 1998.Google ScholarGoogle ScholarCross RefCross Ref
  25. E. Zheleva and L. Getoor. Preserving the privacy of sensitive relationships in graph data. In Proceedings of the International Workshop on Privacy, Security and Trust in KDD, 2007.Google ScholarGoogle Scholar
  26. B. Zhou and J. Pei. Preserving privacy in social networks against neighborhood attacks. In Data Engineering, 2008. ICDE 2008. IEEE 24th International Conference on, pages 506--515, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Link privacy in social networks

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          CIKM '08: Proceedings of the 17th ACM conference on Information and knowledge management
          October 2008
          1562 pages
          ISBN:9781595939913
          DOI:10.1145/1458082

          Copyright © 2008 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 26 October 2008

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          Overall Acceptance Rate1,861of8,427submissions,22%

          Upcoming Conference

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader