dynamic social graphs; privacy-preserving publication; re-identification attacks; active adversaries
Résumé :
[en] Active re-identification attacks pose a serious threat to privacy-preserving social graph publication. Active attackers create fake accounts to enforce structural patterns that can be used to re-identify legitimate users on published anonymised graphs, even without additional background knowledge. So far, this type of attacks has only been studied in the scenario where the inherently dynamic social graph is published once. In this paper, we present the first active re-identification attack in the more realistic scenario where a dynamic social graph is periodically published. Our new attack leverages tempo-structural patterns, created by a dynamic set of sybil nodes, for strengthening the adversary. We evaluate our new attack through a comprehensive set of experiments on real-life and synthetic dynamic social graphs. We show that our new attack substantially outperforms the most effective static active attack in the literature by increasing success probability by at least two times and efficiency by at least 11 times. Moreover, we show that, unlike the static attack, our new attack remains at the same level of efficiency as the publication process advances. Additionally, we conduct a study on the factors that may thwart our new attack, which can help design dynamic graph anonymisation methods displaying a better balance between privacy and utility.
Disciplines :
Sciences informatiques
Auteur, co-auteur :
CHEN, Xihui ; University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT)
KEPUSKA, Ema ; University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC)
MAUW, Sjouke ; University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC)
RAMIREZ CRUZ, Yunior ; University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT)
Co-auteurs externes :
no
Langue du document :
Anglais
Titre :
Active Re-identification Attacks on Periodically Released Dynamic Social Graphs
Date de publication/diffusion :
13 septembre 2020
Nom de la manifestation :
25th European Symposium on Research in Computer Security (ESORICS 2020)
Date de la manifestation :
from 14-09-2020 to 18-09-2020
Manifestation à portée :
International
Titre de l'ouvrage principal :
Computer Security - ESORICS 2020
Editeur scientifique :
Chen, Liqun
Li, Ninghui
Liang, Kaitai
Schneider, Steve
Pagination :
185-205
Peer reviewed :
Peer reviewed
Focus Area :
Security, Reliability and Trust
Projet FnR :
FNR11685812 - Privacy-preserving Publication Of Dynamic Social Network Data In The Presence Of Active Adversaries, 2017 (01/06/2018-31/05/2021) - Yunior Ramirez-cruz
Albert, R., Barabási, A.L.: Statistical mechanics of complex networks. Rev. Modern Phys. 74, 47–97 (2002)
Backstrom, L., Dwork, C., Kleinberg, J.M.: Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography. Commun. ACM 54(12), 133–141 (2011)
Casas-Roma, J., Herrera-Joancomartí, J., Torra, V.: k-degree anonymity and edge selection: improving data utility in large networks. Knowl. Inf. Syst. 50(2), 447–474 (2017)
Dakiche, N., Tayeb, F.B., Slimani, Y., Benatchba, K.: Tracking community evolution in social networks: a survey. Inf. Process. Manag. 56(3), 1084–1102 (2019)
Ding, X., Zhang, L., Wan, Z., Gu, M.: De-anonymizing dynamic social networks. In: Proceedings of GLOBECOM 2011, pp. 1–6 (2011)
Ji, S., Li, W., Srivatsa, M., Beyah, R.: Structural data de-anonymization: quantification, practice, and implications. In: Proceedings of CCS 2014, pp. 1040–1053 (2014)
Korula, N., Lattanzi, S.: An efficient reconciliation algorithm for social networks. Proc. VLDB Endow. 7(5), 377–388 (2014)
Kumar, S., Spezzano, F., Subrahmanian, V.S., Faloutsos, C.: Edge weight prediction in weighted signed networks. In: Proceedings of ICDM 2016, pp. 221–230 (2016)
Kunegis, J.: KONECT: the Koblenz network collection. In: Proceedings of WWW 2013, pp. 1343–1350 (2013)
Liu, K., Terzi, E.: Towards identity anonymization on graphs. In: Proceedings of SIGMOD 2008, pp. 93–106 (2008)
Martínez, V., Berzal, F., Cubero, J.C.: A survey of link prediction in complex networks. ACM Comput. Surv. 49(4), 69 (2017)
Mauw, S., Ramírez-Cruz, Y., Trujillo-Rasua, R.: Anonymising social graphs in the presence of active attackers. Trans. Data Privacy 11(2), 169–198 (2018)
Mauw, S., Ramírez-Cruz, Y., Trujillo-Rasua, R.: Conditional adjacency anonymity in social graphs under active attacks. Knowl. Inf. Syst. 61(1), 485–511 (2018). https://doi.org/10. 1007/s10115-018-1283-x
Mauw, S., Ramírez-Cruz, Y., Trujillo-Rasua, R.: Robust active attacks on social graphs. Data Mining Knowl. Discov. 33(5), 1357–1392 (2019). https://doi.org/10.1007/s10618-019-00631-5
Narayanan, A., Shmatikov, V.: De-anonymizing social networks. In: Proceedings of S&P 2009, pp. 173–187 (2009)
Nilizadeh, S., Kapadia, A., Ahn, Y.: Community-enhanced de-anonymization of online social networks. In: Proceedings of CCS 2014, pp. 537–548 (2014)
Papadopoulos, F., Kleineberg, K.K.: Link persistence and conditional distances in multiplex networks. Phys. Rev. E 99(1), 012322 (2019)
Pedarsani, P., Figueiredo, D.R., Grossglauser, M.: A Bayesian method for matching two similar graphs without seeds. In: Proceedings of the 51st Annual Allerton Conference on Communication, Control, and Computing, pp. 1598–1607 (2013)
Peng, W., Li, F., Zou, X., Wu, J.: A two-stage deanonymization attack against anonymized social networks. IEEE Trans. Comput. 63(2), 290–303 (2014)
Tai, C.H., Tseng, P.J., Philip, S.Y., Chen, M.S.: Identities anonymization in dynamic social networks. In: Proceedings of ICDM 2011, pp. 1224–1229 (2011)
Wu, W., Xiao, Y., Wang, W., He, Z., Wang, Z.: K-symmetry model for identity anonymization in social networks. In: Proceedings of the 13th International Conference on Extending Database Technology, pp. 111–122 (2010)
Yartseva, L., Grossglauser, M.: On the performance of percolation graph matching. In: Proceedings of COSN 2013, pp. 119–130 (2013)
Yu, H., Gibbons, P.B., Kaminsky, M., Xiao, F.: Sybillimit: a near-optimal social network defense against sybil attacks. In: Procs. of S&P 2008. pp. 3–17 (2008)
Yu, H., Kaminsky, M., Gibbons, P.B., Flaxman, A.: SybilQuard: defending against sybil attacks via social networks. In: Proceedings of SIGCOMM 2006, pp. 267–278 (2006)
Zhou, B., Pei, J.: Preserving privacy in social networks against neighborhood attacks. In: Proceedings of ICDE 2008, pp. 506–515 (2008)
Zou, L., Chen, L., Özsu, M.T.: K-automorphism: a general framework for privacy preserving network publication. Proc. VLDB Endow. 2(1), 946–957 (2009)