16
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Preserving Link Privacy in Social Network Based Systems

      Preprint
      , ,

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          A growing body of research leverages social network based trust relationships to improve the functionality of the system. However, these systems expose users' trust relationships, which is considered sensitive information in today's society, to an adversary. In this work, we make the following contributions. First, we propose an algorithm that perturbs the structure of a social graph in order to provide link privacy, at the cost of slight reduction in the utility of the social graph. Second we define general metrics for characterizing the utility and privacy of perturbed graphs. Third, we evaluate the utility and privacy of our proposed algorithm using real world social graphs. Finally, we demonstrate the applicability of our perturbation algorithm on a broad range of secure systems, including Sybil defenses and secure routing.

          Related collections

          Most cited references4

          • Record: found
          • Abstract: not found
          • Article: not found

          Monte Carlo Sampling Methods Using Markov Chains and Their Applications

            Bookmark
            • Record: found
            • Abstract: found
            • Article: found
            Is Open Access

            De-anonymizing Social Networks

            Operators of online social networks are increasingly sharing potentially sensitive information about users and their relationships with advertisers, application developers, and data-mining researchers. Privacy is typically protected by anonymization, i.e., removing names, addresses, etc. We present a framework for analyzing privacy and anonymity in social networks and develop a new re-identification algorithm targeting anonymized social-network graphs. To demonstrate its effectiveness on real-world networks, we show that a third of the users who can be verified to have accounts on both Twitter, a popular microblogging service, and Flickr, an online photo-sharing site, can be re-identified in the anonymous Twitter graph with only a 12% error rate. Our de-anonymization algorithm is based purely on the network topology, does not require creation of a large number of dummy "sybil" nodes, is robust to noise and all existing defenses, and works even when the overlap between the target network and the adversary's auxiliary information is small.
              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              Resisting structural re-identification in anonymized social networks

                Bookmark

                Author and article information

                Journal
                30 August 2012
                Article
                1208.6189
                6a3412e0-f049-4f0d-811b-f9495a7bc2f1

                http://arxiv.org/licenses/nonexclusive-distrib/1.0/

                History
                Custom metadata
                16 pages, 15 figures
                cs.CR cs.SI

                Comments

                Comment on this article