skip to main content
10.1145/2660267.2660278acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Structural Data De-anonymization: Quantification, Practice, and Implications

Authors Info & Claims
Published:03 November 2014Publication History

ABSTRACT

In this paper, we study the quantification, practice, and implications of structural data (e.g., social data, mobility traces) De-Anonymization (DA). First, we address several open problems in structural data DA by quantifying perfect and (1-ε)-perfect structural data DA}, where ε is the error tolerated by a DA scheme. To the best of our knowledge, this is the first work on quantifying structural data DA under a general data model, which closes the gap between structural data DA practice and theory. Second, we conduct the first large-scale study on the de-anonymizability of 26 real world structural datasets, including Social Networks (SNs), Collaborations Networks, Communication Networks, Autonomous Systems, and Peer-to-Peer networks. We also quantitatively show the conditions for perfect and (1-ε)-perfect DA of the 26 datasets. Third, following our quantification, we design a practical and novel single-phase cold start Optimization based DA} (ODA) algorithm. Experimental analysis of ODA shows that about 77.7% - 83.3% of the users in Gowalla (.2M users and 1M edges) and 86.9% - 95.5% of the users in Google+ (4.7M users and 90.8M edges) are de-anonymizable in different scenarios, which implies optimization based DA is implementable and powerful in practice. Finally, we discuss the implications of our DA quantification and ODA and provide some general suggestions for future secure data publishing.

References

  1. L. Backstrom, C. Dwork, and J. Kleinberg, Wherefore Art Thou R3579X? Anonymized Social Networks, Hidden Patterns, and Structural Steganography, WWW 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. A. Narayanan and V. Shmatikov, De-anonymizing Social Networks, S&P 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. M. Srivatsa and M. Hicks, Deanonymizing Mobility Traces: Using Social Networks as a Side-Channel, CCS 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. G. Wondracek, T. Holz, E. Kirda, and C. Kruegel, A Practical Attack to De-Anonymize Social Network Users, S&P 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. P. Pedarsani and M. Grossglauser, On the Privacy of Anonymized Networks, KDD 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. M. Hay, G. Miklau, D. Jensen, D. Towsley, and P. Weis, Resisting Structural Re-identification in Anonymized Social Networks, VLDB 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. K. Liu and E. Terzi, Towards Identity Anonymization on Graphs, SIGMOD 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. N. Li, W. Qardaji, and D. Su, On Sampling, Anonymization, and Differential Privacy Or, K-Anonymization Meets Differential Privacy, ASIACCS 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. C. Dwork, Differential Privacy, ICALP 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. A. Korolova, R. Motwani, S. U. Nabar, and Y. Xu, Link Privacy in Social Networks, CIKM 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. E. Zheleva and L. Getoor, To Join or Not to Join: The Illusion of Privacy in Social Networks with Mixed Public and Private User Profiles, WWW 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. J. Pang, B. Greenstein, R. Gummadi, S. Seshan, and D. Wetherall, 802.11 User Fingerprinting, Mobicom 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. L. Backstrom, E. Sun, and C. Marlow, Find me If You Can: Improving Geographical Prediction with Social and Spatial Proximity, WWW 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. S. Han, V. Liu, Q. Pu, S. Peter, T. Anderson, A. Krishnamurthy, and D. Wetherall, Expressive Privacy Control with Pseudonyms, Sigcomm 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. P. Mittal, M. Wright, and N. Borisov, Pisces: Anonymous Communication Using Social Networks, NDSS 2013.Google ScholarGoogle Scholar
  16. J. Kannan, G. Altekar, P. Maniatis, and B.-G. Chun Making programs forget: Enforcing Lifetime for Sensitive Data, USENIX 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. M. Egele, G. Stringhini, C. Krugel, and G. Vigna, COMPA: Detecting Compromised Accounts on Social Networks, NDSS 2013.Google ScholarGoogle Scholar
  18. K. Singh, S. Bhola, and W. Lee, xBook: Redesigning Privacy Control in Social Networking Pl atforms, USENIX 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. R. Shokri, G. Theodorakopoulos, J.-Y. L. Boudec, and J.-P. Hubaux, Quantifying Location Privacy, S&P 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. R. Shokri, G. Theodorakopoulos, C. Troncoso, J.-P. Hubaux, and J.-Y. L. Boudec, Protecting Location Privacy: Optimal Strategy against Localization Attacks, CCS 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. M. E. J. Newman, Networks: An Introduction, Oxford University Press, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. M. E. J. Newman, The Structure and Function of Complex Networks, SIAM Review, No. 45, pp. 167-256, 2003.Google ScholarGoogle Scholar
  23. B. Bollobás, Random Graphs (Second Edition), Cambridge University Press, 2001.Google ScholarGoogle Scholar
  24. J. Riordan, An Introduction to Combinatorial Analysis, Wiley, 1958.Google ScholarGoogle Scholar
  25. N. Z. Gong, W. Xu, L. Huang, P. Mittal, E. Stefanov, V. Sekar and D. Song, Evolution of Social-Attribute Networks: Measurements, Modeling, and Implications using Google+, IMC 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. http://snap.stanford.edu/data/Google ScholarGoogle Scholar
  27. H. Pham, C. Shahabi, and Yan Liu, EBM - An Entropy-Based Model to Infer Social Strength from Spatiotemporal Data, SIGMOD 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. C. Shah, R. Capra, and P. Hansen, Collaborative Information Seeking, Computer, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Z. Xu, J. Ramanathan, and R. Ramnath, Identifying Knowledge Brokers and Their Role in Enterprise Research through Social Media, Computer, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Structural Data De-anonymization: Quantification, Practice, and Implications

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        CCS '14: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security
        November 2014
        1592 pages
        ISBN:9781450329576
        DOI:10.1145/2660267

        Copyright © 2014 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 3 November 2014

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        CCS '14 Paper Acceptance Rate114of585submissions,19%Overall Acceptance Rate1,261of6,999submissions,18%

        Upcoming Conference

        CCS '24
        ACM SIGSAC Conference on Computer and Communications Security
        October 14 - 18, 2024
        Salt Lake City , UT , USA

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader