Against Signed Graph Deanonymization Attacks on Social Networks

被引:0
|
作者
Jianliang Gao
Jianxin Wang
Jianbiao He
Fengxia Yan
机构
[1] Central South University,School of Information Science and Engineering
[2] National University of Defense Technology,College of Science
关键词
Big graph; Deanonymization attack; Social network; Signed graph;
D O I
暂无
中图分类号
学科分类号
摘要
Privacy protection is one of the most challenging problems of social networks. Simple removal of the labels is unable to protect the privacy of social networks because the information of graph structures can be utilized to deanonymize target nodes. Previous related proposals mostly assume that attacker knows only the target’s neighborhood graph, but ignoring of signed edge attribute. The graph structure with signed edge attributes could cause serious privacy leakage of social networks. In this paper, we take the signed attribute of edges into account when achieving k-anonymity privacy protection for social networks. We propose a signed k-anonymity scheme to protect the privacy of key entities in social networks. With signed k-anonymity protection, these targets cannot be re-identified by attackers with confidence higher than 1 / k. The proposed scheme minimizes the modification, which preserves high utility of the original data. Extensive experiments on real data sets and synthetic graph illustrate the effectiveness of the proposed scheme.
引用
收藏
页码:725 / 739
页数:14
相关论文
共 50 条
  • [41] SybilDefender: Defend Against Sybil Attacks in Large Social Networks
    Wei, Wei
    Xu, Fengyuan
    Tan, Chiu C.
    Li, Qun
    2012 PROCEEDINGS IEEE INFOCOM, 2012, : 1951 - 1959
  • [42] Preserving Privacy in Social Networks Against Label Pair Attacks
    Liu, Chenyang
    Yin, Dan
    Li, Hao
    Wang, Wei
    Yang, Wu
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2017, 2017, 10251 : 381 - 392
  • [43] SybilGuard: Defending against sybil attacks via social networks
    Yu, Haifeng
    Kaminsky, Michael
    Gibbons, Phillip B.
    Flaxman, Abraham
    ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2006, 36 (04) : 267 - 278
  • [44] Mitigation of malicious attacks on structural balance of signed networks
    Ma, Lijia
    Zhang, Xiao
    Mao, Fubing
    Cai, Shubin
    Lin, Qiuzhen
    Chen, Jianyong
    Wang, Shanfeng
    PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2020, 548
  • [45] Deanonymization of Litecoin Through Transaction-Linkage Attacks
    Zhang, Zongyang
    Yin, Jiayuan
    Liu, Yizhong
    Liu, Jianwei
    2020 11TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION SYSTEMS (ICICS), 2020, : 059 - 065
  • [46] Adversarial attacks against dynamic graph neural networks via node injection
    Jiang, Yanan
    Xia, Hui
    HIGH-CONFIDENCE COMPUTING, 2024, 4 (01):
  • [47] SAM: Query-efficient Adversarial Attacks against Graph Neural Networks
    Zhang, Chenhan
    Zhang, Shiyao
    Yu, James J. Q.
    Yu, Shui
    ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2023, 26 (04)
  • [48] Fortifying graph neural networks against adversarial attacks via ensemble learning
    Zhou, Chenyu
    Huang, Wei
    Miao, Xinyuan
    Peng, Yabin
    Kong, Xianglong
    Cao, Yi
    Chen, Xi
    KNOWLEDGE-BASED SYSTEMS, 2025, 309
  • [49] Uncertainty-Matching Graph Neural Networks to Defend Against Poisoning Attacks
    Shanthamallu, Uday Shankar
    Thiagarajan, Jayaraman J.
    Spanias, Andreas
    THIRTY-FIFTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, THIRTY-THIRD CONFERENCE ON INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE AND THE ELEVENTH SYMPOSIUM ON EDUCATIONAL ADVANCES IN ARTIFICIAL INTELLIGENCE, 2021, 35 : 9524 - 9532
  • [50] NetFense: Adversarial Defenses Against Privacy Attacks on Neural Networks for Graph Data
    Hsieh, I-Chung
    Li, Cheng-Te
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2023, 35 (01) : 796 - 809