Abstract
Recent work, motivated by anonymous messaging platforms, has introduced adaptive diffusion protocols which can obfuscate the source of a rumor: a 'snapshot adversary' with access to the subgraph of 'infected' nodes can do no better than randomly guessing the entity of the source node. What happens if the adversary has access to multiple independent snapshots? We study this question when the underlying graph is the infinite d-regular tree. We show that (1) a weak form of source obfuscation is still possible in the case of two independent snapshots, but (2) already with three observations there is a simple algorithm that finds the rumor source with constant probability, regardless of the adaptive diffusion protocol. We also characterize the tradeoff between local spreading and source obfuscation for adaptive diffusion protocols (under a single snapshot). These results raise questions about the robustness of anonymity guarantees when spreading information in social networks.
Original language | English (US) |
---|---|
Article number | 9187692 |
Pages (from-to) | 1-12 |
Number of pages | 12 |
Journal | IEEE Transactions on Network Science and Engineering |
Volume | 8 |
Issue number | 1 |
DOIs | |
State | Published - Jan 1 2021 |
All Science Journal Classification (ASJC) codes
- Control and Systems Engineering
- Computer Science Applications
- Computer Networks and Communications
Keywords
- Information diffusion
- social networks
- source detection
- source obfuscation