1 / 25

Anonymized Social Networks, Hidden Patterns, and Structural Stenography

Anonymized Social Networks, Hidden Patterns, and Structural Stenography Lars Backstrom, Cynthia Dwork, Jon Kleinberg WWW 2007 – Best Paper. OUTLINE. Problem Some graph theory Walk-Based Attack Cut-Based Attack (Semi)-Passive Attacks. PROBLEM. Massive social network graphs exist

fruma
Download Presentation

Anonymized Social Networks, Hidden Patterns, and Structural Stenography

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Anonymized Social Networks, Hidden Patterns, and Structural Stenography Lars Backstrom, Cynthia Dwork, Jon Kleinberg WWW 2007 – Best Paper

  2. OUTLINE • Problem • Some graph theory • Walk-Based Attack • Cut-Based Attack • (Semi)-Passive Attacks

  3. PROBLEM • Massive social network graphs exist • MySpace • FaceBook • Phone Records • Email • Instant Messaging... • Social network structure is valuable • Just removing names isn't enough (we show this)‏

  4. MOTIVATION • Privacy concerns – who talks to who • Economic concerns – selling to marketers • AOL Search Data

  5. GENERAL METHOD • Watermark the graph so that finding the watermark allows us to find individuals • Reveals the removed names • Reveals edges between revealed names

  6. WALK BASED ATTACK • Create a subgraph S to embed • Desired Properties of Subgraph • Doesn't already exist in the graph • Can be easily found • No non-trivial automorphisms (can't be mapped to itself beyond the identity)‏

  7. WALK BASED ATTACK • Let k = (2+d)logn be the number of nodes in the subgraph

  8. x2 x3 x1 x4

  9. WALK BASED ATTACK • Let k = (2+d)logn be the number of nodes in the subgraph • Pick W = {w1...wb} users to target

  10. w1 w2 x2 x3 w3 x1 x4

  11. WALK BASED ATTACK • Let k = (2+d)logn be the number of nodes in the subgraph • Pick W = {w1...wb} users to target • Pick a unique set of nodes in the subgraph to connect to each wi

  12. w1 w2 x2 x3 w3 x1 x4

  13. WALK BASED ATTACK • Let k = (2+d)logn be the number of nodes in the subgraph • Pick W = {w1...wb} users to target • Pick a unique set of nodes in the subgraph to connect to each wi • Pick an external degree for each xi and create additional spurious edges

  14. w1 w2 x2 x3 w3 x4 x1

  15. WALK BASED ATTACK • Create the internal edges by including each edge (xi,xi+1). • Include all other edges with probability ½ • Theoretical result guarantees that w.h.p. this subgraph doesn't exist in G and has no automorphisms.

  16. w1 w2 x2 x3 w3 x1 x4

  17. FINDING THE SUBGRAPH • Find all nodes with degree(x1)‏ • Find all nodes connected to x1 with degree(x2). Repeat by building a tree • With high probability the tree will be pruned to our embedded subgraph.

  18. a b x1 w2 w1 c x2 x3 d x4 w2 x2 x3 e w3 w3 x1 x4 deg(x1) = 5 deg(x2) = 4 deg(x3) = 6 deg(x4) = 7

  19. QUESTION • What could we do to foil this attack?

  20. Evaluation • LJ Data = 4.4 mil people, 77 mil edges

  21. EVALUATION • Using 7 nodes the attack succeeds w.h.p • Can attack 34 - 70 nodes and ~560 - 2400 edges • Our subgraph is not 'obvious' in the graph without the degree sequence

  22. CUT-BASED ATTACK • Requires O(√logn) nodes instead of O(logn) (theoretical lower bound)‏ • Create a subgraph in a similar manner • Each x1 connects to one wi • Use min-cut methods to find H • Walk-based attack is better • This subgraph is highly disconnected = sticks out

  23. (SEMI)-PASSIVE ATTACKS • Walk and Cut based attacks are active • Groups of users could also collude to execute an attack on their neighbors • Experiments show this works for groups as small as 3 or 4 users • How do you defend against this?

  24. Questions?

More Related