20 20

Transactions on
Data Privacy
Foundations and Technologies

http://www.tdp.cat


Articles in Press

Accepted articles here

Latest Issues

Year 2024

Volume 17 Issue 1

Year 2023

Volume 16 Issue 3
Volume 16 Issue 2
Volume 16 Issue 1

Year 2022

Volume 15 Issue 3
Volume 15 Issue 2
Volume 15 Issue 1

Year 2021

Volume 14 Issue 3
Volume 14 Issue 2
Volume 14 Issue 1

Year 2020

Volume 13 Issue 3
Volume 13 Issue 2
Volume 13 Issue 1

Year 2019

Volume 12 Issue 3
Volume 12 Issue 2
Volume 12 Issue 1

Year 2018

Volume 11 Issue 3
Volume 11 Issue 2
Volume 11 Issue 1

Year 2017

Volume 10 Issue 3
Volume 10 Issue 2
Volume 10 Issue 1

Year 2016

Volume 9 Issue 3
Volume 9 Issue 2
Volume 9 Issue 1

Year 2015

Volume 8 Issue 3
Volume 8 Issue 2
Volume 8 Issue 1

Year 2014

Volume 7 Issue 3
Volume 7 Issue 2
Volume 7 Issue 1

Year 2013

Volume 6 Issue 3
Volume 6 Issue 2
Volume 6 Issue 1

Year 2012

Volume 5 Issue 3
Volume 5 Issue 2
Volume 5 Issue 1

Year 2011

Volume 4 Issue 3
Volume 4 Issue 2
Volume 4 Issue 1

Year 2010

Volume 3 Issue 3
Volume 3 Issue 2
Volume 3 Issue 1

Year 2009

Volume 2 Issue 3
Volume 2 Issue 2
Volume 2 Issue 1

Year 2008

Volume 1 Issue 3
Volume 1 Issue 2
Volume 1 Issue 1


Volume 8 Issue 2


Using Identity Separation Against De-anonymization of Social Networks

Gábor György Gulyás(a),(b),(*), Sándor Imre(b)

Transactions on Data Privacy 8:2 (2015) 113 - 140

Abstract, PDF

(a) Laboratory of Cryptography and Systems Security, BME, Hungary.

(b) Mobile Communications and Quantum Technologies Laboratory, BME, Hungary.

e-mail:gulyas @crysys.hu; imre @hit.bme.hu


Abstract

Due to the nature of the data that is accumulated in social networking services, there are a great variety of data-driven uses. However, private information occasionally gets published within sanitized datasets offered to third parties. In this paper we consider a strong class of deanonymization attacks that can re-identify these datasets using structural information crawled from other networks. We provide the model level analysis of a technique called identity separation that could be used for hiding information even from these attacks. We show that in case of noncollaborating users ca. 50% of them need to adopt the technique in order to tackle re-identification over the network. We additionally highlight several settings of the technique that allows preserving privacy on the personal level. In the second part of our experiments we evaluate a measure of anonymity, and show that if users with low anonymity values apply identity separation, the minimum adoption rate for repelling the attack drops down to 3 - 15 %. Additionally, we show that it is necessary for top degree nodes to participate.

* Corresponding author.

Follow us




Supports



ISSN: 1888-5063; ISSN (Digital): 2013-1631; D.L.:B-11873-2008; Web Site: http://www.tdp.cat/
Contact: Transactions on Data Privacy; Vicenç Torra; Umeå University; 90187 Umeå (Sweden); e-mail:tdp@tdp.cat
Note: TDP's web site does not use cookies. TDP does not keep information neither on IP addresses nor browsers. For the privacy policy access here.

 


Vicenç Torra, Last modified: 10 : 27 June 27 2015.