Computer Science – Cryptography and Security
Scientific paper
2009-03-19
Computer Science
Cryptography and Security
Published in the 30th IEEE Symposium on Security and Privacy, 2009. The definitive version is available at: http://www.cs.ut
Scientific paper
Operators of online social networks are increasingly sharing potentially sensitive information about users and their relationships with advertisers, application developers, and data-mining researchers. Privacy is typically protected by anonymization, i.e., removing names, addresses, etc. We present a framework for analyzing privacy and anonymity in social networks and develop a new re-identification algorithm targeting anonymized social-network graphs. To demonstrate its effectiveness on real-world networks, we show that a third of the users who can be verified to have accounts on both Twitter, a popular microblogging service, and Flickr, an online photo-sharing site, can be re-identified in the anonymous Twitter graph with only a 12% error rate. Our de-anonymization algorithm is based purely on the network topology, does not require creation of a large number of dummy "sybil" nodes, is robust to noise and all existing defenses, and works even when the overlap between the target network and the adversary's auxiliary information is small.
Narayanan Arvind
Shmatikov Vitaly
No associations
LandOfFree
De-anonymizing Social Networks does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.
If you have personal experience with De-anonymizing Social Networks, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and De-anonymizing Social Networks will most certainly appreciate the feedback.
Profile ID: LFWR-SCP-O-648257