Against Signed Graph Deanonymization Attacks on Social Networks

被引:0
|
作者
Jianliang Gao
Jianxin Wang
Jianbiao He
Fengxia Yan
机构
[1] Central South University,School of Information Science and Engineering
[2] National University of Defense Technology,College of Science
关键词
Big graph; Deanonymization attack; Social network; Signed graph;
D O I
暂无
中图分类号
学科分类号
摘要
Privacy protection is one of the most challenging problems of social networks. Simple removal of the labels is unable to protect the privacy of social networks because the information of graph structures can be utilized to deanonymize target nodes. Previous related proposals mostly assume that attacker knows only the target’s neighborhood graph, but ignoring of signed edge attribute. The graph structure with signed edge attributes could cause serious privacy leakage of social networks. In this paper, we take the signed attribute of edges into account when achieving k-anonymity privacy protection for social networks. We propose a signed k-anonymity scheme to protect the privacy of key entities in social networks. With signed k-anonymity protection, these targets cannot be re-identified by attackers with confidence higher than 1 / k. The proposed scheme minimizes the modification, which preserves high utility of the original data. Extensive experiments on real data sets and synthetic graph illustrate the effectiveness of the proposed scheme.
引用
收藏
页码:725 / 739
页数:14
相关论文
共 50 条
  • [21] Preserving privacy in social networks against neighborhood attacks
    Zhou, Bin
    Pei, Jian
    2008 IEEE 24TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING, VOLS 1-3, 2008, : 506 - 515
  • [22] A Summary of Two Practical Attacks Against Social Networks
    Bilge, Leyla
    Balduzzi, Marco
    Balzarotti, Davide
    Kirda, Engin
    TRUSTWORTHY INTERNET, 2011, : 171 - 185
  • [23] Defense Against Sybil Attacks in Directed Social Networks
    Liu, Pengfei
    Wang, Xiaohan
    Che, Xiangqian
    Chen, Zhaoqun
    Gu, Yuantao
    2014 19TH INTERNATIONAL CONFERENCE ON DIGITAL SIGNAL PROCESSING (DSP), 2014, : 239 - 243
  • [24] PIAFGNN: Property Inference Attacks against Federated Graph Neural Networks
    Liu, Jiewen
    Chen, Bing
    Xue, Baolu
    Guo, Mengya
    Xu, Yuntao
    CMC-COMPUTERS MATERIALS & CONTINUA, 2025, 82 (02): : 1857 - 1877
  • [25] HeteroGuard: Defending Heterogeneous Graph Neural Networks against Adversarial Attacks
    Kumarasinghe, Udesh
    Nabeel, Mohamed
    De Zoysa, Kasun
    Gunawardana, Kasun
    Elvitigala, Charitha
    2022 IEEE INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOPS, ICDMW, 2022, : 698 - 705
  • [26] Structure-Attribute-Based Social Network Deanonymization With Spectral Graph Partitioning
    Jiang, Honglu
    Yu, Jiguo
    Cheng, Xiuzhen
    Zhang, Cheng
    Gong, Bei
    Yu, Haotian
    IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2022, 9 (03): : 902 - 913
  • [27] Social Influence in Signed Networks
    He, Xiaochen
    Lu, Jiali
    Du, Haifeng
    Jin, Xiaoyi
    IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2024, 11 (01) : 330 - 339
  • [28] Social balance in signed networks
    Zheng, Xiaolong
    Zeng, Daniel
    Wang, Fei-Yue
    INFORMATION SYSTEMS FRONTIERS, 2015, 17 (05) : 1077 - 1095
  • [29] Social balance in signed networks
    Xiaolong Zheng
    Daniel Zeng
    Fei-Yue Wang
    Information Systems Frontiers, 2015, 17 : 1077 - 1095
  • [30] Signed Networks in Social Media
    Leskovec, Jure
    Huttenlocher, Daniel
    Kleinberg, Jon
    CHI2010: PROCEEDINGS OF THE 28TH ANNUAL CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS, VOLS 1-4, 2010, : 1361 - +