1 Link Privacy in Social Networks Aleksandra Korolova, Rajeev Motwani, Shubha U. Nabar CIKM’08 Advisor: Dr. Koh, JiaLing Speaker: Li, HueiJyun Date: 2009/3/30.

Slides:



Advertisements
Similar presentations
Mobility Increase the Capacity of Ad-hoc Wireless Network Matthias Gossglauser / David Tse Infocom 2001.
Advertisements

Diversity Maximization Under Matroid Constraints Date : 2013/11/06 Source : KDD’13 Authors : Zeinab Abbassi, Vahab S. Mirrokni, Mayur Thakur Advisor :
Minimizing Seed Set for Viral Marketing Cheng Long & Raymond Chi-Wing Wong Presented by: Cheng Long 20-August-2011.
Mauro Sozio and Aristides Gionis Presented By:
Analysis and Modeling of Social Networks Foudalis Ilias.
An Analysis of Social Network-Based Sybil Defenses Sybil Defender
Trust and Profit Sensitive Ranking for Web Databases and On-line Advertisements Raju Balakrishnan (Arizona State University)
SILVIO LATTANZI, D. SIVAKUMAR Affiliation Networks Presented By: Aditi Bhatnagar Under the guidance of: Augustin Chaintreau.
Advanced Topics in Data Mining Special focus: Social Networks.
CIKM’2008 Presentation Oct. 27, 2008 Napa, California
1 Stochastic Event Capture Using Mobile Sensors Subject to a Quality Metric Nabhendra Bisnik, Alhussein A. Abouzeid, and Volkan Isler Rensselaer Polytechnic.
Katayoun Motahari Student No: Supervisor: Dr. Yan Wang Date: 11 th November
Using Structure Indices for Efficient Approximation of Network Properties Matthew J. Rattigan, Marc Maier, and David Jensen University of Massachusetts.
Common Properties of Real Networks. Erdős-Rényi Random Graphs.
On the Construction of Energy- Efficient Broadcast Tree with Hitch-hiking in Wireless Networks Source: 2004 International Performance Computing and Communications.
Computing Trust in Social Networks
Online Data Gathering for Maximizing Network Lifetime in Sensor Networks IEEE transactions on Mobile Computing Weifa Liang, YuZhen Liu.
The community-search problem and how to plan a successful cocktail party Mauro SozioAris Gionis Max Planck Institute, Germany Yahoo! Research, Barcelona.
Social Context Based Recommendation Systems and Trust Inference Student: Andrea Manrique ID: ITEC810, Macquarie University1 Advisor: A/Prof. Yan.
On Distinguishing between Internet Power Law B Bu and Towsley Infocom 2002 Presented by.
Marina Drosou Department of Computer Science University of Ioannina, Greece Thesis Advisor: Evaggelia Pitoura
COVERTNESS CENTRALITY IN NETWORKS Michael Ovelgönne UMIACS University of Maryland 1 Chanhyun Kang, Anshul Sawant Computer Science Dept.
TOWARDS IDENTITY ANONYMIZATION ON GRAPHS. INTRODUCTION.
1 Topology Control of Multihop Wireless Networks Using Transmit Power Adjustment Infocom /12/20.
Models of Influence in Online Social Networks
Graph-based consensus clustering for class discovery from gene expression data Zhiwen Yum, Hau-San Wong and Hongqiang Wang Bioinformatics, 2007.
1 Worm Modeling and Defense Cliff C. Zou, Don Towsley, Weibo Gong Univ. Massachusetts, Amherst.
Link Recommendation In P2P Social Networks Yusuf Aytaş, Hakan Ferhatosmanoğlu, Özgür Ulusoy Bilkent University, Ankara, Turkey.
Efficient Gathering of Correlated Data in Sensor Networks
Computing and Communicating Functions over Sensor Networks A.Giridhar and P. R. Kumar Presented by Srikanth Hariharan.
Preserving Link Privacy in Social Network Based Systems Prateek Mittal University of California, Berkeley Charalampos Papamanthou.
Network Aware Resource Allocation in Distributed Clouds.
Data Analysis in YouTube. Introduction Social network + a video sharing media – Potential environment to propagate an influence. Friendship network and.
Presenter: Jen Hua Chi Adviser: Yeong Sung Lin Network Games with Many Attackers and Defenders.
WALKING IN FACEBOOK: A CASE STUDY OF UNBIASED SAMPLING OF OSNS junction.
Alias Detection Using Social Network Analysis Ralf Holzer, Bradley Malin, Latanya Sweeney LinkKDD 2005 Advisor: Dr. Koh Jia-Ling Reporter: Che-Wei,
Exploring Online Social Activities for Adaptive Search Personalization CIKM’10 Advisor : Jia Ling, Koh Speaker : SHENG HONG, CHUNG.
