Indiana University-Purdue University Indianapolis (IUPUI) / Digital traces left by a user of an on-line social networking service can be abused by a malicious party to compromise the person’s privacy. This is exacerbated by the increasing overlap in user-bases among various services.
To demonstrate the feasibility of abuse and raise public awareness of this issue,
I propose an algorithm, Seed and Grow, to identify users from an anonymized social
graph based solely on graph structure. The algorithm first identifies a seed sub-graph either planted by an attacker or divulged by collusion of a small group of users, and then grows the seed larger based on the attacker’s existing knowledge of the users’ social relations.
This work identifies and relaxes implicit assumptions taken by previous works,
eliminates arbitrary parameters, and improves identification effectiveness and accuracy. Experiment results on real-world collected datasets further corroborate my expectation and claim.
Identifer | oai:union.ndltd.org:IUPUI/oai:scholarworks.iupui.edu:1805/2884 |
Date | 07 August 2012 |
Creators | Peng, Wei |
Contributors | Li, Feng, Zou, Xukai, 1963-, Xia, Yuni |
Source Sets | Indiana University-Purdue University Indianapolis |
Language | en_US |
Detected Language | English |
Page generated in 0.0014 seconds