De-anonymizing Social Networks with Edge-Neighborhood Graph Attacks | SpringerLink
Skip to main content

De-anonymizing Social Networks with Edge-Neighborhood Graph Attacks

  • Conference paper
  • First Online:
Security and Privacy in Digital Economy (SPDE 2020)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1268))

Included in the following conference series:

  • 1826 Accesses

Abstract

Social networks have a great influence in business, for which the data of social networks are usually released for research purpose. Since the published data might contain sensitive information of users, the identities of which are removed for anonymity before release. However, adversaries could still utilize some background knowledge to re-identify users. In this paper, we propose a novel attack model named edge-neighborhood graph attack (ENGA) against anonymized social networks, in which adversaries are assumed to have background knowledge about targets and their two-hop neighbors represented by 1-neighborhood graph and \(1^{*}\)-neighborhood graphs respectively. Based on such model, a de-anonymous approach is proposed to re-identify users in anonymous social networks. Theoretical analysis indicate that ENGA has a higher de-anomymization rate. And experiments conducted on synthetic data sets and real data sets illustrate the effectiveness of ENGA.

This work is supported by the National Natural Science Foundation of China (Grant No. 61771140, No. U1405255, No. U1905211, No. 61702100, No. 171061).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
JPY 3498
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
JPY 11439
Price includes VAT (Japan)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
JPY 14299
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Campan, A., Truta, T.: A clustering approach for data and structural anonymity in social networks. In: Proceedings the 2nd ACM SIGKDD Int. Workshop Privacy Security Trust in KDD. pp. 33–54 (2008)

    Google Scholar 

  2. Chen, D., L, L., Shang, M., Cheng, Y.: Identifying influential nodes in complex networks. Physica A Statistical Mechanics and Its Applications 39(4) (2012)

    Google Scholar 

  3. Chiasserini, C.F., Garetto, M., Leonardi, E.: Social network de-anonymization under scale-free user relations. IEEE/ACM transactions on networking 24(6), 3756–3769 (2016)

    Article  Google Scholar 

  4. Day, W., Li, N., Min, L.: Publishing graph degree distribution with node differential privacy. In: the 2016 International Conference. pp. 123–138. USA (2016)

    Google Scholar 

  5. Gross, R., Acquisti, A., Iii, H.J.H.: Information revelation and privacy in online social networks. In: Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society. pp. 71–80. ACM, USA (2005)

    Google Scholar 

  6. Jung, T., Li., X.Y., Huang, W.C., Qian, J.W., Cheng, S.: Accounttrade: Accountable protocols for big data trading against dishonest consumers. In: IEEE INFOCOM (2017)

    Google Scholar 

  7. Kiabod, M., Dehkordi, M.N., Barekatain, B.: Tsram: A time-saving k-degree anonymization method in social network. Expert Systems with Application 125, 378–396 (2019)

    Article  Google Scholar 

  8. Langari, R.K., Sardar, S., Mousavi, S.A., Radfar, R.: Combined fuzzy clustering and fifireflfly algorithm for privacy preserving in social networks. Expert Systems with Application 141, 1–15 (2020)

    Google Scholar 

  9. Leskovec, J.: Stanford large network dataset collection. http://snap.stanford.edu/data/

    Google Scholar 

  10. Liu, K., Terzi, E.: Towards identity anonymization on graphs. In: in Proc. ACM SIGMOD Int. Conf. Manage. Data. pp. 93–106 (2008)

    Google Scholar 

  11. Liu, Q., Wang, G., Li, F., Yang, S., Wu, J.: Preserving privacy with probabilistic indistinguishability in weighted social networks. IEEE Transactions on Parallel and Distributed Systems 28(5), 1417–1429 (2017)

    Article  Google Scholar 

  12. Narayanan, A., Shmatikov, V.: De-anonymizing social networks. In: Proceedings of the 30th IEEE Symposium on Security and Privacy. pp. 173–187 (2009)

    Google Scholar 

  13. Qian, J., Li, X., Zhang, C., Chen, L., Jung, T., Han, J.: Social network de-anonymization and privact inference with knowledge graph model. IEEE Transactions on dependable and secure computing 99, 1–14 (2017)

    Google Scholar 

  14. Shah, C., Capra, R., Hansen, P.: Collaborative information seeking: Guest editors’ introduction. IEEE transactions on computer 47(3), 22–25 (2014)

    Google Scholar 

  15. Sharad, K., Danezis, G.: An automated social graph de-anonymization technique. Computer Science pp. 47–58 (2014)

    Google Scholar 

  16. Ying, X., Wu, X.: Randomizing social networks:a spectrum preserving approach. In: In Proceedings of the 2008 SIAM International Conference on Data Mining. p. 739-750. No. 12, SIAM (2008)

    Google Scholar 

  17. Yuan, M., Chen, L., Yu, P.S., Yu, T.: Protecting sensitive lables in social network data anonymization. IEEE Transactions on Knowledge and data engineering 25(3), 633–647 (2013)

    Article  Google Scholar 

  18. Zheng, X., Luo, G., Cai, Z.: A fair mechanism for private data publication in online social networks. IEEE Transactions on Network Science and Engineering pp. 1–11 (2018)

    Google Scholar 

  19. Zhou, B., Pei, J.: Privacy preservation in social networks against neighborhood attacks. In: ICDE. pp. 506–515. IEEE, USA (2008)

    Google Scholar 

  20. Zou, L., Chen, L., Ozsu, M.: K-automorphism: A general framework for privacy preserving network publication. In: in Proceedings of the VLDB Endowment. vol. 2, pp. 946–957 (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Li Xu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zhang, H., Xu, L., Lin, L., Wang, X. (2020). De-anonymizing Social Networks with Edge-Neighborhood Graph Attacks. In: Yu, S., Mueller, P., Qian, J. (eds) Security and Privacy in Digital Economy. SPDE 2020. Communications in Computer and Information Science, vol 1268. Springer, Singapore. https://doi.org/10.1007/978-981-15-9129-7_49

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-9129-7_49

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-9128-0

  • Online ISBN: 978-981-15-9129-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics