TY - GEN
T1 - Optimal de-anonymization in random graphs with community structure
AU - Onaran, Efe
AU - Garg, Siddharth
AU - Erkip, Elza
N1 - Publisher Copyright:
© 2016 IEEE.
PY - 2017/2/7
Y1 - 2017/2/7
N2 - Social network connectivity data that is anonymized and publicized for academic or commercial purposes are often vulnerable to de-anonymization attacks from attackers utilizing side information in the form of a second, public or crawled social network. Correlation between the two networks is the key factor allowing this attack scheme to work successfully. In this work, the best attack strategy available to de-anonymization attacker, namely the maximum a posteriori (MAP) estimate of the user identities, is identified for networks with community structure and sufficient conditions for perfect de-anonymization are obtained.
AB - Social network connectivity data that is anonymized and publicized for academic or commercial purposes are often vulnerable to de-anonymization attacks from attackers utilizing side information in the form of a second, public or crawled social network. Correlation between the two networks is the key factor allowing this attack scheme to work successfully. In this work, the best attack strategy available to de-anonymization attacker, namely the maximum a posteriori (MAP) estimate of the user identities, is identified for networks with community structure and sufficient conditions for perfect de-anonymization are obtained.
UR - http://www.scopus.com/inward/record.url?scp=85015245607&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85015245607&partnerID=8YFLogxK
U2 - 10.1109/SARNOF.2016.7846734
DO - 10.1109/SARNOF.2016.7846734
M3 - Conference contribution
AN - SCOPUS:85015245607
T3 - 37th IEEE Sarnoff Symposium, Sarnoff 2016
BT - 37th IEEE Sarnoff Symposium, Sarnoff 2016
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 37th IEEE Sarnoff Symposium, Sarnoff 2016
Y2 - 19 September 2016 through 21 September 2016
ER -