Anonymized Social Networks, Hidden Patterns, and Structural Stenography Lars Backstrom, Cynthia Dwork, Jon Kleinberg WWW 2007 – Best Paper.

Slides:



Advertisements
Similar presentations
The role of compatibility in the diffusion of technologies in social networks Mohammad Mahdian Yahoo! Research Joint work with N. Immorlica, J. Kleinberg,
Advertisements

Lower Bounds for Local Search by Quantum Arguments Scott Aaronson (UC Berkeley) August 14, 2003.
How to Schedule a Cascade in an Arbitrary Graph F. Chierchetti, J. Kleinberg, A. Panconesi February 2012 Presented by Emrah Cem 7301 – Advances in Social.
School of Computer Science Carnegie Mellon University Duke University DeltaCon: A Principled Massive- Graph Similarity Function Danai Koutra Joshua T.
13 May 2009Instructor: Tasneem Darwish1 University of Palestine Faculty of Applied Engineering and Urban Planning Software Engineering Department Introduction.
Private Analysis of Graph Structure With Vishesh Karwa, Sofya Raskhodnikova and Adam Smith Pennsylvania State University Grigory Yaroslavtsev
RESILIENCE NOTIONS FOR SCALE-FREE NETWORKS GUNES ERCAL JOHN MATTA 1.
Maximizing the Spread of Influence through a Social Network
Rumors and Routes Rajmohan Rajaraman Northeastern University, Boston May 2012 Chennai Network Optimization WorkshopRumors and Routes1.
Authors Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, Abraham Flaxman Presented by: Jonathan di Costanzo & Muhammad Atif Qureshi 1.
An Analysis of Social Network-Based Sybil Defenses Sybil Defender
A Distributed and Oblivious Heap Christian Scheideler and Stefan Schmid Dept. of Computer Science University of Paderborn.
Xiaowei Ying Xintao Wu Univ. of North Carolina at Charlotte 2009 SIAM Conference on Data Mining, May 1, Sparks, Nevada Graph Generation with Prescribed.
Haifeng Yu National University of Singapore
Mining and Searching Massive Graphs (Networks)
C MU U sable P rivacy and S ecurity Laboratory 1 Privacy Policy, Law and Technology Search Engines and Social Networks October.
Explorations in Anonymous Communication Andrew Bortz with Luis von Ahn Nick Hopper Aladdin Center, Carnegie Mellon University, 8/19/2003.
HCS Clustering Algorithm
EDA (CS286.5b) Day 6 Partitioning: Spectral + MinCut.
2. Attacks on Anonymized Social Networks. Setting A social network Edges may be private –E.g., “communication graph” The study of social structure by.
Privacy in Social Networks:
The Mathematics of Networks Chapter 7. Trees A tree is a graph that –Is connected –Has no circuits Tree.
SybilGuard: Defending Against Sybil Attacks via Social Networks Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, and Abraham Flaxman Presented by Ryan.
1 Refined Search Tree Technique for Dominating Set on Planar Graphs Jochen Alber, Hongbing Fan, Michael R. Fellows, Henning Fernau, Rolf Niedermeier, Fran.
Minimum Spanning Trees. Subgraph A graph G is a subgraph of graph H if –The vertices of G are a subset of the vertices of H, and –The edges of G are a.
SocialFilter: Introducing Social Trust to Collaborative Spam Mitigation Michael Sirivianos Telefonica Research Telefonica Research Joint work with Kyungbaek.
TOWARDS IDENTITY ANONYMIZATION ON GRAPHS. INTRODUCTION.
On the Anonymity of Anonymity Systems Andrei Serjantov (anonymous)
Privacy and trust in social network
1 CO Games Development 1 Week 5 Deriving a "look at" function + Graph Theory Gareth Bellaby.
Finding dense components in weighted graphs Paul Horn
Wherefore Art Thou R3579X? Anonymized Social Networks, Hidden Patterns, and Structural Stenography.
WALKING IN FACEBOOK: A CASE STUDY OF UNBIASED SAMPLING OF OSNS junction.
Network Characterization via Random Walks B. Ribeiro, D. Towsley UMass-Amherst.
