2013
DOI: 10.1155/2013/237024
|View full text |Cite
|
Sign up to set email alerts
|

Structural Attack to Anonymous Graph of Social Networks

Abstract: With the rapid development of social networks and its applications, the demand of publishing and sharing social network data for the purpose of commercial or research is increasing. However, the disclosure risks of sensitive information of social network users are also arising. The paper proposes an effective structural attack to deanonymize social graph data. The attack uses the cumulative degree ofn-hop neighbors of a node as the regional feature and combines it with the simulated annealing-based graph match… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
2
2
2

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 21 publications
0
4
0
Order By: Relevance
“…Their main goal of anonymity scheme is to solve d ‐neighbor attacks with k ‐anonymity scheme. Zhu et al propose an effective structural attack to deanonymize social graph data, which is much different from previous work and provide other researches a new way to study the privacy protection against structural attacks. Benjamin C. M. Fung et al propose the first anonymization algorithm to achieve k ‐anonymity on social network data with the consideration of the minimization of the impact on frequent sharing patterns.…”
Section: Neighborhood Attacks and Protection Schemesmentioning
confidence: 94%
“…Their main goal of anonymity scheme is to solve d ‐neighbor attacks with k ‐anonymity scheme. Zhu et al propose an effective structural attack to deanonymize social graph data, which is much different from previous work and provide other researches a new way to study the privacy protection against structural attacks. Benjamin C. M. Fung et al propose the first anonymization algorithm to achieve k ‐anonymity on social network data with the consideration of the minimization of the impact on frequent sharing patterns.…”
Section: Neighborhood Attacks and Protection Schemesmentioning
confidence: 94%
“…Zhou and Pei [172] proposed neighbourhood attacks, in which the adversary exploits the background knowledge about some target individuals' neighbors and the relationships among the neighbors, to re-identify the victims. Zhu et al [176] proposed n-hop neighFNR, which relied on the regional characteristic of the cumulative degree of n-hop neighbors and learned from the simulated annealing-based graph matching algorithm, to conduct re-identification. Qian et al [113] introduced knowledge graphs to strengthen the auxiliary information available in social networks, making the ability of deanonymization and inference attacks to a higher level.…”
Section: Structure Information-based De-anonymizationmentioning
confidence: 99%
“…It does not work with graphs where their common nodes are at distance of 2-hop from the centre (one node in a pair, or both nodes in a pair) as in [30] which covers n-hop and therefore can deanonymise more data.…”
Section: Deanonymisation Approachesmentioning
confidence: 99%