General Graph Data De-Anonymization: From Mobility Traces to Social Networks
Title | General Graph Data De-Anonymization: From Mobility Traces to Social Networks |
Publication Type | Journal Article |
Year of Publication | 2016 |
Authors | Ji, Shouling, Li, Weiqing, Srivatsa, Mudhakar, He, Jing Selena, Beyah, Raheem |
Journal | ACM Trans. Inf. Syst. Secur. |
Volume | 18 |
Pagination | 12:1–12:29 |
ISSN | 1094-9224 |
Keywords | Attack Graphs, composability, Graph de-anonymization, Metrics, mobility traces, pubcrawl, Resiliency, social networks |
Abstract | When people utilize social applications and services, their privacy suffers a potential serious threat. In this article, we present a novel, robust, and effective de-anonymization attack to mobility trace data and social data. First, we design a Unified Similarity (US) measurement, which takes account of local and global structural characteristics of data, information obtained from auxiliary data, and knowledge inherited from ongoing de-anonymization results. By analyzing the measurement on real datasets, we find that some data can potentially be de-anonymized accurately and the other can be de-anonymized in a coarse granularity. Utilizing this property, we present a US-based De-Anonymization (DA) framework, which iteratively de-anonymizes data with accuracy guarantee. Then, to de-anonymize large-scale data without knowledge of the overlap size between the anonymized data and the auxiliary data, we generalize DA to an Adaptive De-Anonymization (ADA) framework. By smartly working on two core matching subgraphs, ADA achieves high de-anonymization accuracy and reduces computational overhead. Finally, we examine the presented de-anonymization attack on three well-known mobility traces: St Andrews, Infocom06, and Smallblue, and three social datasets: ArnetMiner, Google+, and Facebook. The experimental results demonstrate that the presented de-anonymization framework is very effective and robust to noise. The source code and employed datasets are now publicly available at SecGraph [2015]. |
URL | http://doi.acm.org/10.1145/2894760 |
DOI | 10.1145/2894760 |
Citation Key | ji_general_2016 |