SocialMix: Supporting Privacy-aware Trusted Social Networking Services

Slides:



Advertisements
Similar presentations
A Survey of Key Management for Secure Group Communications Celia Li.
Advertisements

Secure Multiparty Computations on Bitcoin
Quality Aware Privacy Protection for Location-based Services Zhen Xiao, Xiaofeng Meng Renmin University of China Jianliang Xu Hong Kong Baptist University.
Definition of the Anonymity of Mix Network Runs Andrei Serjantov University of Cambridge Computer Laboratory.
Small-world Overlay P2P Network
Leting Wu Xiaowei Ying, Xintao Wu Dept. Software and Information Systems Univ. of N.C. – Charlotte Reconstruction from Randomized Graph via Low Rank Approximation.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
CSCE 790: Computer Network Security Chin-Tser Huang University of South Carolina.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Miscreant of Social Networks Paper1: Social Honeypots, Making Friends With A Spammer Near You Paper2: Social phishing Kai and Isaac.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Distributed Token Circulation in Mobile Ad Hoc Networks Navneet Malpani, Intel Corp. Nitin Vaidya, Univ. Illinois Urbana-Champaign Jennifer Welch, Texas.
1 The Sybil Attack John R. Douceur Microsoft Research Presented for Cs294-4 by Benjamin Poon.
1 Speaker : 童耀民 MA1G Authors: Ze Li Dept. of Electr. & Comput. Eng., Clemson Univ., Clemson, SC, USA Haiying Shen ; Hailang Wang ; Guoxin.
Preserving Link Privacy in Social Network Based Systems Prateek Mittal University of California, Berkeley Charalampos Papamanthou.
Aggregation in Sensor Networks
A Graph-based Friend Recommendation System Using Genetic Algorithm
Crowds: Anonymity for Web Transactions Michael K. Reiter Aviel D. Rubin Jan 31, 2006Presented by – Munawar Hafiz.
Group Rekeying for Filtering False Data in Sensor Networks: A Predistribution and Local Collaboration-Based Approach Wensheng Zhang and Guohong Cao.
1 Detecting and Reducing Partition Nodes in Limited-routing-hop Overlay Networks Zhenhua Li and Guihai Chen State Key Laboratory for Novel Software Technology.
SocialTube: P2P-assisted Video Sharing in Online Social Networks
Mitigation strategies on scale-free networks against cascading failures Jianwei Wang Adviser: Frank,Yeong-Sung Lin Present by Chris Chang.
Comparison of Tarry’s Algorithm and Awerbuch’s Algorithm CS 6/73201 Advanced Operating System Presentation by: Sanjitkumar Patel.
Mix networks with restricted routes PET 2003 Mix Networks with Restricted Routes George Danezis University of Cambridge Computer Laboratory Privacy Enhancing.
Privacy Preserving in Social Network Based System PRENTER: YI LIANG.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Sybil Attacks VS Identity Clone Attacks in Online Social Networks Lei Jin, Xuelian Long, Hassan Takabi, James B.D. Joshi School of Information Sciences.
Intrusion Resilience via the Bounded-Storage Model Stefan Dziembowski Warsaw University and CNR Pisa.
TBAS: Enhancing Wi-Fi Authentication by Actively Eliciting Channel State Information Muye Liu, Avishek Mukherjee, Zhenghao Zhang, and Xiuwen Liu Florida.
Satisfaction Games in Graphical Multi-resource Allocation
Presented by Edith Ngai MPhil Term 3 Presentation
A Key Pre-Distribution Scheme Using Deployment Knowledge for Wireless Sensor Networks Zhen Yu & Yong Guan Department of Electrical and Computer Engineering.
Privacy Preserving Subgraph Matching on Large Graphs in Cloud
Message Integrity and Message Authentication
Feeling-based location privacy protection for LBS
A Study of Group-Tree Matching in Large Scale Group Communications
A Self-Adaptive Scheduling Algorithm of On-Demand Broadcasts
User Joining Behavior in Online Forums
OblivP2P: An Oblivious Peer-to-Peer Content Sharing System
Location Cloaking for Location Safety Protection of Ad Hoc Networks
Towards Measuring Anonymity
Personalized Privacy Protection in Social Networks
                                                                                                            Network Decoupling for Secure Communications.
Privacy Preserving Subgraph Matching on Large Graphs in Cloud
Spatial Online Sampling and Aggregation
                                                                                                            Network Decoupling for Secure Communications.
Differential Privacy in Practice
Location Recommendation — for Out-of-Town Users in Location-Based Social Network Yina Meng.
Anonymity in Structured Peer-to-Peer Networks
Anupam Das , Nikita Borisov
Personalized Privacy Protection in Social Networks
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
Confidence Interval Estimation
Strayer University at Arlington, VA
Pei Fan*, Ji Wang, Zibin Zheng, Michael R. Lyu
with: My Designs in the Chaos
Korea University of Technology and Education
Privacy preserving cloud computing
Chapter 8: Estimating with Confidence
Chapter 8: Estimating with Confidence
Chapter 8: Estimating with Confidence
Scalable and Privacy-preserving Design of On/Off-chain Smart Contracts
Chapter 8: Estimating with Confidence
Communication Driven Remapping of Processing Element (PE) in Fault-tolerant NoC-based MPSoCs Chia-Ling Chen, Yen-Hao Chen and TingTing Hwang Department.
Anonymous Communication
Refined privacy models
The Impact of Changes in Network Structure on Diffusion of Warnings
Cross Site Request Forgery (CSRF)
Differential Privacy (1)
Presentation transcript:

