Against Signed Graph Deanonymization Attacks on Social Networks

被引:0
|
作者
Jianliang Gao
Jianxin Wang
Jianbiao He
Fengxia Yan
机构
[1] Central South University,School of Information Science and Engineering
[2] National University of Defense Technology,College of Science
关键词
Big graph; Deanonymization attack; Social network; Signed graph;
D O I
暂无
中图分类号
学科分类号
摘要
Privacy protection is one of the most challenging problems of social networks. Simple removal of the labels is unable to protect the privacy of social networks because the information of graph structures can be utilized to deanonymize target nodes. Previous related proposals mostly assume that attacker knows only the target’s neighborhood graph, but ignoring of signed edge attribute. The graph structure with signed edge attributes could cause serious privacy leakage of social networks. In this paper, we take the signed attribute of edges into account when achieving k-anonymity privacy protection for social networks. We propose a signed k-anonymity scheme to protect the privacy of key entities in social networks. With signed k-anonymity protection, these targets cannot be re-identified by attackers with confidence higher than 1 / k. The proposed scheme minimizes the modification, which preserves high utility of the original data. Extensive experiments on real data sets and synthetic graph illustrate the effectiveness of the proposed scheme.
引用
收藏
页码:725 / 739
页数:14
相关论文
共 50 条
  • [31] Recommendations in Signed Social Networks
    Tang, Jiliang
    Aggarwal, Charu
    Liu, Huan
    PROCEEDINGS OF THE 25TH INTERNATIONAL CONFERENCE ON WORLD WIDE WEB (WWW'16), 2016, : 31 - 40
  • [32] Partitioning signed social networks
    Doreian, Patrick
    Mrvar, Andrej
    SOCIAL NETWORKS, 2009, 31 (01) : 1 - 11
  • [33] Signed Social Networks: A Survey
    Girdhar, Nancy
    Bharadwaj, K. K.
    ADVANCES IN COMPUTING AND DATA SCIENCES, ICACDS 2016, 2017, 721 : 326 - 335
  • [34] Graph partitions and the controllability of directed signed networks
    Xianzhu LIU
    Zhijian JI
    Ting HOU
    Science China(Information Sciences), 2019, 62 (04) : 100 - 110
  • [35] SSCAN:Structural Graph Clustering on Signed Networks
    Zhao, Zheng
    Li, Wei
    Meng, Xiangxu
    Wang, Xiao
    Lv, Hongwu
    WEB AND BIG DATA, PT II, APWEB-WAIM 2023, 2024, 14332 : 377 - 392
  • [36] Graph partitions and the controllability of directed signed networks
    Liu, Xianzhu
    Ji, Zhijian
    Hou, Ting
    SCIENCE CHINA-INFORMATION SCIENCES, 2019, 62 (04)
  • [37] Graph partitions and the controllability of directed signed networks
    Xianzhu Liu
    Zhijian Ji
    Ting Hou
    Science China Information Sciences, 2019, 62
  • [38] SybilGuard: Defending against sybil attacks via social networks
    Yu, Haifeng
    Kaminsky, Michael
    Gibbons, Phillip B.
    Flaxman, Abraham D.
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2008, 16 (03) : 576 - 589
  • [39] Preserving Privacy in Social Networks Against Connection Fingerprint Attacks
    Wang, Yazhe
    Zheng, Baihua
    2015 IEEE 31ST INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE), 2015, : 54 - 65
  • [40] Detecting and Defending Against Sybil Attacks in Social Networks: An Overview
    Li, Faxin
    Liu, Bo
    Xiao, Zhefeng
    Fu, Yi
    2014 NINTH INTERNATIONAL CONFERENCE ON BROADBAND AND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS (BWCCA), 2014, : 104 - 112