Improving Privacy in Graphs Through Node Addition

The rapid growth of computer systems which generate graph data necessitates employing privacy-preserving mechanisms to protect users’ identity. Since structure-based de-anonymization attacks can reveal users’ identity’s even when the graph is simply anonymized by employing naïve ID removal, recently, k- anonymity is proposed to secure users’ privacy against the structure-based attack. Most of the work ensured graph privacy using fake edges, however, in some applications, edge addition or deletion might cause a significant change to the key property of the graph. Motivated by this fact, in this paper, we introduce a novel method which ensures privacy by adding fake nodes to the graph. First, we present a novel model which provides k- anonymity against one of the strongest attacks: seed-based attack. In this attack, the adversary knows the partial mapping between the main graph and the graph which is generated using the privacy-preserving mechanisms. We show that even if the adversary knows the mapping of all of the nodes except one, the last node can still have k- anonymity privacy. Then, we turn our attention to the privacy of the graphs generated by inter-domain routing against degree attacks in which the degree sequence of the graph is known to the adversary. To ensure the privacy of networks against this attack, we propose a novel method which tries to add fake nodes in a way that the degree of all nodes have the same expected value.

[1]  Prateek Mittal,et al.  Graph Data Anonymization, De-Anonymization Attacks, and De-Anonymizability Quantification: A Survey , 2017, IEEE Communications Surveys & Tutorials.

[2]  Matthias Grossglauser,et al.  Growing a Graph Matching from a Handful of Seeds , 2015, Proc. VLDB Endow..

[3]  Ian T. Foster,et al.  Mapping the Gnutella Network: Macroscopic Properties of Large-Scale Peer-to-Peer Systems , 2002, IPTPS.

[4]  Lei Zou,et al.  K-Automorphism: A General Framework For Privacy Preserving Network Publication , 2009, Proc. VLDB Endow..

[5]  Jon M. Kleinberg,et al.  Group formation in large social networks: membership, growth, and evolution , 2006, KDD '06.

[6]  Vasileios Giotsas,et al.  Inferring Complex AS Relationships , 2014, Internet Measurement Conference.

[7]  JU Shi-guang Preserving privacy in social networks based on d-neighborhood subgraph anonymity , 2011 .

[8]  Silvio Lattanzi,et al.  An efficient reconciliation algorithm for social networks , 2013, Proc. VLDB Endow..

[9]  Matthias Grossglauser,et al.  On the privacy of anonymized networks , 2011, KDD.

[10]  Jia Liu,et al.  K-isomorphism: privacy preserving network publication against structural attacks , 2010, SIGMOD Conference.

[11]  Shouling Ji,et al.  Structure Based Data De-Anonymization of Social Networks and Mobility Traces , 2014, ISC.

[12]  Shouling Ji,et al.  Evaluating the security of anonymized big graph/structural data , 2016 .

[13]  Jon M. Kleinberg,et al.  The structure of information pathways in a social communication network , 2008, KDD.

[14]  Xiaowei Ying,et al.  Randomizing Social Networks: a Spectrum Preserving Approach , 2008, SDM.

[15]  ASHWIN MACHANAVAJJHALA,et al.  L-diversity: privacy beyond k-anonymity , 2006, 22nd International Conference on Data Engineering (ICDE'06).

[16]  Yi Wang,et al.  Neighbor-specific BGP: more flexible routing policies while improving global stability , 2009, SIGMETRICS '09.

[17]  Matthias Grossglauser,et al.  On the performance of percolation graph matching , 2013, COSN '13.

[18]  Donald F. Towsley,et al.  Resisting structural re-identification in anonymized social networks , 2010, The VLDB Journal.

[19]  Danilo Montesi,et al.  On approximate nesting of multiple social network graphs: a preliminary study , 2019, IDEAS.

[20]  Raymond Chi-Wing Wong,et al.  (α, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing , 2006, KDD '06.

[21]  Daniel Cullina,et al.  Improved Achievability and Converse Bounds for Erdos-Renyi Graph Matching , 2016, SIGMETRICS.

[22]  Vitaly Shmatikov,et al.  De-anonymizing Social Networks , 2009, 2009 30th IEEE Symposium on Security and Privacy.

[23]  Yong-Yeol Ahn,et al.  Community-Enhanced De-anonymization of Online Social Networks , 2014, CCS.

[24]  Gordon T. Wilfong,et al.  An analysis of BGP convergence properties , 1999, SIGCOMM '99.

[25]  J. Lauri,et al.  Topics in Graph Automorphisms and Reconstruction , 2003 .

