Skip to main content

User Identity De-anonymization Based on Attributes

  • Conference paper
  • First Online:
Wireless Algorithms, Systems, and Applications (WASA 2019)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 11604))

Abstract

Online social networks provide platforms for people to interact with each other and share moments of their daily life. The online social network data are valuable for both academic and business studies, and are usually processed by anonymization methods before being published to third parties. However, several existing de-anonymization techniques can re-identify the users in anonymized networks. In light of this, we explore the impact of user attributes in social network de-anonymization in this paper. More specifically, we first quantify the significance of attributes in a social network, based on which we propose an attribute-based similarity measure; then we design an algorithm by exploiting attribute-based similarity to de-anonymize social network data; finally we employ a real-world dataset collected from Sina Weibo to conduct experiments, which demonstrate that our design can significantly improve the de-anonymization accuracy compared with a well-known baseline algorithm.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    We assume all attribute values are discrete or categorical for simplicity.

References

  1. Backstrom, L., Dwork, C., Kleinberg, J.: Wherefore art thou R3579x?: anonymized social networks, hidden patterns, and structural steganography. In: Proceedings of the 16th International Conference on World Wide Web, pp. 181–190. ACM (2007)

    Google Scholar 

  2. Cai, Z., He, Z., Guan, X., Li, Y.: Collective data-sanitization for preventing sensitive information inference attacks in social networks. IEEE Trans. Dependable Secure Comput. 15(4), 577–590 (2018)

    Google Scholar 

  3. Chen, S., Zhou, S.: Recursive mechanism: towards node differential privacy and unrestricted joins. In: Proceedings of the 2013 ACM SIGMOD International Conference on Management of Data, pp. 653–664. ACM (2013)

    Google Scholar 

  4. Cheng, J., Fu, A.W.C., Liu, J.: K-isomorphism: privacy preserving network publication against structural attacks. In: Proceedings of the 2010 ACM SIGMOD International Conference on Management of Data, pp. 459–470. ACM (2010)

    Google Scholar 

  5. Day, W.Y., Li, N., Lyu, M.: Publishing graph degree distribution with node differential privacy. In: Proceedings of the 2016 International Conference on Management of Data, pp. 123–138. ACM (2016)

    Google Scholar 

  6. Gulyás, G.G., Imre, S.: Measuring importance of seeding for structural de-anonymization attacks in social networks. In: 2014 IEEE International Conference on Pervasive Computing and Communication Workshops (PERCOM WORKSHOPS), pp. 610–615. IEEE (2014)

    Google Scholar 

  7. Hay, M., Miklau, G., Jensen, D., Towsley, D., Weis, P.: Resisting structural re-identification in anonymized social networks. Proc. VLDB Endow. 1(1), 102–114 (2008)

    Google Scholar 

  8. He, Z., Cai, Z., Yu, J.: Latent-data privacy preserving with customized data utility for social network data. IEEE Trans. Veh. Technol. 67(1), 665–673 (2018)

    Google Scholar 

  9. Li, C., Hay, M., Miklau, G., Wang, Y.: A data-and workload-aware algorithm for range queries under differential privacy. Proc. VLDB Endow. 7(5), 341–352 (2014)

    Google Scholar 

  10. Li, H., Zhang, C., He, Y., Cheng, X., Liu, Y., Sun, L.: An enhanced structure-based de-anonymization of online social networks. In: Yang, Q., Yu, W., Challal, Y. (eds.) WASA 2016. LNCS, vol. 9798, pp. 331–342. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-42836-9_30

    Google Scholar 

  11. Liu, K., Terzi, E.: Towards identity anonymization on graphs. In: Proceedings of the 2008 ACM SIGMOD International Conference on Management of Data, pp. 93–106. ACM (2008)

    Google Scholar 

  12. Liu, Y., Ji, S., Mittal, P.: SmartWalk: enhancing social network security via adaptive random walks. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 492–503. ACM (2016)

    Google Scholar 

  13. Narayanan, A., Shmatikov, V.: Robust de-anonymization of large sparse datasets. In: 2008 IEEE Symposium on Security and Privacy, pp. 111–125. IEEE (2008)

    Google Scholar 

  14. Narayanan, A., Shmatikov, V.: De-anonymizing social networks. arXiv preprint arXiv:0903.3276 (2009)

  15. Nilizadeh, S., Kapadia, A., Ahn, Y.Y.: Community-enhanced de-anonymization of online social networks. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 537–548. ACM (2014)

    Google Scholar 

  16. Qian, J., Li, X.Y., Zhang, C., Chen, L., Jung, T., Han, J.: Social network de-anonymization and privacy inference with knowledge graph model. IEEE Trans. Dependable Secure Comput. (2017)

    Google Scholar 

  17. Thompson, B., Yao, D.: The union-split algorithm and cluster-based anonymization of social networks. In: Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, pp. 218–227. ACM (2009)

    Google Scholar 

  18. Tian, W., Mao, J., Jiang, J., He, Z., Zhou, Z., Liu, J.: Deeply understanding structure-based social network de-anonymization. Procedia Comput. Sci. 129, 52–58 (2018)

    Google Scholar 

  19. Wang, Q., Zhang, Y., Lu, X., Wang, Z., Qin, Z., Ren, K.: Real-time and spatio-temporal crowd-sourced social network data publishing with differential privacy. IEEE Trans. Dependable Secure Comput. 15(4), 591–606 (2018)

    Google Scholar 

  20. Ying, X., Wu, X.: Randomizing social networks: a spectrum preserving approach. In: Proceedings of the 2008 SIAM International Conference on Data Mining, pp. 739–750. SIAM (2008)

    Google Scholar 

  21. Zhou, B., Pei, J.: Preserving privacy in social networks against neighborhood attacks (2008)

    Google Scholar 

  22. Zou, L., Chen, L., Özsu, M.T.: K-automorphism: a general framework for privacy preserving network publication. Proc. VLDB Endow. 2(1), 946–957 (2009)

    Google Scholar 

Download references

Acknowledgment

This work was partially supported by the US National Science Foundation under grants CNS-1704397, CNS-1704287, and CNS-1704274, and the National Science Foundation of China under grants 61832012, 61771289, and 61672321.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Honglu Jiang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zhang, C., Jiang, H., Wang, Y., Hu, Q., Yu, J., Cheng, X. (2019). User Identity De-anonymization Based on Attributes. In: Biagioni, E., Zheng, Y., Cheng, S. (eds) Wireless Algorithms, Systems, and Applications. WASA 2019. Lecture Notes in Computer Science(), vol 11604. Springer, Cham. https://doi.org/10.1007/978-3-030-23597-0_37

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-23597-0_37

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-23596-3

  • Online ISBN: 978-3-030-23597-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics