Presentation is loading. Please wait.

Presentation is loading. Please wait.

On Your Social Network De-anonymizablity: Quantification and Large Scale Evaluation with Seed Knowledge NDSS 2015, Shouling Ji, Georgia Institute of Technology.

Similar presentations


Presentation on theme: "On Your Social Network De-anonymizablity: Quantification and Large Scale Evaluation with Seed Knowledge NDSS 2015, Shouling Ji, Georgia Institute of Technology."— Presentation transcript:

1 On Your Social Network De-anonymizablity: Quantification and Large Scale Evaluation with Seed Knowledge NDSS 2015, Shouling Ji, Georgia Institute of Technology Fengli Zhang 11/4/2015

2 Outline Introduction Motivation Contribution
De-anonymization Quantification Evaluation Conclusion

3 Introduction As social networks have become deeply integrated in people’s lives, social networks can produce a significant amount of social data that contains their users’ detailed personal information To protect users’ privacy, data owner usually anonymize their data before it is shared, transferred, and published Naïve ID removal, K-anonymization, Differential privacy Existing anonymization schemes have vulnerabilities. Structure based de-anonymization attacks can break the privacy of social networks effectively based only on the data’s structural information.

4 De-anonymization Attack

5 Motivation Question 1 : Why social networks are vulnerable to structure based de- anonymization attacks? Question 2 : How de-anonymizable a social network is? Question 3 : How many users within a social network can be successfully de-anonymized?

6 Contributions first theoretical quantification on the perfect and partial de- anonymizablity of social networks in general scenarios, where the social network can follow an arbitrary network model implement the first large scale evaluation of the perfect and partial de- anonymizablity of 24 various real world social networks find that compared to the structural information associated with known seed users, the other structural information(the structural information among anonymized users) is also useful in improving structure based de-anonymization attacks

7 Data Model Anonymized Data ( 𝐺 𝑎 )=( 𝑉 𝑎 , 𝐸 𝑎 )
Auxiliary Data ( 𝐺 𝑢 )=( 𝑉 𝑢 , 𝐸 𝑢 ) De-anonymization scheme (σ) σ is a mapping: if i Є 𝑉 𝑎 , σ(i) Є 𝑉 𝑢 Seed mapping S S={(i, σ(i)|i Є 𝑉 𝑎 , σ(i) Є 𝑉 𝑢 }, Λ=|S| Conceptual Underlying Graph (G) Sampling rate s Measurement Δ σ

8 System Model Δ σ Δ σ : Edge difference between 𝐺 𝑎 and 𝐺 𝑢 under σ
For the mapping (i, σ(i)=j) Є σ 2

9 De-anonymization Quantification
Graph G : Erdos-Renyi (ER) model; General model Quantification Seed based perfect de-anonymization Structure based perfect de-anonymization

10 De-anonymization Quantification
Error Toleration Quantification We define 𝐺 𝑎 is (1 − ϵ)-de-anonymizable if at least (1−ϵ)n users in 𝐺 𝑎 are perfectly de-anonymizable. That is at most ϵn incorrect de-anonymizations are allowable.

11 Datasets

12 Setup Suffixes -S: Using seed information
-A, None: Using overall structural information -e.g. Twitter-A, Twitter-S Seed mapping are chosen randomly -High-degree users are not given preference -Representing the general scenatios 2-part of Evaluation - Evaluation of perfect De-anonymizablity - Evaluation of (1 − ϵ)-de-anonymizablity

13 Evaluation _ perfect De-anonymizablity [1/3]

14 Evaluation _ perfect De-anonymizablity [2/3]

15 Evaluation _ perfect De-anonymizablity [3/3]

16 Evaluation _ partial De-anonymizablity [1/2]

17 Evaluation _ partial De-anonymizablity [2/2]

18 Evaluation Overview

19 Conclusion & Limitation
Provide the theoretical foundation for the existing De-anonymization attacks with seed information The overall structural information based de-anonymization is more powerful and it can perfectly de-anonymize a social network even without any seed information Do not speciafically consider how to design structural data anonymization technique to defend against such de-anonymization attacks Do not explicitly involve the noise model because it does not have proper scheme to add noise with data utility preservation

20


Download ppt "On Your Social Network De-anonymizablity: Quantification and Large Scale Evaluation with Seed Knowledge NDSS 2015, Shouling Ji, Georgia Institute of Technology."

Similar presentations


Ads by Google