Preserving Link Privacy in Social Network Based Systems

作者: Charalampos Papamanthou , Prateek Mittal , Dawn Song

DOI:

关键词:

摘要: A growing body of research leverages social network based trust relationships to improve the functionality system. However, these systems expose users' relationships, which is considered sensitive information in today's society, an adversary. In this work, we make following contributions. First, propose algorithm that perturbs structure a graph order provide link privacy, at cost slight reduction utility graph. Second define general metrics for characterizing and privacy perturbed graphs. Third, evaluate our proposed using real world Finally, demonstrate applicability perturbation on broad range secure systems, including Sybil defenses routing.

参考文章(27)
Xuesong Lu, Yi Song, Stéphane Bressan, Fast Identity Anonymization on Graphs Lecture Notes in Computer Science. pp. 281- 295 ,(2012) , 10.1007/978-3-642-32600-4_21
Xiaowei Ying, Xintao Wu, Randomizing Social Networks: a Spectrum Preserving Approach. siam international conference on data mining. pp. 739- 750 ,(2008)
Peter Druschel, Krishna P. Gummadi, Alan Mislove, Ansley Post, Ostra: leveraging trust to thwart unwanted communication networked systems design and implementation. pp. 15- 30 ,(2008)
John R. Douceur, The Sybil Attack international workshop on peer to peer systems. pp. 251- 260 ,(2002) , 10.1007/3-540-45748-8_24
Elena Zheleva, Lise Getoor, Preserving the privacy of sensitive relationships in graph data knowledge discovery and data mining. pp. 153- 171 ,(2007) , 10.1007/978-3-540-78478-4_9
George Danezis, Prateek Mittal, SybilInfer: Detecting Sybil Nodes using Social Networks. network and distributed system security symposium. ,(2009)
J. A. Pouwelse, A. Iosup, P. Garbacki, D. H. J. Epema, H. J. Sips, M. R. van Steen, M. Reinders, J. Yang, J. Wang, A. Bakker, TRIBLER: a social-based peer-to-peer system: Research Articles Concurrency and Computation: Practice and Experience. ,vol. 20, pp. 127- 138 ,(2008) , 10.1002/CPE.V20:2
George Danezis, Claudia Diaz, Carmela Troncoso, Ben Laurie, Drac: an architecture for anonymous low-volume communications privacy enhancing technologies. pp. 202- 219 ,(2010) , 10.1007/978-3-642-14527-8_12
Lakshminarayanan Subramanian, Jinyang Li, Nguyen Tran, Bonan Min, Sybil-resilient online content voting networked systems design and implementation. pp. 15- 28 ,(2009)
Prateek Mittal, Matthew Caesar, Nikita Borisov, X-Vine: Secure and Pseudonymous Routing Using Social Networks arXiv: Cryptography and Security. ,(2011)