Deanonymisation in Linked Data: A research roadmap

The objective of this roadmap is to summarise the state-of-the-art and to identify critical challenges for privacy in Linked Data. Our research particularly focuses on examining how the problem of data deanonymisation fits within the context of Linked Data. This draws attention to the fact that publishing data and linking them with other data (to achieve the Data Web vision) is also a significant threat to privacy. Interconnecting data with RDF from heterogeneous resources provides meaningful and valuable information in machine-understandable forms, but it may also offer fewer barriers for deanonymisation attacks to be achieved successfully, and potentially with full automation. Therefore, it is vital to keep both points of view into consideration; leveraging the Linked Data in the Web whilst also ensuring privacy when it is desired. In this paper, we aim to draw a research roadmap that will help to identify areas of significant concern, where the affordances of linked data align with the requirements for de-anonymisation and re-identification.

[1]  Xiangtao Li,et al.  Structural Attack to Anonymous Graph of Social Networks , 2013 .

[2]  Paul Ohm Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization , 2009 .

[3]  Sören Auer,et al.  The emerging web of linked data , 2011, ISWSA '11.

[4]  Serena Villata,et al.  An Access Control Model for Linked Data , 2011, OTM Workshops.

[5]  Stefan Decker,et al.  An Access Control Framework for the Web of Data , 2011, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications.

[6]  Hugh Glaser,et al.  Managing Co-reference on the Semantic Web , 2009, LDOW.

[7]  Benjamin Greschbach,et al.  The devil is in the metadata — New privacy challenges in Decentralised Online Social Networks , 2012, 2012 IEEE International Conference on Pervasive Computing and Communications Workshops.

[8]  Kieron O'Hara,et al.  Transparent government, not transparent citizens: a report on privacy and transparency for the Cabinet Office , 2011 .

[9]  Ming Gu,et al.  A Brief Survey on De-anonymization Attacks in Online Social Networks , 2010, 2010 International Conference on Computational Aspects of Social Networks.

[10]  Christian Bizer,et al.  The Emerging Web of Linked Data , 2009, IEEE Intelligent Systems.

[11]  Patricia Serrano-Alvarado,et al.  Personal Linked Data: A Solution to Manage User's Privacy on the Web , 2013 .

[12]  Yanchun Zhang,et al.  On the identity anonymization of high‐dimensional rating data , 2012, Concurr. Comput. Pract. Exp..

[13]  Mats Carlsson,et al.  Constraint Programming in Sweden , 2009, IEEE Intelligent Systems.

[14]  Elaine Shi,et al.  Link prediction by de-anonymization: How We Won the Kaggle Social Network Challenge , 2011, The 2011 International Joint Conference on Neural Networks.

[15]  Jens Lehmann,et al.  Introduction to Linked Data and Its Lifecycle on the Web , 2013, Reasoning Web.

[16]  Martin M. Merener Theoretical Results on De-Anonymization via Linkage Attacks , 2012, Trans. Data Priv..

[17]  Stefan Decker,et al.  Privacy Concerns of FOAF-Based Linked Data , 2009, SPOT@ESWC.

[18]  Huajun Chen,et al.  The Semantic Web , 2011, Lecture Notes in Computer Science.

[19]  Zoltán Alexin Does fair anonymization exist? , 2014 .

[20]  Vitaly Shmatikov,et al.  Robust De-anonymization of Large Sparse Datasets , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).

[21]  Ian Horrocks,et al.  Reasoning Web. Semantic Technologies for Intelligent Data Access , 2013, Lecture Notes in Computer Science.

[22]  Les Carr,et al.  A Research Agenda for Linked Closed Data , 2011 .

[23]  James A. Hendler,et al.  The Semantic Web" in Scientific American , 2001 .