Inoculation Strategies for Victims of Viruses and the Sum-of-Squares Partition Problem Kevin Chang Joint work with James Aspnes and Aleksandr Yampolskiy.
1 1 Stanford University 2 MPI for Biological Cybernetics 3 California Institute of Technology Inferring Networks of Diffusion and Influence Manuel Gomez.
1 1 Stanford University 2 MPI for Biological Cybernetics 3 California Institute of Technology Inferring Networks of Diffusion and Influence Manuel Gomez.
Protecting Sensitive Labels in Social Network Data Anonymization.
7.1 and 7.2: Spanning Trees. A network is a graph that is connected –The network must be a sub-graph of the original graph (its edges must come from the.
Expanders via Random Spanning Trees R 許榮財 R 黃佳婷 R 黃怡嘉.
Preserving Caller Anonymity in Voice-over-IP Networks Mudhakar Srivatsa, Ling Liu and Arun Iyengar Presenter: Bo Wu.
BackTracking CS335. N-Queens The object is to place queens on a chess board in such as way as no queen can capture another one in a single move –Recall.
A Graph-based Friend Recommendation System Using Genetic Algorithm
CS 533 Information Retrieval Systems.  Introduction  Connectivity Analysis  Kleinberg’s Algorithm  Problems Encountered  Improved Connectivity Analysis.
Resisting Structural Re-identification in Anonymized Social Networks Michael Hay, Gerome Miklau, David Jensen, Don Towsley, Philipp Weis University of.
Xiaowei Ying, Xintao Wu Univ. of North Carolina at Charlotte PAKDD-09 April 28, Bangkok, Thailand On Link Privacy in Randomizing Social Networks.
“SybilGuard: Defending Against Sybil Attacks via Social Networks” Authors: Haifeng Yu, Phillip B. Gibbons, and Suman Nath (several slides based on authors’)
Xiaowei Ying, Xintao Wu Dept. Software and Information Systems Univ. of N.C. – Charlotte 2008 SIAM Conference on Data Mining, April 25 th Atlanta, Georgia.
Easiest-to-Reach Neighbor Search Fatimah Aldubaisi.
The new protocol of freenet Taken from Ian Clarke and Oskar Sandberg (The Freenet Project)
Topics Paths and Circuits (11.2) A B C D E F G.
SybilGuard: Defending Against Sybil Attacks via Social Networks.
Graphs and 2-Way Bounding Discrete Structures (CS 173) Madhusudan Parthasarathy, University of Illinois 1 /File:7_bridgesID.png.
Mining Graph Patterns Efficiently via Randomized Summaries Chen Chen, Cindy X. Lin, Matt Fredrikson, Mihai Christodorescu, Xifeng Yan, Jiawei Han VLDB’09.
Graph theory and networks. Basic definitions  A graph consists of points called vertices (or nodes) and lines called edges (or arcs). Each edge joins.
Preserving Privacy and Social Influence Isabelle Stanton.
Nathaniel Ley CIS235 Dec. 09, Why do we need Tor?  Encryption is not enough to ensure complete anonymity, since packet headers can still reveal.
Privacy Preserving in Social Network Based System PRENTER: YI LIANG.
Week 11 - Wednesday.  What did we talk about last time?  Graphs  Paths and circuits.
Lecture 5.3: Graph Isomorphism and Connectivity CS 250, Discrete Structures, Fall 2011 Nitesh Saxena *Adopted from previous lectures by Zeph Grunschlag.
1 Link Privacy in Social Networks Aleksandra Korolova, Rajeev Motwani, Shubha U. Nabar CIKM’08 Advisor: Dr. Koh, JiaLing Speaker: Li, HueiJyun Date: 2009/3/30.
GRAPH AND LINK MINING 1. Graphs - Basics 2 Undirected Graphs Undirected Graph: The edges are undirected pairs – they can be traversed in any direction.
Network Motif Discovery using Subgraph Enumeration and Symmetry-Breaking by Grochow and Kellis Wooyoung Kim 4/3/2009 CSc 8910 Analysis of Biological Network,
Minimum Spanning Tree 8/7/2018 4:26 AM
Community detection in graphs
The Importance of Communities for Learning to Influence
Chapter 15 Graph Theory © 2008 Pearson Addison-Wesley.
Bridges and Articulation Points
Concepts of Computation
Presentation transcript:

