Skip to main content
Top

2020 | OriginalPaper | Chapter

Active Re-identification Attacks on Periodically Released Dynamic Social Graphs

Authors : Xihui Chen, Ema Këpuska, Sjouke Mauw, Yunior Ramírez-Cruz

Published in: Computer Security – ESORICS 2020

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Active re-identification attacks pose a serious threat to privacy-preserving social graph publication. Active attackers create fake accounts to enforce structural patterns that can be used to re-identify legitimate users on published anonymised graphs, even without additional background knowledge. So far, this type of attacks has only been studied in the scenario where the inherently dynamic social graph is published once. In this paper, we present the first active re-identification attack in the more realistic scenario where a dynamic social graph is periodically published. Our new attack leverages tempo-structural patterns, created by a dynamic set of sybil nodes, for strengthening the adversary. We evaluate our new attack through a comprehensive set of experiments on real-life and synthetic dynamic social graphs. We show that our new attack substantially outperforms the most effective static active attack in the literature by increasing success probability by at least two times and efficiency by at least 11 times. Moreover, we show that, unlike the static attack, our new attack remains at the same level of efficiency as the publication process advances. Additionally, we conduct a study on the factors that may thwart our new attack, which can help design dynamic graph anonymisation methods displaying a better balance between privacy and utility.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Appendix
Available only for authorised users
Literature
1.
2.
go back to reference Backstrom, L., Dwork, C., Kleinberg, J.M.: Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography. Commun. ACM 54(12), 133–141 (2011)CrossRef Backstrom, L., Dwork, C., Kleinberg, J.M.: Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography. Commun. ACM 54(12), 133–141 (2011)CrossRef
3.
go back to reference Casas-Roma, J., Herrera-Joancomartí, J., Torra, V.: k-degree anonymity and edge selection: improving data utility in large networks. Knowl. Inf. Syst. 50(2), 447–474 (2017)CrossRef Casas-Roma, J., Herrera-Joancomartí, J., Torra, V.: k-degree anonymity and edge selection: improving data utility in large networks. Knowl. Inf. Syst. 50(2), 447–474 (2017)CrossRef
4.
go back to reference Dakiche, N., Tayeb, F.B., Slimani, Y., Benatchba, K.: Tracking community evolution in social networks: a survey. Inf. Process. Manag. 56(3), 1084–1102 (2019)CrossRef Dakiche, N., Tayeb, F.B., Slimani, Y., Benatchba, K.: Tracking community evolution in social networks: a survey. Inf. Process. Manag. 56(3), 1084–1102 (2019)CrossRef
5.
go back to reference Ding, X., Zhang, L., Wan, Z., Gu, M.: De-anonymizing dynamic social networks. In: Proceedings of GLOBECOM 2011, pp. 1–6 (2011) Ding, X., Zhang, L., Wan, Z., Gu, M.: De-anonymizing dynamic social networks. In: Proceedings of GLOBECOM 2011, pp. 1–6 (2011)
6.
go back to reference Ji, S., Li, W., Srivatsa, M., Beyah, R.: Structural data de-anonymization: quantification, practice, and implications. In: Proceedings of CCS 2014, pp. 1040–1053 (2014) Ji, S., Li, W., Srivatsa, M., Beyah, R.: Structural data de-anonymization: quantification, practice, and implications. In: Proceedings of CCS 2014, pp. 1040–1053 (2014)
7.
go back to reference Korula, N., Lattanzi, S.: An efficient reconciliation algorithm for social networks. Proc. VLDB Endow. 7(5), 377–388 (2014)CrossRef Korula, N., Lattanzi, S.: An efficient reconciliation algorithm for social networks. Proc. VLDB Endow. 7(5), 377–388 (2014)CrossRef
8.
go back to reference Kumar, S., Spezzano, F., Subrahmanian, V.S., Faloutsos, C.: Edge weight prediction in weighted signed networks. In: Proceedings of ICDM 2016, pp. 221–230 (2016) Kumar, S., Spezzano, F., Subrahmanian, V.S., Faloutsos, C.: Edge weight prediction in weighted signed networks. In: Proceedings of ICDM 2016, pp. 221–230 (2016)
9.
go back to reference Kunegis, J.: KONECT: the Koblenz network collection. In: Proceedings of WWW 2013, pp. 1343–1350 (2013) Kunegis, J.: KONECT: the Koblenz network collection. In: Proceedings of WWW 2013, pp. 1343–1350 (2013)
10.
go back to reference Liu, K., Terzi, E.: Towards identity anonymization on graphs. In: Proceedings of SIGMOD 2008, pp. 93–106 (2008) Liu, K., Terzi, E.: Towards identity anonymization on graphs. In: Proceedings of SIGMOD 2008, pp. 93–106 (2008)
11.
go back to reference Martínez, V., Berzal, F., Cubero, J.C.: A survey of link prediction in complex networks. ACM Comput. Surv. 49(4), 69 (2017)CrossRef Martínez, V., Berzal, F., Cubero, J.C.: A survey of link prediction in complex networks. ACM Comput. Surv. 49(4), 69 (2017)CrossRef
12.
go back to reference Mauw, S., Ramírez-Cruz, Y., Trujillo-Rasua, R.: Anonymising social graphs in the presence of active attackers. Trans. Data Privacy 11(2), 169–198 (2018) Mauw, S., Ramírez-Cruz, Y., Trujillo-Rasua, R.: Anonymising social graphs in the presence of active attackers. Trans. Data Privacy 11(2), 169–198 (2018)
15.
go back to reference Narayanan, A., Shmatikov, V.: De-anonymizing social networks. In: Proceedings of S&P 2009, pp. 173–187 (2009) Narayanan, A., Shmatikov, V.: De-anonymizing social networks. In: Proceedings of S&P 2009, pp. 173–187 (2009)
16.
go back to reference Nilizadeh, S., Kapadia, A., Ahn, Y.: Community-enhanced de-anonymization of online social networks. In: Proceedings of CCS 2014, pp. 537–548 (2014) Nilizadeh, S., Kapadia, A., Ahn, Y.: Community-enhanced de-anonymization of online social networks. In: Proceedings of CCS 2014, pp. 537–548 (2014)
17.
go back to reference Papadopoulos, F., Kleineberg, K.K.: Link persistence and conditional distances in multiplex networks. Phys. Rev. E 99(1), 012322 (2019)CrossRef Papadopoulos, F., Kleineberg, K.K.: Link persistence and conditional distances in multiplex networks. Phys. Rev. E 99(1), 012322 (2019)CrossRef
18.
go back to reference Pedarsani, P., Figueiredo, D.R., Grossglauser, M.: A Bayesian method for matching two similar graphs without seeds. In: Proceedings of the 51st Annual Allerton Conference on Communication, Control, and Computing, pp. 1598–1607 (2013) Pedarsani, P., Figueiredo, D.R., Grossglauser, M.: A Bayesian method for matching two similar graphs without seeds. In: Proceedings of the 51st Annual Allerton Conference on Communication, Control, and Computing, pp. 1598–1607 (2013)
19.
go back to reference Peng, W., Li, F., Zou, X., Wu, J.: A two-stage deanonymization attack against anonymized social networks. IEEE Trans. Comput. 63(2), 290–303 (2014)MathSciNetCrossRef Peng, W., Li, F., Zou, X., Wu, J.: A two-stage deanonymization attack against anonymized social networks. IEEE Trans. Comput. 63(2), 290–303 (2014)MathSciNetCrossRef
21.
go back to reference Tai, C.H., Tseng, P.J., Philip, S.Y., Chen, M.S.: Identities anonymization in dynamic social networks. In: Proceedings of ICDM 2011, pp. 1224–1229 (2011) Tai, C.H., Tseng, P.J., Philip, S.Y., Chen, M.S.: Identities anonymization in dynamic social networks. In: Proceedings of ICDM 2011, pp. 1224–1229 (2011)
22.
go back to reference Wu, W., Xiao, Y., Wang, W., He, Z., Wang, Z.: K-symmetry model for identity anonymization in social networks. In: Proceedings of the 13th International Conference on Extending Database Technology, pp. 111–122 (2010) Wu, W., Xiao, Y., Wang, W., He, Z., Wang, Z.: K-symmetry model for identity anonymization in social networks. In: Proceedings of the 13th International Conference on Extending Database Technology, pp. 111–122 (2010)
23.
go back to reference Yartseva, L., Grossglauser, M.: On the performance of percolation graph matching. In: Proceedings of COSN 2013, pp. 119–130 (2013) Yartseva, L., Grossglauser, M.: On the performance of percolation graph matching. In: Proceedings of COSN 2013, pp. 119–130 (2013)
24.
go back to reference Yu, H., Gibbons, P.B., Kaminsky, M., Xiao, F.: Sybillimit: a near-optimal social network defense against sybil attacks. In: Procs. of S&P 2008. pp. 3–17 (2008) Yu, H., Gibbons, P.B., Kaminsky, M., Xiao, F.: Sybillimit: a near-optimal social network defense against sybil attacks. In: Procs. of S&P 2008. pp. 3–17 (2008)
25.
go back to reference Yu, H., Kaminsky, M., Gibbons, P.B., Flaxman, A.: SybilQuard: defending against sybil attacks via social networks. In: Proceedings of SIGCOMM 2006, pp. 267–278 (2006) Yu, H., Kaminsky, M., Gibbons, P.B., Flaxman, A.: SybilQuard: defending against sybil attacks via social networks. In: Proceedings of SIGCOMM 2006, pp. 267–278 (2006)
26.
go back to reference Zhou, B., Pei, J.: Preserving privacy in social networks against neighborhood attacks. In: Proceedings of ICDE 2008, pp. 506–515 (2008) Zhou, B., Pei, J.: Preserving privacy in social networks against neighborhood attacks. In: Proceedings of ICDE 2008, pp. 506–515 (2008)
27.
go back to reference Zou, L., Chen, L., Özsu, M.T.: K-automorphism: a general framework for privacy preserving network publication. Proc. VLDB Endow. 2(1), 946–957 (2009)CrossRef Zou, L., Chen, L., Özsu, M.T.: K-automorphism: a general framework for privacy preserving network publication. Proc. VLDB Endow. 2(1), 946–957 (2009)CrossRef
Metadata
Title
Active Re-identification Attacks on Periodically Released Dynamic Social Graphs
Authors
Xihui Chen
Ema Këpuska
Sjouke Mauw
Yunior Ramírez-Cruz
Copyright Year
2020
DOI
https://doi.org/10.1007/978-3-030-59013-0_10

Premium Partner