“…This example emphasizes the need to transform the original social network dataset
to a dataset
before publication so as to avoid the association of specific records to particular persons. Backstrom et al
22 show that removing the attribute of username is not sufficient to protect users from the attack; with certain background knowledge, the adversary is still able to obtain sensitive information. In addition, such background knowledge can be easily obtained from personal social network accounts or some other related websites.…”