2018
DOI: 10.1186/s13638-018-1291-2
|View full text |Cite
|
Sign up to set email alerts
|

Understanding structure-based social network de-anonymization techniques via empirical analysis

Abstract: The rapid development of wellness smart devices and apps, such as Fitbit Coach and FitnessGenes, has triggered a wave of interaction on social networks. People communicate with and follow each other based on their wellness activities. Though such IoT devices and data provide a good motivation, they also expose users to threats due to the privacy leakage of social networks. Anonymization techniques are widely adopted to protect users' privacy during social data publishing and sharing. However, de-anonymization … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
6
0
1

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(7 citation statements)
references
References 33 publications
0
6
0
1
Order By: Relevance
“…Ghazinour et al 50 have shown that users' identities can be exposed easily by tracking session cookies. By proposing a new technique of de-anonymization attack, Mao et al 51 demonstrate that by analyzing the group membership data, an attacker can identify a user easily in the OSN.…”
Section: Traditional Attacksmentioning
confidence: 99%
“…Ghazinour et al 50 have shown that users' identities can be exposed easily by tracking session cookies. By proposing a new technique of de-anonymization attack, Mao et al 51 demonstrate that by analyzing the group membership data, an attacker can identify a user easily in the OSN.…”
Section: Traditional Attacksmentioning
confidence: 99%
“…When storing sensitive data like personal health records to cloud servers, the security and privacy of these data are still challenges in the fog computing paradigm [10][11][12]. To solve this problem, applying access control mechanism is an essential method to protect the sensitive data from unauthorized users.…”
Section: Introductionmentioning
confidence: 99%
“…Moreover, inspired by graph matching and network alignment, structure prediction based de-anonymization methods are defined to match the accounts across networks for user identity identification [23]- [26]. More information about structure prediction based graph de-anonymization methods can be found in the survey paper [27]. Therefore, in the necessity of privacy protection and preventing prediction-based inference attacks, the study of structural predictability optimization, i.e., regulating the inherent difficulty of structure prediction in networks independent of specific algorithms, is urgently need.…”
Section: Introductionmentioning
confidence: 99%