SocialMix: Supporting Privacy-aware Trusted Social Networking Services Chao Li, Balaji Palanisamy, James Joshi School of Information Sciences University of Pittsburgh

Outline Introduction Motivation and Objective Technical details Experiments Conclusion

The increasing Online Social Networks The OSN users was 0.97 billion in 2011 and is expected to rise to 2.04 billion by 2016.

Conventional and anonymous OSNs There are two types of OSNs: Conventional OSNs: Communication messages are typically linked with real identities of users in order to obtain higher trust among the communicating entities. Anonymous OSNs: Communication messages are disassociated from the real identities of the users.

Anonymous OSNs: trust or not? Untrusted anonymous OSNs (e.g. Whisper): They remove user identities, which gives high privacy but untrusted communication. Any comment comes from an unknown user. Trusted anonymous OSNs (e.g. Secret): They anonymous user identities, which gives trusted communication but low privacy. Any comment comes from a friend or friend of friend. Our goal: To make an anonymous OSN with both strong privacy and trusted communication.

Outline Introduction Motivation and Objective Technical details Experiments Conclusion

The current trusted anonymous OSNs are not safe. Though the ID and Profile can be anonymized, the accumulated posted messages can be collected to re-identify the sender. The success rate depends on the background knowledge of the adversaries, which is always strong in trusted anonymous OSNs because the sender has a friendship with them. ID: Alice / A / *** Posted messages Headache today, can’t go to school. Who? No idea… Love chicken here! Profile: Age Gender Location Education … Oh, Alice or Bob. I hate my BOSS! Alice, that’s her boss! OMG! HIV! What should I do! Alice has HIV!

Message perturbation The goal: We aim at ensuring high degree of user privacy while keeping communicating over a trusted over anonymous social network. The idea: Shuffle the messages through message aggregation so that the relationship between the content of a message and the poster’s identity can be anonymized and perturbed.

Outline Introduction Motivation and Objective Technical details Experiments Conclusion

Ideal mix node DEFINITION 1 (IDEAL MIX NODE): Some nodes in OSNs are selected to work as ‘mix node’ to perturb the messages. DEFINITION 1 (IDEAL MIX NODE): A mix node N is said to be an ideal mix-node iff: The node N has at least k messages during perturbation. The perturbation starts when at least k messages are present and ends when the stored messages is less than k. The amount of time duration each message stays in a mix-node is completely random. a x b y

Basic SocialMix approach What is a SocialMix network like? We first present the basic approach. Suppose we have a network with 10 nodes. A,B,I,J send messages to D,H.   D,H works as event-driven Mix nodes, also called pre-mix nodes. Node E works as intermediate mix node, also called post-mix node.     B C I H E J D F     A G K

Attacks towards Basic SocialMix Time-based attack: In most trusted anonymous OSNs, once a message is posted, it will be shown to other users in a real-time manner (FIFO). Adversaries can link messages to user identity through time information, even if the poster ID is de-identified. Solution: Each message can spend a random duration of time inside the mix node so that the third requirement of ideal mix nodes can be achieved. 11:00am 11:00am (Anonymous) Perturbed post time 11:12am (Anonymous) 11:10am 11:10am (Anonymous) 11:15am (Anonymous) Perturbed post order

Attacks towards Basic SocialMix Friendship-based attack: One user may have higher probability to share the messages of their best friends but have very low probability to share messages coming from somebody they don’t like. Therefore, with background knowledge about the friendship of a mix node, the adversary can assign different probability to different neighbors so that the probability distribution is skewed. Solution: Only select a subset of them with higher resilience towards friendship-based attack. For each node in the network, we can assign the probabilities based on the friendship and calculate the entropy to measure the resilience and then select the top-n nodes with higher entropy or select the nodes with entropy higher than a threshold to be the mix nodes. Expected friendship of mix nodes 90% 10%

Attack-resilient SocialMix The way an attack-resilient mx node work: m1 m2 m3 m2 m3 m4 <15:01, Alice, ‘hahaha’> <15:03, Bob, ‘Hello’> m2 m3 m1 < 15:03, Bob, ‘hahaha’> <15:01, Alice, ‘Hello’> m4 ouputTable m3

Mix node placement Though the pre-mix nodes are event-driven, the post-mix nodes should be pre-determined. There should be a module on OSN server which can regularly select post-mix nodes based on the latest network topology. Naive placement: A naive method for mix node selection is to randomly select the nodes with higher resilience towards friendship-based attack resilience. Top-n-based placement: Among the nodes with friendship-based attack resilience higher than the lower bound, we can further filter out the n nodes with highest entropy. Centrality-based placement: Centrality is an important measurement for networks which can be used to measure the importance of the role of a user in a network. In this scheme, we select post-mix nodes based on their degree centrality, betweenness centrality and eigenvector centrality.

Outline Introduction Motivation and Objective Technical details Experiments Conclusion

Experimental setup Activity: Data set: Friendship: For each of the node, we set a value called ‘activity’, which represents the frequency of the message generated (posted) by this node. Range 1~100. Friendship: For each node and one of his friends, we set a value called ‘friendship’, which indicates the probability a node may share the message posted by this friend. Range 1~100. Data set: A small data set, which is a OSN of 34 members in a club.

Experimental evaluation We first measure the operation time of the algorithm with varying anonymity level k. As can be seen, the operation time for each sharing process for a single mix node is stable for varying k. We do not want a message to be blocked by a mix-node, which means it is stored in the buffer for a long time and cannot be selected for output. Therefore, we set a time bound 10 and measure the probability that a message can pass this mix node within 10 timestamps with varying k. The results show that the pass rate is lower for higher k.

Experimental evaluation The entropy under time-based attack is exactly same as the ideal case, which means the adversary cannot gather any additional information through time-based attack and SocialMix can completely defeat time-based attack. The variation of entropy is very large. Some of the nodes may have high resilience with entropy larger than 3 while node 11 provides no resilience with entropy 0.

Experimental evaluation The entropy bound is the lowest entropy provided by any selected mix node, namely the lower bound of the resilience. The two extreme topn conditions, namely top-1 and top-34, gives 3.46 entropy bound and 0 entropy bound respectively. In practice, based on the demand, a threshold can be set to determine the value of n. Even though we have chosen the better nodes with higher resilience, the entropy by performing friendship-based attack is lower, which means that there are still some information leaked out.

Experimental evaluation The anonymization rate of naive scheme which randomly selects post-mix nodes grows slowly with increasing number of selected post-mix nodes. However, even for random selection case, a subset of 15 nodes among the 34 nodes can already guarantees a very high anonymization rate. The other four improved schemes gives much better results. The PDF for all the schemes roughly follows normal distribution, which provides an appropriate protection of the privacy.

Outline Introduction Motivation and Objective Technical details Experiments Conclusion

Conclusion This paper proposes SocialMix, an anonymous communication mechanism to support privacy-aware trusted social networking services. We propose a suite of mix node construction and placement schemes that enhance the attack resilience and anonymization effectiveness of the SocialMix approach. Our experimental evaluation shows that SocialMix provides high attack resilience for trusted communication over social networks with high anonymization rate.

Thanks. Q&A.