Abstract
In order to prevent the disclosure of privacy-sensitive data, such as names and relations between users, social network graphs have to be anonymised before publication. Naive anonymisation of social network graphs often consists in deleting all identifying information of the users, while maintaining the original graph structure. Various types of attacks on naively anonymised graphs have been developed. Active attacks form a special type of such privacy attacks, in which the adversary enrols a number of fake users, often called sybils, to the social network, allowing the adversary to create unique structural patterns later used to re-identify the sybil nodes and other users after anonymisation. Several studies have shown that adding a small amount of noise to the published graph already suffices to mitigate such active attacks. Consequently, active attacks have been dubbed a negligible threat to privacy-preserving social graph publication. In this paper, we argue that these studies unveil shortcomings of specific attacks, rather than inherent problems of active attacks as a general strategy. In order to support this claim, we develop the notion of a robust active attack, which is an active attack that is resilient to small perturbations of the social network graph. We formulate the design of robust active attacks as an optimisation problem and we give definitions of robustness for different stages of the active attack strategy. Moreover, we introduce various heuristics to achieve these notions of robustness and experimentally show that the new robust attacks are considerably more resilient than the original ones, while remaining at the same level of feasibility.
Highlights
We assess the contributions of different components of the robust active attack strategy to the success of the attacks
We focus on the suitability of robust active attacks as a more appropriate benchmark, in comparison with the original attack, for evaluating anonymisation methods based on formal privacy guarantees
We have re-assessed the capabilities of active attackers in the setting of privacy-preserving publication of social graphs
Summary
A rather different notion of background knowledge was introduced by Backstrom et al (2007) They describe an adversary able to register several (fake) accounts to the network, called sybil accounts. In Backstrom et al.’s attack to a social graph G = (V , E), the adversary’s background knowledge is the induced subgraph formed by the sybil accounts in G joined with the connections to the victims. We do so by proposing the first active attack strategy that features two key properties It can effectively reidentify users with a small number of sybil accounts. It is resilient, in the sense that it resists the introduction of reasonable amounts of noise in the network, and the application of anonymisation algorithms designed to counteract active attacks.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.