Download presentation
Presentation is loading. Please wait.
Published byLinette Eaton Modified over 9 years ago
1
Anonymized Social Networks, Hidden Patterns, and Structural Stenography Lars Backstrom, Cynthia Dwork, Jon Kleinberg WWW 2007 – Best Paper
2
OUTLINE Problem Some graph theory Walk-Based Attack Cut-Based Attack (Semi)-Passive Attacks
3
PROBLEM Massive social network graphs exist MySpace FaceBook Phone Records Email Instant Messaging... Social network structure is valuable Just removing names isn't enough (we show this)
4
MOTIVATION Privacy concerns – who talks to who Economic concerns – selling to marketers AOL Search Data
5
GENERAL METHOD Watermark the graph so that finding the watermark allows us to find individuals Reveals the removed names Reveals edges between revealed names
6
WALK BASED ATTACK Create a subgraph S to embed Desired Properties of Subgraph Doesn't already exist in the graph Can be easily found No non-trivial automorphisms (can't be mapped to itself beyond the identity)
8
WALK BASED ATTACK Let k = (2+d)logn be the number of nodes in the subgraph
9
x2x2 x3x3 x1x1 x4x4
10
WALK BASED ATTACK Let k = (2+d)logn be the number of nodes in the subgraph Pick W = {w 1...w b } users to target
11
x2x2 x3x3 x1x1 w1w1 w2w2 w3w3 x4x4
12
WALK BASED ATTACK Let k = (2+d)logn be the number of nodes in the subgraph Pick W = {w 1...w b } users to target Pick a unique set of nodes in the subgraph to connect to each w i
13
x2x2 x3x3 x1x1 w1w1 w2w2 w3w3 x4x4
14
WALK BASED ATTACK Let k = (2+d)logn be the number of nodes in the subgraph Pick W = {w 1...w b } users to target Pick a unique set of nodes in the subgraph to connect to each w i Pick an external degree for each x i and create additional spurious edges
15
x2x2 x3x3 x1x1 w1w1 w2w2 w3w3 x4x4
16
WALK BASED ATTACK Create the internal edges by including each edge (x i,x i+1 ). Include all other edges with probability ½ Theoretical result guarantees that w.h.p. this subgraph doesn't exist in G and has no automorphisms.
17
x2x2 x3x3 x1x1 w1w1 w2w2 w3w3 x4x4
18
FINDING THE SUBGRAPH Find all nodes with degree(x 1 ) Find all nodes connected to x 1 with degree(x 2 ). Repeat by building a tree With high probability the tree will be pruned to our embedded subgraph.
19
x2x2 x3x3 x1x1 w1w1 w2w2 w3w3 x4x4 d b c a e deg(x 1 ) = 5 deg(x 2 ) = 4 x2x2 w3w3 x3x3 x4x4 x1x1 deg(x 3 ) = 6 deg(x 4 ) = 7 w2w2
20
QUESTION What could we do to foil this attack?
21
Evaluation LJ Data = 4.4 mil people, 77 mil edges
22
EVALUATION Using 7 nodes the attack succeeds w.h.p Can attack 34 - 70 nodes and ~560 - 2400 edges Our subgraph is not 'obvious' in the graph without the degree sequence
23
CUT-BASED ATTACK Requires O(√logn) nodes instead of O(logn) (theoretical lower bound) Create a subgraph in a similar manner Each x 1 connects to one w i Use min-cut methods to find H Walk-based attack is better This subgraph is highly disconnected = sticks out
24
(SEMI)-PASSIVE ATTACKS Walk and Cut based attacks are active Groups of users could also collude to execute an attack on their neighbors Experiments show this works for groups as small as 3 or 4 users How do you defend against this?
25
Questions?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.