Abstract

In order to prevent the disclosure of privacy-sensitive data, such as names and relations between users, social network graphs have to be anonymised before publication. Naive anonymisation of social network graphs often consists in deleting all identifying information of the users, while maintaining the original graph structure. Various types of attacks on naively anonymised graphs have been developed. Active attacks form a special type of such privacy attacks, in which the adversary enrols a number of fake users, often called sybils, to the social network, allowing the adversary to create unique structural patterns later used to re-identify the sybil nodes and other users after anonymisation. Several studies have shown that adding a small amount of noise to the published graph already suffices to mitigate such active attacks. Consequently, active attacks have been dubbed a negligible threat to privacy-preserving social graph publication. In this paper, we argue that these studies unveil shortcomings of specific attacks, rather than inherent problems of active attacks as a general strategy. In order to support this claim, we develop the notion of a robust active attack, which is an active attack that is resilient to small perturbations of the social network graph. We formulate the design of robust active attacks as an optimisation problem and we give definitions of robustness for different stages of the active attack strategy. Moreover, we introduce various heuristics to achieve these notions of robustness and experimentally show that the new robust attacks are considerably more resilient than the original ones, while remaining at the same level of feasibility.

Highlights

  • We assess the contributions of different components of the robust active attack strategy to the success of the attacks

  • We focus on the suitability of robust active attacks as a more appropriate benchmark, in comparison with the original attack, for evaluating anonymisation methods based on formal privacy guarantees

  • We have re-assessed the capabilities of active attackers in the setting of privacy-preserving publication of social graphs

Read more

Summary

Introduction

A rather different notion of background knowledge was introduced by Backstrom et al (2007) They describe an adversary able to register several (fake) accounts to the network, called sybil accounts. In Backstrom et al.’s attack to a social graph G = (V , E), the adversary’s background knowledge is the induced subgraph formed by the sybil accounts in G joined with the connections to the victims. We do so by proposing the first active attack strategy that features two key properties It can effectively reidentify users with a small number of sybil accounts. It is resilient, in the sense that it resists the introduction of reasonable amounts of noise in the network, and the application of anonymisation algorithms designed to counteract active attacks.

Related work
Adversarial model
Notation and terminology
The attacker–defender game
Robust active attacks
Robust fingerprint creation
Robust attacker subgraph retrieval
Robust fingerprint matching
Heuristics for an approximate instance of the robust active attack strategy
Attacker subgraph creation
Attacker subgraph retrieval
Fingerprint matching
Experiments
Three models of synthetic graphs and two real-life networks
Graph perturbation
Attack variants
Probability of success of the attacks
Analysis of results
Findings
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call