Loading...
Please wait, while we are loading the content...
Similar Documents
Wherefore Art Thou R 3579 X ? Anonymized Social Networks , Hidden Patterns , and Structural
| Content Provider | Semantic Scholar |
|---|---|
| Author | Jackoway, Daniel |
| Copyright Year | 2014 |
| Abstract | Large-scale social networks have emerged as a major part of our world in the last two decades. With it has come research interest into the structure of these graphs. However, one barrier to research is access to data. Some might suggest that major social networks could release an anonymized social graph that gives the perfect structure of the graph and simply redacts the identification of which account is represented by each node in the graph. This paper explores a number of attacks on this model and shows that there are many ways to compromise users' privacy and determine whether certain users are connected or not in the graph. All attacks seek to determine whether certain users are connected or not in the graph. It does so by finding each user's node in the anonymized graph, which in turn perfectly tells the attackers which other identified nodes each user is connected to. This paper demonstrates several effective, practical attacks with different threat models that demonstrate the problems with this simple anonymization technique. |
| File Format | PDF HTM / HTML |
| Alternate Webpage(s) | http://cs.stanford.edu/~rishig/courses/ref/l13b.pdf |
| Language | English |
| Access Restriction | Open |
| Content Type | Text |
| Resource Type | Article |