2017
DOI: 10.1109/comst.2016.2633620
|View full text |Cite
|
Sign up to set email alerts
|

Graph Data Anonymization, De-Anonymization Attacks, and De-Anonymizability Quantification: A Survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
79
0
2

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 98 publications
(81 citation statements)
references
References 117 publications
0
79
0
2
Order By: Relevance
“…Structural graph de-anonymization algorithms and corresponding anonymization algorithms have been an active research area since the mid-2000s [2], when it was discovered that simply removing identifiers from nodes is not sufficient to prevent node re-identification. Since then, many anonymization and de-anonymization algorithms have been proposed [7].…”
Section: Graph Anonymization and De-anonymizationmentioning
confidence: 99%
See 1 more Smart Citation
“…Structural graph de-anonymization algorithms and corresponding anonymization algorithms have been an active research area since the mid-2000s [2], when it was discovered that simply removing identifiers from nodes is not sufficient to prevent node re-identification. Since then, many anonymization and de-anonymization algorithms have been proposed [7].…”
Section: Graph Anonymization and De-anonymizationmentioning
confidence: 99%
“…De-anonymizability quantification focuses on quantifying structural properties of graph pairs, such as the edge difference, to study the maximum number of nodes that could be de-anonymized, given only structural graph information for a graph and a partially overlapping auxiliary graph [6], [21]. However, de-anonymizability quantification does not consider the interplay between anonymization and de-anonymization algorithms and has limited applicability in concrete practical scenarios due to its focus on theoretical limits for abstract graph models [7].…”
Section: Privacy Metrics For Graph Privacymentioning
confidence: 99%
“…In the last step, we find the most similar candidate to user u. We shall define a metric which measures the similarity between each user u and ith candidate c i ∈ C. Previous works [18,19,24,25,28] have solely leveraged the structural properties to find the similarity between a target user v and users in an anonymized dataset. However, given the properly anonymized network, the attacker is not be able to accurately find the similarity between users by just incorporating structural properties.…”
Section: Step 3: Matching-up Candidates To Targetmentioning
confidence: 99%
“…Fu et al proposed to use structural and descriptive information to deanonymize users without seed nodes [11]. A thorough survey on graph data anonymization and de-anonymization is presented in [19]. Note that de-anonymization methods are similar to those of user identity linkage across social network when only network information is available [31].…”
Section: Related Workmentioning
confidence: 99%
“…Many anonymization methods have been proposed to mitigate the privacy invasion of individuals from the public release of graph data [21]. Naive anonymization schemes employ methods to scrub identities of nodes without modifying the graph structure.…”
Section: Introductionmentioning
confidence: 99%