1 Efficient Search Ranking in Social Network ACM CIKM2007 Monique V. Vieira, Bruno M. Fonseca, Rodrigo Damazio, Paulo B. Golgher, Davi de Castro Reis,
Influence Maximization in Dynamic Social Networks Honglei Zhuang, Yihan Sun, Jie Tang, Jialin Zhang, Xiaoming Sun.
Understanding Crowds’ Migration on the Web Yong Wang Komal Pal Aleksandar Kuzmanovic Northwestern University
CS 533 Information Retrieval Systems.  Introduction  Connectivity Analysis  Kleinberg’s Algorithm  Problems Encountered  Improved Connectivity Analysis.
Date: 2012/4/23 Source: Michael J. Welch. al(WSDM’11) Advisor: Jia-ling, Koh Speaker: Jiun Jia, Chiou Topical semantics of twitter links 1.
Feedback Effects between Similarity and Social Influence in Online Communities David Crandall, Dan Cosley, Daniel Huttenlocher, Jon Kleinberg, Siddharth.
BotGraph: Large Scale Spamming Botnet Detection Yao Zhao, Yinglian Xie, Fang Yu, Qifa Ke, Yuan Yu, Yan Chen, and Eliot Gillum Speaker: 林佳宜.
3. SMALL WORLDS The Watts-Strogatz model. Watts-Strogatz, Nature 1998 Small world: the average shortest path length in a real network is small Six degrees.
Robustness of complex networks with the local protection strategy against cascading failures Jianwei Wang Adviser: Frank,Yeong-Sung Lin Present by Wayne.
Learning the Structure of Related Tasks Presented by Lihan He Machine Learning Reading Group Duke University 02/03/2006 A. Niculescu-Mizil, R. Caruana.
Templated Search over Relational Databases Date: 2015/01/15 Author: Anastasios Zouzias, Michail Vlachos, Vagelis Hristidis Source: ACM CIKM’14 Advisor:
Date : 2013/03/18 Author : Jeffrey Pound, Alexander K. Hudek, Ihab F. Ilyas, Grant Weddell Source : CIKM’12 Speaker : Er-Gang Liu Advisor : Prof. Jia-Ling.
Jiafeng Guo(ICT) Xueqi Cheng(ICT) Hua-Wei Shen(ICT) Gu Xu (MSRA) Speaker: Rui-Rui Li Supervisor: Prof. Ben Kao.
Mitigation strategies on scale-free networks against cascading failures Jianwei Wang Adviser: Frank,Yeong-Sung Lin Present by Chris Chang.
Finding Experts Using Social Network Analysis 2007 IEEE/WIC/ACM International Conference on Web Intelligence Yupeng Fu, Rongjing Xiang, Yong Wang, Min.
Efficient Computing k-Coverage Paths in Multihop Wireless Sensor Networks XuFei Mao, ShaoJie Tang, and Xiang-Yang Li Dept. of Computer Science, Illinois.
Du, Faloutsos, Wang, Akoglu Large Human Communication Networks Patterns and a Utility-Driven Generator Nan Du 1,2, Christos Faloutsos 2, Bai Wang 1, Leman.
Date: 2012/08/21 Source: Zhong Zeng, Zhifeng Bao, Tok Wang Ling, Mong Li Lee (KEYS’12) Speaker: Er-Gang Liu Advisor: Dr. Jia-ling Koh 1.
Comparison of Tarry’s Algorithm and Awerbuch’s Algorithm CS 6/73201 Advanced Operating System Presentation by: Sanjitkumar Patel.
An Effective Method to Improve the Resistance to Frangibility in Scale-free Networks Kaihua Xu HuaZhong Normal University.
Date: 2013/4/1 Author: Jaime I. Lopez-Veyna, Victor J. Sosa-Sosa, Ivan Lopez-Arevalo Source: KEYS’12 Advisor: Jia-ling Koh Speaker: Chen-Yu Huang KESOSD.
1 Friends and Neighbors on the Web Presentation for Web Information Retrieval Bruno Lepri.
Privacy Preserving in Social Network Based System PRENTER: YI LIANG.
School of Information Sciences University of Pittsburgh TELCOM2125: Network Science and Analysis Konstantinos Pelechrinis Spring 2013 Figures are taken.
Sybil Attacks VS Identity Clone Attacks in Online Social Networks Lei Jin, Xuelian Long, Hassan Takabi, James B.D. Joshi School of Information Sciences.
Scaling Properties of the Internet Graph Aditya Akella With Shuchi Chawla, Arvind Kannan and Srinivasan Seshan PODC 2003.
On the Ability of Graph Coloring Heuristics to Find Substructures in Social Networks David Chalupa By, Tejaswini Nallagatla.
Trustworthiness Management in the Social Internet of Things
Discrete ABC Based on Similarity for GCP
Dieudo Mulamba November 2017
The Importance of Communities for Learning to Influence
Effective Social Network Quarantine with Minimal Isolation Costs
Korea University of Technology and Education
Presentation transcript:

1 Link Privacy in Social Networks Aleksandra Korolova, Rajeev Motwani, Shubha U. Nabar CIKM’08 Advisor: Dr. Koh, JiaLing Speaker: Li, HueiJyun Date: 2009/3/30

