Blind De-anonymization Attacks using Social Networks
Author(s): Lee, W-H; Ji, S; Liu, C; Mittal, Prateek; Lee, Ruby B
DownloadTo refer to this page use:
http://arks.princeton.edu/ark:/88435/pr13s0g
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lee, W-H | - |
dc.contributor.author | Ji, S | - |
dc.contributor.author | Liu, C | - |
dc.contributor.author | Mittal, Prateek | - |
dc.contributor.author | Lee, Ruby B | - |
dc.date.accessioned | 2021-10-08T20:15:45Z | - |
dc.date.available | 2021-10-08T20:15:45Z | - |
dc.date.issued | 2017-10-30 | en_US |
dc.identifier.citation | Lee, W-H, Ji, S, Liu, C, Mittal, P, Lee, RB. (2017). Blind De-anonymization Attacks using Social Networks. 2017-January (1 - 4. doi:10.1145/3139550.3139562 | en_US |
dc.identifier.uri | http://arks.princeton.edu/ark:/88435/pr13s0g | - |
dc.description.abstract | It is important to study the risks of publishing privacy-sensitive data. Even if sensitive identities (e.g., name, social security number) were removed and advanced data perturbation techniques were applied, several de-anonymization attacks have been proposed to re-identify individuals. However, existing attacks have some limitations: 1) they are limited in de-anonymization accuracy; 2) they require prior seed knowledge and suffer from the imprecision of such seed information. We propose a novel structure-based de-anonymization attack, which does not require the attacker to have prior information (e.g., seeds). Our attack is based on two key insights: using multihop neighborhood information, and optimizing the process of deanonymization by exploiting enhanced machine learning techniques. The experimental results demonstrate that our method is robust to data perturbations and significantly outperforms the stateof- the-art de-anonymization techniques by up to 10× improvement. | en_US |
dc.format.extent | 1 - 4 | en_US |
dc.language.iso | en_US | en_US |
dc.relation.ispartof | Proceedings of the 2017 Workshop on Privacy in the Electronic Society, co-located with CCS 2017 | en_US |
dc.rights | Author's manuscript | en_US |
dc.title | Blind De-anonymization Attacks using Social Networks | en_US |
dc.type | Conference Article | en_US |
dc.identifier.doi | doi:10.1145/3139550.3139562 | - |
dc.date.eissued | 2017-10-30 | en_US |
pu.type.symplectic | http://www.symplectic.co.uk/publications/atom-terms/1.0/conference-proceeding | en_US |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Blind De-anonymization Attacks using Social Networks.pdf | 150.66 kB | Adobe PDF | View/Download |
Items in OAR@Princeton are protected by copyright, with all rights reserved, unless otherwise indicated.