Loading [MathJax]/extensions/MathZoom.js
A Brief Survey on De-anonymization Attacks in Online Social Networks | IEEE Conference Publication | IEEE Xplore

A Brief Survey on De-anonymization Attacks in Online Social Networks


Abstract:

Nowadays, online social network data are increasingly made publicly available to third parties. Several anonymization techniques have been studied and adopted to preserve...Show More

Abstract:

Nowadays, online social network data are increasingly made publicly available to third parties. Several anonymization techniques have been studied and adopted to preserve privacy in the publishing of data. However, recent works have shown that de-anonymization of the released data is not only possible but also practical. In this paper, we present a brief yet systematic review of the existing de-anonymization attacks in online social networks. We unify the models of de-anonymization, centering around the concept of feature matching. We survey the de-anonymization methods in two categories: mapping-based approaches and guessing-based approaches. We discuss three techniques that would potentially improve the surveyed attacks.
Date of Conference: 26-28 September 2010
Date Added to IEEE Xplore: 15 November 2010
Print ISBN:978-1-4244-8785-1
Conference Location: Taiyuan, China
References is not available for this document.

I. Introduction

Recently, social networking sites such as Facebook, Twitter, LinkedIn, and etc. have gained significant popularity [1]. Participating users of these sites form online social networks, which provide powerful means of sharing, organizing, and finding content and contacts.

Select All
1.
(2010, Apr.) Alexa top 500 global sites. [Online]. Available: http://www.alexa.com/topsites
2.
A. Mislove, M. Marcon, and K. P. Gummadi, "Measurement and analysis of online social networks," in Internet Measurement Conference (IMC), 2007.
3.
A. Narayanan and V. Shmatikov, "De-anonymizing social networks," in IEEE Symposium on Security and Privacy (S&P), 2009.
4.
D. Rosenblum, "What anyone can know: The privacy risks of social networking sites," IEEE Security & Privacy, 2007.
5.
L. Sweeney, "k-anonymity: A model for protecting privacy," International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, vol. 10, no. 5, pp. 557-570, 2002.
6.
A. Machanavajjhala, J. Gehrke, D. Kifer, and M. Venkitasubramaniam, "l-diversity: Privacy beyond k-anonymity," in International Conference on Data Engineering (ICDE), 2006.
7.
B. Zhou, J. Pei, andW.-S. Luk, "A brief survey on anonymization techniques for privacy preserving publishing of social network data," School of Computing Science Simon Fraser University, Canada, Tech. Rep. TR 2008-16, 2008.
8.
L. Backstrom, C. Dwork, and J. Kleinberg, "Wherefore art thou r3579x? anonymized social networks, hidden patterns, and structural steganography," in International Conference on World Wide Web (WWW), 2007.
9.
M. Hay, G. Miklau, D. Jensen, D. Towsley, and P. Weis, "Resisting structural reidentification in anonymized social networks," in VLDB, 2008.
10.
G. Wondracek, T. Holz, E. Kirda, and C. Kruegel, "A practical attack to de-anonymize social network users," Tech. Rep. TRiSecLab- 0110-001, 2010.
11.
A. Narayanan and V. Shmatikov, "Robust de-anonymization of large sparse datasets," in IEEE Symposium on Security and Privacy (S&P), 2008.
12.
B. Krishnamurthy and C. E. Wills, "On the leakage of personally identifiable information via online social networks," in Workshop on Online Social Networks (WOSN), 2009.

Contact IEEE to Subscribe

References

References is not available for this document.