TY - GEN
T1 - Quantification of de-anonymization risks in social networks
AU - Lee, Wei Han
AU - Liu, Changchang
AU - Ji, Shouling
AU - Mittal, Prateek
AU - Lee, Ruby
N1 - Publisher Copyright:
Copyright © 2017 by SCITEPRESS – Science and Technology Publications, Lda. All rights reserved.
PY - 2017
Y1 - 2017
N2 - The risks of publishing privacy-sensitive data have received considerable attention recently. Several deanonymization attacks have been proposed to re-identify individuals even if data anonymization techniques were applied. However, there is no theoretical quantification for relating the data utility that is preserved by the anonymization techniques and the data vulnerability against de-anonymization attacks. In this paper, we theoretically analyze the de-anonymization attacks and provide conditions on the utility of the anonymized data (denoted by anonymized utility) to achieve successful de-anonymization. To the best of our knowledge, this is the first work on quantifying the relationships between anonymized utility and de-anonymization capability. Unlike previous work, our quantification analysis requires no assumptions about the graph model, thus providing a general theoretical guide for developing practical deanonymization/anonymization techniques. Furthermore, we evaluate state-of-the-art de-anonymization attacks on a real-world Facebook dataset to show the limitations of previous work. By comparing these experimental results and the theoretically achievable de-anonymization capability derived in our analysis, we further demonstrate the ineffectiveness of previous de-anonymization attacks and the potential of more powerful de-anonymization attacks in the future.
AB - The risks of publishing privacy-sensitive data have received considerable attention recently. Several deanonymization attacks have been proposed to re-identify individuals even if data anonymization techniques were applied. However, there is no theoretical quantification for relating the data utility that is preserved by the anonymization techniques and the data vulnerability against de-anonymization attacks. In this paper, we theoretically analyze the de-anonymization attacks and provide conditions on the utility of the anonymized data (denoted by anonymized utility) to achieve successful de-anonymization. To the best of our knowledge, this is the first work on quantifying the relationships between anonymized utility and de-anonymization capability. Unlike previous work, our quantification analysis requires no assumptions about the graph model, thus providing a general theoretical guide for developing practical deanonymization/anonymization techniques. Furthermore, we evaluate state-of-the-art de-anonymization attacks on a real-world Facebook dataset to show the limitations of previous work. By comparing these experimental results and the theoretically achievable de-anonymization capability derived in our analysis, we further demonstrate the ineffectiveness of previous de-anonymization attacks and the potential of more powerful de-anonymization attacks in the future.
KW - Anonymization Utility
KW - De-anonymization Capability
KW - Structure-based De-anonymization Attacks
KW - Theoretical Bounds
UR - http://www.scopus.com/inward/record.url?scp=85049079253&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85049079253&partnerID=8YFLogxK
U2 - 10.5220/0006192501260135
DO - 10.5220/0006192501260135
M3 - Conference contribution
AN - SCOPUS:85049079253
T3 - ICISSP 2017 - Proceedings of the 3rd International Conference on Information Systems Security and Privacy
SP - 126
EP - 135
BT - ICISSP 2017 - Proceedings of the 3rd International Conference on Information Systems Security and Privacy
A2 - Mori, Paolo
A2 - Furnell, Steven
A2 - Camp, Olivier
PB - SciTePress
T2 - 3rd International Conference on Information Systems Security and Privacy, ICISSP 2017
Y2 - 19 February 2017 through 21 February 2017
ER -