skip to main content
10.1145/2396761.2396823acmconferencesArticle/Chapter ViewAbstractPublication PagescikmConference Proceedingsconference-collections
research-article

Delineating social network data anonymization via random edge perturbation

Published:29 October 2012Publication History

ABSTRACT

Social network data analysis raises concerns about the privacy of related entities or individuals. To address this issue, organizations can publish data after simply replacing the identities of individuals with pseudonyms, leaving the overall structure of the social network unchanged. However, it has been shown that attacks based on structural identification (e.g., a walk-based attack) enable an adversary to re-identify selected individuals in an anonymized network. In this paper we explore the capacity of techniques based on random edge perturbation to thwart such attacks. We theoretically establish that any kind of structural identification attack can effectively be prevented using random edge perturbation and show that, surprisingly, important properties of the whole network, as well as of subgraphs thereof, can be accurately calculated and hence data analysis tasks performed on the perturbed data, given that the legitimate data recipient knows the perturbation probability as well. Yet we also examine ways to enhance the walk-based attack, proposing a variant we call probabilistic attack. Nevertheless, we demonstrate that such probabilistic attacks can also be prevented under sufficient perturbation. Eventually, we conduct a thorough theoretical study of the probability of success of any}structural attack as a function of the perturbation probability. Our analysis provides a powerful tool for delineating the identification risk of perturbed social network data; our extensive experiments with synthetic and real datasets confirm our expectations.

References

  1. L. Backstrom, C. Dwork, and J. M. Kleinberg. Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography. In WWW, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. F. Bonchi, A. Gionis, and T. Tassa. Identity obfuscation in graphs through the information theoretic lens. In ICDE, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. J. Cheng, A. W.-C. Fu, and J. Liu. k-isomorphism: privacy preserving network publication against structural attacks. In SIGMOD, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. G. Cormode, D. Srivastava, T. Yu, and Q. Zhang. Anonymizing bipartite graph data using safe groupings. In VLDB, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. L. da F. Costa, F. A. Rodrigues, G. Travieso, and P. R. V. Boas. Characterization of complex networks: A survey of measurements.Adv. Phys., 2007.Google ScholarGoogle ScholarCross RefCross Ref
  6. M. R. Garey and D. S. Johnson. Computers and Intractability: A Guide to the Theory of NP-Completeness. Freeman, 1979. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. M. Hay, G. Miklau, D. Jensen, D. Towsley, and P. Weis. Resisting structural re-identification in anonymized social networks. PVLDB, 1(1):102--114, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. M. Hay, G. Miklau, D. Jesen, P. Weis, and S. Srivastava. Anonymizing social networks. Technical Report 07--19, 2007.Google ScholarGoogle Scholar
  9. K. Liu and E. Terzi. Towards identity anonymization on graphs. In SIGMOD, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. X. Ying and X. Wu. Randomizing social networks: a spectrum preserving approach. In SIAM SDM, 2008.Google ScholarGoogle ScholarCross RefCross Ref
  11. B. Zhou and J. Pei. Preserving privacy in social networks against neighborhood attacks. In ICDE, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. L. Zou, L. Chen, and M. T. Özsu. k-automorphism: A general framework for privacy preserving network publication. In VLDB, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Delineating social network data anonymization via random edge perturbation

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          CIKM '12: Proceedings of the 21st ACM international conference on Information and knowledge management
          October 2012
          2840 pages
          ISBN:9781450311564
          DOI:10.1145/2396761

          Copyright © 2012 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 29 October 2012

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          Overall Acceptance Rate1,861of8,427submissions,22%

          Upcoming Conference

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader