Using Identity Separation Against De-anonymization of Social Networks

Due to the nature of the data that is accumulated in social networking services, there are a great variety of data-driven uses. However, private information occasionally gets published within sanitized datasets offered to third parties. In this paper we consider a strong class of deanonymization attacks that can re-identify these datasets using structural information crawled from other networks. We provide the model level analysis of a technique called identity separation that could be used for hiding information even from these attacks. We show that in case of noncollaborating users ca. 50% of them need to adopt the technique in order to tackle re-identification over the network. We additionally highlight several settings of the technique that allows preserving privacy on the personal level. In the second part of our experiments we evaluate a measure of anonymity, and show that if users with low anonymity values apply identity separation, the minimum adoption rate for repelling the attack drops down to 3 - 15 %. Additionally, we show that it is necessary for top degree nodes to participate.

[1]  Cynthia Dwork,et al.  Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography , 2007, WWW '07.

[2]  Danqi Chen,et al.  De-anonymizing social networks , 2012 .

[3]  Stanley Wasserman,et al.  Social Network Analysis: Methods and Applications , 1994, Structural analysis in the social sciences.

[4]  Anupam Joshi,et al.  @i seek 'fb.me': identifying users across multiple online social networks , 2013, WWW.

[5]  Sree Hari Krishnan Parthasarathi,et al.  Exploiting innocuous activity for correlating users across sites , 2013, WWW.

[6]  Refik Molva,et al.  Safebook: A privacy-preserving online social network leveraging on real-life trust , 2009, IEEE Communications Magazine.

[7]  Sándor Imre,et al.  Measuring importance of seeding for structural de-anonymization attacks in social networks , 2014, 2014 IEEE International Conference on Pervasive Computing and Communication Workshops (PERCOM WORKSHOPS).

[8]  Sándor Imre,et al.  Hiding Information in Social Networks from De-anonymization Attacks by Using Identity Separation , 2013, Communications and Multimedia Security.

[9]  Marit Hansen,et al.  Privacy-enhancing identity management , 2004, Inf. Secur. Tech. Rep..

[10]  Matthias Grossglauser,et al.  A Bayesian method for matching two similar graphs without seeds , 2013, 2013 51st Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[11]  Vitaly Shmatikov,et al.  De-anonymizing Social Networks , 2009, 2009 30th IEEE Symposium on Security and Privacy.

[12]  Róbert Schulcz,et al.  Modeling Role-Based Privacy in Social Networking Services , 2009, 2009 Third International Conference on Emerging Security Information, Systems and Technologies.

[13]  Dogan Kesdogan,et al.  Privacy enhancing identity management: protection against re-identification and profiling , 2005, DIM '05.

[14]  Markulf Kohlweiss,et al.  Scramble! Your Social Network Data , 2011, PETS.

[15]  Bartunov Sergey,et al.  Joint Link-Attribute User Identity Resolution in Online Social Networks , 2012 .

[16]  Mauro Conti,et al.  Friend in the Middle (FiM): Tackling de-anonymization in social networks , 2013, 2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops).

[17]  Jie Wu,et al.  Seed and Grow: An attack against anonymized social networks , 2012, 2012 9th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON).

[18]  Sándor Imre,et al.  Measuring Local Topological Anonymity in Social Networks , 2012, 2012 IEEE 12th International Conference on Data Mining Workshops.

[19]  Elaine Shi,et al.  Link prediction by de-anonymization: How We Won the Kaggle Social Network Challenge , 2011, The 2011 International Joint Conference on Neural Networks.

[20]  Spearman ’ s rank correlation , .

[21]  Ronald E. Leenes,et al.  Audience Segregation in Social Network Sites , 2010, 2010 IEEE Second International Conference on Social Computing.

[22]  Ronald E. Leenes,et al.  Keeping Up Appearances: Audience Segregation in Social Network Sites , 2011, Computers, Privacy and Data Protection.

[23]  Michael Hicks,et al.  Deanonymizing mobility traces: using social network as a side-channel , 2012, CCS.