2 Outline Introduction The Model Goal of the Attack The Network through a User’s Lens Possible Attack Strategies Experimental Results Results on Synthetic Data Results on Real Data Conclusions

3 Introduction In online communities whose primary goal is social networking, each user’s set of trusted users is of paramount importance to their activity on the site Such as: MySpace 、 Facebook 、 LinkedIn A major part of the value of participating in an online social network or in a web-service with an online community for a user lies in the ability to leverage the structure of the social network graph

4 Introduction The motivation for this paper is networks where Relationships between users may be sensitive to privacy concerns The link information is a valuable asset to the user and to the network owner In such networks, a user is typically permitted only limited access to the link structure

5 Introduction In this paper, we analysis The methods one could employ to obtain information about the link structure of a social network The difficulty of doing that depending on the interface of neighborhood access permitted by the social network We focus on the case in which an attacker, whose goal is to Ascertain a significant fraction of the links in a network Obtains access to parts of the network by gaining access to the accounts of some select users

6 The Model *Goal of the Attack View a social network as an undirected graph G = (V, E) V: users E: connections or interactions between users The primary goal of the privacy attack is to discover the link structure of the network

7 The Model *Goal of the Attack Measure an attack’s effectiveness using the notion of node coverage, or simply coverage Measures the amount of network graph structure exposed to the attacker Definition 1 (Node coverage) The fraction of nodes whose entire immediate neighborhood is known A node is covered, if and only if the attacker knows precisely which nodes it is connected to and which nodes it is not connected to

8 The Model *The Network through a User’s Lens An online social network could choose the extent to which links are made visible to its users depending on how sensitive the links are quantify such choices using lookahead Lookahead l : a user can see all of the edges incident to the nodes within distance l from him 0: a user can see exactly who he links to 1: a user can see exactly the friends that he links to as well as the friends that his friends link to

9 The Model *The Network through a User’s Lens A typical online social network provides a search interface People can search for users by username, name or other identifying information such as or school affiliation Returns usernames who satisfy the query, often with the numbers of friends of those users Interface: neighbors( username, password, l ) exists( username ) degree( username ) userlist()

10 The Model *Possible Attack Strategies Bribed users: the users to whose accounts the attacker obtains An attack’s success or attained node coverage vary depending on the strategy followed for picking the users to bribe Benchmark-Greedy: the one whose perspective on the network will give the largest possible amount of new information (optimal 、 NP-hard)

11 The Model *Possible Attack Strategies Heuristically Greedy: according to some heuristic measure Degree greedy: the one with the maximum “unseen ” degree (degree(username) - #(edges) ) Highest-Degree: bribe users in the descending order of their degrees Random Uniform-Random Crawler: similar to the Heuristically Greedy, but only seen Degree-Greedy-Crawler

12 Experimental Results At a high level, our experiments explore the fraction, f, of nodes that need to be bribed by an attacker Using the different bribing strategies in order to achieve 1-ε node coverage of a social network with lookahead l Results on Synthetic data Generating Synthetic Graphs satisfies a given degree distribution picking uniformly at random from all such graphs

13 Experimental Results *Results on Synthetic data **Generating Synthetic Graphs Generates a graph 1. Generate the degrees of all the nodes d(vi) i = 1, …, n independently according to the distribution  C: the normalizing constant  α: the power law parameter 2. Consider minivertices which correspond to the original vertices in a natural way and generate a random matching over D 3. For each edge in the matching, construct an edge between corresponding vertices in the original graph  obtain a random graph with a given power-law degree distribution

Experimental Results *Results on Synthetic data **Comparison of Strategies ,000 nodes α = 0.3 d max = 5 Random Crawler 、 Greedy Highest Benchmark

Experimental Results *Results on Synthetic data **Dependence on the Number of Users

Experimental Results *Results on Synthetic data **Dependence on the Lookahead 16

Experimental Results *Results on Synthetic data **Dependence on the Lookahead 17 Lookahead = 1 Lookahead = 2 Lookahead = 3

Experimental Results *Results on Real data ** Comparison of Strategies 18 LiveJournal 572,949 users α = 2.6 d min = 1 d max = 1974 Random Highest Crawler 、 Greedy Random Crawler 、 Greedy Highest

Experimental Results *Results on Real data **Dependence on the Lookahead 19 Lookahead = 1 Lookahead = 2 Lookahead = 3

20 Conclusions Provided a experimental analysis of the vulnerability of a social network to the link privacy attack Proposed several strategies for carrying out such attacks, and analyzed their potential for success as a function of the lookahead permitted by the social network’s interface

21 Conclusions The number of user accounts that an attacker needs to subvert in order to obtain a fixed portion of the link structure of the network decreases exponentially with increases in lookahead provided by the network owner Social networks may want to decrease their vulnerability by not displaying the exact number of connections that each users has, or varying the lookahead available to users depending on their trustworthiness