[26]  L. Beineke,et al.  Topics in algebraic graph theory , 2004 .

[27]  Wang Bo,et al.  (d, k)-Anonymity for Social Networks Publication against Neighborhood Attacks , 2013 .

[28]  Prateek Mittal,et al.  On Your Social Network De-anonymizablity: Quantification and Large Scale Evaluation with Seed Knowledge , 2015, NDSS.

[29]  Mark E. J. Newman,et al.  The Structure and Function of Complex Networks , 2003, SIAM Rev..

[30]  Jian Pei,et al.  Preserving Privacy in Social Networks Against Neighborhood Attacks , 2008, 2008 IEEE 24th International Conference on Data Engineering.

[31]  Lixin Gao,et al.  On inferring autonomous system relationships in the Internet , 2000, Globecom '00 - IEEE. Global Telecommunications Conference. Conference Record (Cat. No.00CH37137).

[32]  Gabi Nakibly,et al.  Analyzing Internet Routing Security Using Model Checking , 2015, LPAR.

[33]  Bart Preneel,et al.  Towards Measuring Anonymity , 2002, Privacy Enhancing Technologies.

[34]  Michael Hicks,et al.  Deanonymizing mobility traces: using social network as a side-channel , 2012, CCS.

[35]  Ehsan Kazemi,et al.  Network Alignment: Theory, Algorithms, and Applications , 2016 .

[36]  Bin Wang,et al.  A secure K-automorphism privacy preserving approach with high data utility in social networks , 2014, Secur. Commun. Networks.

[37]  Hossein Pishro-Nik,et al.  Matching Anonymized and Obfuscated Time Series to Users’ Profiles , 2017, IEEE Transactions on Information Theory.

[38]  Hossein Pishro-Nik,et al.  Achieving Perfect Location Privacy in Wireless Devices Using Anonymization , 2016, IEEE Transactions on Information Forensics and Security.

[39]  Siddharth Srivastava,et al.  Anonymizing Social Networks , 2007 .

[40]  Carey E. Priebe,et al.  Seeded graph matching for correlated Erdös-Rényi graphs , 2014, J. Mach. Learn. Res..

[41]  George Danezis,et al.  Towards an Information Theoretic Metric for Anonymity , 2002, Privacy Enhancing Technologies.

[42]  Mario Vento,et al.  A large database of graphs and its use for benchmarking graph isomorphism algorithms , 2003, Pattern Recognit. Lett..

[43]  Gregor Kopf Network Routing with Path Vector Protocols: Theory and Applications , 2008 .

[44]  J. Gross,et al.  Graph Theory and Its Applications , 1998 .

[45]  Hui Wang,et al.  Symmetry in world trade network , 2009, J. Syst. Sci. Complex..

[46]  Prateek Mittal,et al.  Seed-Based De-Anonymizability Quantification of Social Networks , 2016, IEEE Transactions on Information Forensics and Security.

[47]  Scott Shenker,et al.  Privacy-Preserving Interdomain Routing at Internet Scale , 2017, Proc. Priv. Enhancing Technol..

[48]  Laks V. S. Lakshmanan,et al.  To do or not to do: the dilemma of disclosing anonymized data , 2005, SIGMOD '05.

[49]  Bernhard Ager,et al.  Policy-compliant path diversity and bisection bandwidth , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).

[50]  David D. Jensen,et al.  Accurate Estimation of the Degree Distribution of Private Networks , 2009, 2009 Ninth IEEE International Conference on Data Mining.

[51]  K. Liu,et al.  Towards identity anonymization on graphs , 2008, SIGMOD Conference.

[52]  Ravi Kumar,et al.  Structure and evolution of online social networks , 2006, KDD '06.

[53]  Matthias Grossglauser,et al.  When can two unlabeled networks be aligned under partial overlap? , 2015, 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[54]  Elza Erkip,et al.  Seeded graph matching: Efficient algorithms and theoretical guarantees , 2017, 2017 51st Asilomar Conference on Signals, Systems, and Computers.

[55]  Jon M. Kleinberg,et al.  Wherefore art thou R3579X? , 2011, Commun. ACM.

[56]  Stanley Wasserman,et al.  Social Network Analysis: Methods and Applications , 1994, Structural analysis in the social sciences.

[57]  Ting Wang,et al.  Quantifying Graph Anonymity, Utility, and De-anonymity , 2018, IEEE INFOCOM 2018 - IEEE Conference on Computer Communications.

[58]  Shouling Ji,et al.  Structural Data De-anonymization: Quantification, Practice, and Implications , 2014, CCS.