Resisting structural re-identification in anonymized social networks

被引:76
作者
Hay, Michael [1 ]
Miklau, Gerome [1 ]
Jensen, David [1 ]
Towsley, Don [1 ]
Li, Chao [1 ]
机构
[1] Univ Massachusetts, Dept Comp Sci, Amherst, MA 01002 USA
关键词
Anonymity; Anonymization; Privacy; Networks; Social networks; PRIVACY;
D O I
10.1007/s00778-010-0210-x
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We identify privacy risks associated with releasing network datasets and provide an algorithm that mitigates those risks. A network dataset is a graph representing entities connected by edges representing relations such as friendship, communication or shared activity. Maintaining privacy when publishing a network dataset is uniquely challenging because an individual's network context can be used to identify them even if other identifying information is removed. In this paper, we introduce a parameterized model of structural knowledge available to the adversary and quantify the success of attacks on individuals in anonymized networks. We show that the risks of these attacks vary based on network structure and size and provide theoretical results that explain the anonymity risk in random networks. We then propose a novel approach to anonymizing network data that models aggregate network structure and allows analysis to be performed by sampling from the model. The approach guarantees anonymity for entities in the network while allowing accurate estimates of a variety of network measures with relatively little bias.
引用
收藏
页码:797 / 823
页数:27
相关论文
共 53 条
[11]   AN EFFICIENT ALGORITHM FOR GRAPH ISOMORPHISM [J].
CORNEIL, DG ;
GOTLIEB, CC .
JOURNAL OF THE ACM, 1970, 17 (01) :51-&
[12]   Characterization of complex networks: A survey of measurements [J].
Costa, L. Da F. ;
Rodrigues, F. A. ;
Travieso, G. ;
Boas, P. R. Villas .
ADVANCES IN PHYSICS, 2007, 56 (01) :167-242
[13]   Differential privacy: A survey of results [J].
Dwork, Cynthia .
THEORY AND APPLICATIONS OF MODELS OF COMPUTATION, PROCEEDINGS, 2008, 4978 :1-19
[14]   Calibrating noise to sensitivity in private data analysis [J].
Dwork, Cynthia ;
McSherry, Frank ;
Nissim, Kobbi ;
Smith, Adam .
THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2006, 3876 :265-284
[15]  
ERDOS P, 1960, B INT STATIST INST, V38, P343
[16]   HORIZONS OF OBSERVABILITY AND LIMITS OF INFORMAL CONTROL IN ORGANIZATIONS [J].
FRIEDKIN, NE .
SOCIAL FORCES, 1983, 62 (01) :54-77
[17]  
Frikken K.B., 2006, WPES '06: Proceedings of the 5th ACM workshop on Privacy in electronic society, P89
[18]  
Ganta S.R., 2008, P 14 ACM SIGKDD INT, P265, DOI [DOI 10.1145/1401890.1401926, 10.1145/1401890.1401926]
[19]  
Hay M., 2007, UMCS200719 U MASS DE
[20]  
Hay M, 2010, PROC VLDB ENDOW, V3, P1021