期刊文献+

Attacks and Countermeasures in Social Network Data Publishing

Attacks and Countermeasures in Social Network Data Publishing
下载PDF
导出
摘要 With the increasing prevalence of social networks, more and more social network data are published for many applications, such as social network analysis and data mining. However, this brings privacy problems. For example, adversaries can get sensitive information of some individuals easily with little background knowledge. How to publish social network data for analysis purpose while preserving the privacy of individuals has raised many concerns. Many algorithms have been proposed to address this issue. In this paper, we discuss this privacy problem from two aspects: attack models and countermeasures. We analyse privacy conceres, model the background knowledge that adversary may utilize and review the recently developed attack models. We then survey the state-of-the-art privacy preserving methods in two categories: anonymization methods and differential privacy methods. We also provide research directions in this area. With the increasing prevalence of social networks, more and more social network data are published for many applications, such as social network analysis and data mining. However, this brings privacy problems. For example, adversaries can get sensitive information of some individuals easily with little background knowledge. How to publish social network data for analysis purpose while preserving the privacy of individuals has raised many concerns. Many algorithms have been proposed to address this issue. In this paper, we discuss this privacy problem from two aspects: attack models and countermeasures. We analyse privacy conceres, model the background knowledge that adversary may utilize and review the recently developed attack models. We then survey the state-of-the-art privacy preserving methods in two categories: anonymization methods and differential privacy methods. We also provide research directions in this area.
出处 《ZTE Communications》 2016年第B06期2-9,共8页 中兴通讯技术(英文版)
关键词 social network data publishing attack model privacy preserving social network data publishing attack model privacy preserving
  • 相关文献

参考文献69

  • 1L. Backstrom, C. Dwork, and J. Kleinberg, "Wherefore art thou r3579x?: anony- mized social networks, hidden patterns, and structural steganography," in Proc. 16th International Conference on World Wide Web, New York, USA, 2007, pp.181-190, doi: 10.1145/2043174.2043199.
  • 2C.-H. Tai, P. S. Yu, D.-N. Yang, and M.-S. Chen, "Privacy-preserving social net- work publication against friendship attacks," in Proc. 17th ACM S1GKDD Inter- national Conference on Knowledge Discovery and Data Mining, San Diego, USA, 2011, pp. 1262-1270. doi: 10.1145/2020408.2020599.
  • 3B. Zhou and J. Pei, ~Preserving privacy in social networks against neighborhood attacks," in IEEE 24th International Conference on Data Engincering (ICDE), Toronto, Canada, 2008, pp. 506-515. doi: 10.1007/s10115-010-0311-2.
  • 4B. Zhang and J. Pei, "The k-anonymity and 1-diversity approaches for privacy preservation in social networks against neighborhood attacks,~ Knowledge and Information Systerr~, vol. 28, no. 1, pp. 47-77, 2011. doi: 10.1007/s10115-010- 0311-2.
  • 5M. I. H. Ninggal and J. H. Abawajy, "Neighbourhood-pair attaek in social net- work data publishing," in Mobile and Ubiquitous Systema: Computing, Network- ing, and Services, London, England, 2014, pp. 726-731. doi: 10.1007/978-3-319 -11569-6_61.
  • 6Y.Wang and B. Zheng, "Preserving privacy in social networks against connec- tion fingerprint attacks," in IEEE 31st International Conference on Data Engi-neering (ICDE), Seoul, Korea, 2015, ppi 54- 65. doi: 10.1109/ ICDE.2015.7113272.
  • 7C. Sun, P. S. Yu, X. Kong, and Y. Fu, "Privacy preserving social network publi- eation against mutual friend attacks," in IEEE 13th International Conference on Data Mining Workshops (ICDMW), Dallas, USA, 2013; pp. 883-890. doi: 10.114511217299.1217302.
  • 8A. Narayanan and V. Shmatikov, "De-anonymizing social networks," in 30th IEEE Symposium on Security and Privacy, Oaldand, USA, 2.01)9, pp. I73-187. doi: 10.1109/SP.2009.22.
  • 9A. Narayanan, E. Shi, and B. I. Rubinstein, "Link prediction by de-anonymiza- tion: How we won the kaggle social network challenge," in lnternat/onal Jo/nt Conference on Neural Networks (IJCNN), San Jose, USA, 2011, pp. 1825-1834. doi: 10.1109/IJCNN.2011.6033446.
  • 10W. Peng, F. Li, X. Zou, and J. Wu, "A two stage deanonymization attack against anonymised social networks," IEEE Transactions on Computers, vol. 63, no. 2, pp. 290-303, 2014. doi: 10.1109/TC. 2012.202.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部