De-anonymizing Social Networks

Operators of online social networks are increasingly sharing potentially sensitive information about users and their relationships with advertisers, application developers, and data-mining researchers. Privacy is typically protected by anonymization, i.e., removing names, addresses, etc.We present a framework for analyzing privacy and anonymity in social networks and develop a new re-identification algorithm targeting anonymized social-network graphs. To demonstrate its effectiveness on real-world networks, we show that a third of the users who can be verified to have accounts on both Twitter, a popular microblogging service, and Flickr, an online photo-sharing site, can be re-identified in the anonymous Twitter graph with only a 12% error rate.Our de-anonymization algorithm is based purely on the network topology, does not require creation of a large number of dummy "sybil" nodes, is robust to noise and all existing defenses, and works even when the overlap between the target network and the adversary's auxiliary information is small.

[1]  Bpo,et al.  Soziologie , 1931, Vierteljahrsschrift für wissenschaftliche Pädagogik.

[2]  P. Haggett Network Analysis In Geography , 1971 .

[3]  Stanley Milgram,et al.  An Experimental Study of the Small World Problem , 1969 .

[4]  Mark S. Granovetter The Strength of Weak Ties , 1973, American Journal of Sociology.

[5]  Norman T. J. Bailey,et al.  The Mathematical Theory of Infectious Diseases , 1975 .

[6]  Mark S. Granovetter Economic Action and Social Structure: The Problem of Embeddedness , 1985, American Journal of Sociology.

[7]  P. Bonacich Power and Centrality: A Family of Measures , 1987, American Journal of Sociology.

[8]  Robin I. M. Dunbar Neocortex size as a constraint on group size in primates , 1992 .

[9]  Graham J. Wills,et al.  NicheWorks - Interactive Visualization of Very Large Graphs , 1997, GD.

[10]  Graham J. Wills NicheWorks—Interactive Visualization of Very Large Graphs , 1999 .

[11]  Albert,et al.  Emergence of scaling in random networks , 1999, Science.

[12]  Thomas de Quincey [C] , 2000, The Works of Thomas De Quincey, Vol. 1: Writings, 1799–1820.

[13]  R. Hanneman Introduction to Social Network Methods , 2001 .

[14]  Hhs Office for Civil Rights Standards for privacy of individually identifiable health information. Final rule. , 2002, Federal register.

[15]  Matthew Richardson,et al.  Mining knowledge-sharing sites for viral marketing , 2002, KDD.

[16]  P. Bearman,et al.  Chains of Affection: The Structure of Adolescent Romantic and Sexual Networks1 , 2004, American Journal of Sociology.

[17]  Andrew S. Tanenbaum,et al.  Safe and Private Data Sharing with Turtle: Friends Team-Up and Beat the System , 2004, Security Protocols Workshop.

[18]  Alessandro Acquisti,et al.  Information revelation and privacy in online social networks , 2005, WPES '05.

[19]  G. DeFriese,et al.  The New York Times , 2020, Publishing for Libraries.

[20]  Massimo Barbaro,et al.  A Face Is Exposed for AOL Searcher No , 2006 .

[21]  Cynthia Dwork,et al.  Differential Privacy , 2006, ICALP.

[22]  Philippe Golle,et al.  Private social network analysis: how to assemble pieces of a graph privately , 2006, WPES '06.

[23]  M. Consalvo,et al.  Fono, David, and Raynes-Goldie, Kate. . Hyperfriends and Beyond: Friendship and Social Norms on LiveJournal. , 2006 .

[24]  Sougata Mukherjea,et al.  On the structural properties of massive telecom call graphs: findings and implications , 2006, CIKM '06.

[25]  Cynthia Dwork,et al.  Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography , 2007, WWW '07.

[26]  A-L Barabási,et al.  Structure and tie strengths in mobile communication networks , 2006, Proceedings of the National Academy of Sciences.

[27]  ジェレマイア・ハームセン,et al.  Network node ad targeting , 2007 .

