De-anonymize social network under partial overlap

De-anonymizing social networks has become a direct threat to people's privacy . Actually, It can be boiled down to graph matching problems. The attackers steal users' real information in anonymized social networks by mapping them to secondary cross-domain networks. In particular, when partial node identity in the anonymized network is known, such attacks will become more powerful. Some scholars have studied seeded network de-anonymization. However, there is a lack of consideration for network overlap. We further expand the work of predecessors and consider partially overlapping networks de-anonymization with the aid of seeded nodes. We give a more general form of theoretical results under Erdös - Rényi model(ER model). We also validated our results on both synthetic and real data.

[1]  Matthias Grossglauser,et al.  Growing a Graph Matching from a Handful of Seeds , 2015, Proc. VLDB Endow..

[2]  Silvio Lattanzi,et al.  An efficient reconciliation algorithm for social networks , 2013, Proc. VLDB Endow..

[3]  Alan M. Frieze,et al.  A new rounding procedure for the assignment problem with applications to dense graph arrangement problems , 2002, Math. Program..

[4]  Elza Erkip,et al.  Optimal de-anonymization in random graphs with community structure , 2016, 2016 50th Asilomar Conference on Signals, Systems and Computers.

[5]  Onaran Efe,et al.  Optimal de-anonymization in random graphs with community structure , 2016 .

[6]  Xinbing Wang,et al.  Social Network De-anonymization with Overlapping Communities: Analysis, Algorithm and Experiments , 2018, IEEE INFOCOM 2018 - IEEE Conference on Computer Communications.

[7]  Matthias Grossglauser,et al.  When can two unlabeled networks be aligned under partial overlap? , 2015, 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[8]  Xinbing Wang,et al.  De-Anonymization of Networks with Communities: When Quantifications Meet Algorithms , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.

[9]  Matthias Grossglauser,et al.  On the performance of percolation graph matching , 2013, COSN '13.

[10]  Linlin Chen,et al.  Social Network De-Anonymization and Privacy Inference with Knowledge Graph Model , 2019, IEEE Transactions on Dependable and Secure Computing.

[11]  Vikraman Arvind,et al.  Approximate Graph Isomorphism , 2012, MFCS.