Anonymized Social Networks, Hidden Patterns, and Structural Stenography Lars Backstrom, Cynthia Dwork, Jon Kleinberg WWW 2007 – Best Paper

OUTLINE Problem Some graph theory Walk-Based Attack Cut-Based Attack (Semi)-Passive Attacks

PROBLEM Massive social network graphs exist  MySpace  FaceBook  Phone Records   Instant Messaging... Social network structure is valuable Just removing names isn't enough (we show this)‏

MOTIVATION Privacy concerns – who talks to who Economic concerns – selling to marketers AOL Search Data

GENERAL METHOD Watermark the graph so that finding the watermark allows us to find individuals Reveals the removed names Reveals edges between revealed names

WALK BASED ATTACK Create a subgraph S to embed Desired Properties of Subgraph  Doesn't already exist in the graph  Can be easily found  No non-trivial automorphisms (can't be mapped to itself beyond the identity)‏

WALK BASED ATTACK Let k = (2+d)logn be the number of nodes in the subgraph

x2x2 x3x3 x1x1 x4x4

WALK BASED ATTACK Let k = (2+d)logn be the number of nodes in the subgraph Pick W = {w 1...w b } users to target

x2x2 x3x3 x1x1 w1w1 w2w2 w3w3 x4x4

WALK BASED ATTACK Let k = (2+d)logn be the number of nodes in the subgraph Pick W = {w 1...w b } users to target Pick a unique set of nodes in the subgraph to connect to each w i

x2x2 x3x3 x1x1 w1w1 w2w2 w3w3 x4x4

WALK BASED ATTACK Let k = (2+d)logn be the number of nodes in the subgraph Pick W = {w 1...w b } users to target Pick a unique set of nodes in the subgraph to connect to each w i Pick an external degree for each x i and create additional spurious edges

x2x2 x3x3 x1x1 w1w1 w2w2 w3w3 x4x4

WALK BASED ATTACK Create the internal edges by including each edge (x i,x i+1 ). Include all other edges with probability ½ Theoretical result guarantees that w.h.p. this subgraph doesn't exist in G and has no automorphisms.

x2x2 x3x3 x1x1 w1w1 w2w2 w3w3 x4x4

FINDING THE SUBGRAPH Find all nodes with degree(x 1 )‏ Find all nodes connected to x 1 with degree(x 2 ). Repeat by building a tree With high probability the tree will be pruned to our embedded subgraph.

x2x2 x3x3 x1x1 w1w1 w2w2 w3w3 x4x4 d b c a e deg(x 1 ) = 5 deg(x 2 ) = 4 x2x2 w3w3 x3x3 x4x4 x1x1 deg(x 3 ) = 6 deg(x 4 ) = 7 w2w2

QUESTION What could we do to foil this attack?

Evaluation LJ Data = 4.4 mil people, 77 mil edges

EVALUATION Using 7 nodes the attack succeeds w.h.p Can attack nodes and ~ edges Our subgraph is not 'obvious' in the graph without the degree sequence

CUT-BASED ATTACK Requires O(√logn) nodes instead of O(logn) (theoretical lower bound)‏ Create a subgraph in a similar manner Each x 1 connects to one w i Use min-cut methods to find H Walk-based attack is better  This subgraph is highly disconnected = sticks out

(SEMI)-PASSIVE ATTACKS Walk and Cut based attacks are active Groups of users could also collude to execute an attack on their neighbors Experiments show this works for groups as small as 3 or 4 users How do you defend against this?

Questions?