[28]  Krishna P. Gummadi,et al.  Measurement and analysis of online social networks , 2007, IMC '07.

[29]  Jon M. Kleinberg,et al.  The link-prediction problem for social networks , 2007, J. Assoc. Inf. Sci. Technol..

[30]  Lise Getoor,et al.  Preserving the Privacy of Sensitive Relationships in Graph Data , 2007, PinKDD.

[31]  K. Swallen,et al.  The National Longitudinal Study of Adolescent Health Overweight, Obesity, and Health-Related Quality of Life Among Adolescents: , 2007 .

[32]  Miklos Kurucz,et al.  Spectral clustering in telephone call graphs , 2007, WebKDD/SNA-KDD '07.

[33]  Markus Jakobsson,et al.  Social phishing , 2007, CACM.

[34]  Siddharth Srivastava,et al.  Anonymizing Social Networks , 2007 .

[35]  Etienne Huens,et al.  Geographical dispersal of mobile communication networks , 2008, 0802.2178.

[36]  Ben Laurie,et al.  Under)mining Privacy in Social Networks , 2008 .

[37]  Marco Gonzalez,et al.  Author's Personal Copy Social Networks Tastes, Ties, and Time: a New Social Network Dataset Using Facebook.com , 2022 .

[38]  Trevor Darrell,et al.  Autotagging Facebook: Social network context improves photo annotation , 2008, 2008 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops.

[39]  Rajeev Motwani,et al.  Link Privacy in Social Networks , 2008, 2008 IEEE 24th International Conference on Data Engineering.

[40]  Andreas Schaad,et al.  Privacy-preserving social network analysis for criminal investigations , 2008, WPES '08.

[41]  Rajeev Motwani,et al.  Link Privacy in Social Networks , 2008, ICDE.

[42]  Gayatri Swamynathan,et al.  Do social networks improve e-commerce?: a study on social marketplaces , 2008, WOSN '08.

[43]  Jon M. Kleinberg,et al.  Feedback effects between similarity and social influence in online communities , 2008, KDD.

[44]  Ravi Kumar,et al.  Influence and correlation in social networks , 2008, KDD.

[45]  Vitaly Shmatikov,et al.  Robust De-anonymization of Large Sparse Datasets , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).

[46]  K. Liu,et al.  Towards identity anonymization on graphs , 2008, SIGMOD Conference.

[47]  Feng Xiao,et al.  SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).

[48]  Aidong Zhang,et al.  Bridging centrality: graph mining from element level to group level , 2008, KDD.

[49]  Alina Campan,et al.  A Clustering Approach for Data and Structural Anonymity in Social Networks , 2008 .

[50]  Michael Kaminsky,et al.  SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks , 2008, S&P 2008.

[51]  Balachander Krishnamurthy,et al.  Characterizing privacy in online social networks , 2008, WOSN '08.

[52]  Jon M. Kleinberg,et al.  The structure of information pathways in a social communication network , 2008, KDD.

[53]  Jian Pei,et al.  Preserving Privacy in Social Networks Against Neighborhood Attacks , 2008, 2008 IEEE 24th International Conference on Data Engineering.

[54]  A. Felt Privacy Protection for Social Networking APIs , 2008 .

[55]  Saikat Guha,et al.  NOYB: privacy in online social networks , 2008, WOSN '08.

[56]  Christos Faloutsos,et al.  Weighted graphs and disconnected components: patterns and a generator , 2008, KDD.

[57]  Nikita Borisov,et al.  FlyByNight: mitigating the privacy risks of social networking , 2008, WPES '08.

[58]  H. Elsheshtawy,et al.  Personal Information Protection and Electronic Documents Act , 2015 .

[59]  George Danezis,et al.  Prying Data out of a Social Network , 2009, 2009 International Conference on Advances in Social Network Analysis and Mining.

[60]  Jon M. Kleinberg,et al.  Wherefore art thou R3579X? , 2011, Commun. ACM.