Skip to main content

Blind De-anonymization Attacks using Social Networks

Author(s): Lee, W-H; Ji, S; Liu, C; Mittal, Prateek; Lee, Ruby B

Download
To refer to this page use: http://arks.princeton.edu/ark:/88435/pr13s0g
Full metadata record
DC FieldValueLanguage
dc.contributor.authorLee, W-H-
dc.contributor.authorJi, S-
dc.contributor.authorLiu, C-
dc.contributor.authorMittal, Prateek-
dc.contributor.authorLee, Ruby B-
dc.date.accessioned2021-10-08T20:15:45Z-
dc.date.available2021-10-08T20:15:45Z-
dc.date.issued2017-10-30en_US
dc.identifier.citationLee, W-H, Ji, S, Liu, C, Mittal, P, Lee, RB. (2017). Blind De-anonymization Attacks using Social Networks. 2017-January (1 - 4. doi:10.1145/3139550.3139562en_US
dc.identifier.urihttp://arks.princeton.edu/ark:/88435/pr13s0g-
dc.description.abstractIt is important to study the risks of publishing privacy-sensitive data. Even if sensitive identities (e.g., name, social security number) were removed and advanced data perturbation techniques were applied, several de-anonymization attacks have been proposed to re-identify individuals. However, existing attacks have some limitations: 1) they are limited in de-anonymization accuracy; 2) they require prior seed knowledge and suffer from the imprecision of such seed information. We propose a novel structure-based de-anonymization attack, which does not require the attacker to have prior information (e.g., seeds). Our attack is based on two key insights: using multihop neighborhood information, and optimizing the process of deanonymization by exploiting enhanced machine learning techniques. The experimental results demonstrate that our method is robust to data perturbations and significantly outperforms the stateof- the-art de-anonymization techniques by up to 10× improvement.en_US
dc.format.extent1 - 4en_US
dc.language.isoen_USen_US
dc.relation.ispartofProceedings of the 2017 Workshop on Privacy in the Electronic Society, co-located with CCS 2017en_US
dc.rightsAuthor's manuscripten_US
dc.titleBlind De-anonymization Attacks using Social Networksen_US
dc.typeConference Articleen_US
dc.identifier.doidoi:10.1145/3139550.3139562-
dc.date.eissued2017-10-30en_US
pu.type.symplectichttp://www.symplectic.co.uk/publications/atom-terms/1.0/conference-proceedingen_US

Files in This Item:
File Description SizeFormat 
Blind De-anonymization Attacks using Social Networks.pdf150.66 kBAdobe PDFView/Download


Items in OAR@Princeton are protected by copyright, with all rights reserved, unless otherwise indicated.