anonymized social networks, hidden patterns, and structural stenography lars backstrom, cynthia...

25
Anonymized Social Networks, Hidden Patterns, and Structural Stenography Lars Backstrom, Cynthia Dwork, Jon Kleinberg WWW 2007 – Best Paper

Upload: linette-eaton

Post on 13-Dec-2015

223 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: Anonymized Social Networks, Hidden Patterns, and Structural Stenography Lars Backstrom, Cynthia Dwork, Jon Kleinberg WWW 2007 – Best Paper

Anonymized Social Networks,Hidden Patterns, and Structural Stenography

Lars Backstrom, Cynthia Dwork, Jon Kleinberg

WWW 2007 – Best Paper

Page 2: Anonymized Social Networks, Hidden Patterns, and Structural Stenography Lars Backstrom, Cynthia Dwork, Jon Kleinberg WWW 2007 – Best Paper

OUTLINE

Problem Some graph theory Walk-Based Attack Cut-Based Attack (Semi)-Passive Attacks

Page 3: Anonymized Social Networks, Hidden Patterns, and Structural Stenography Lars Backstrom, Cynthia Dwork, Jon Kleinberg WWW 2007 – Best Paper

PROBLEM

Massive social network graphs exist MySpace

FaceBook

Phone Records

Email

Instant Messaging...

Social network structure is valuable

Just removing names isn't enough (we show this)

Page 4: Anonymized Social Networks, Hidden Patterns, and Structural Stenography Lars Backstrom, Cynthia Dwork, Jon Kleinberg WWW 2007 – Best Paper

MOTIVATION

Privacy concerns – who talks to who Economic concerns – selling to marketers

AOL Search Data

Page 5: Anonymized Social Networks, Hidden Patterns, and Structural Stenography Lars Backstrom, Cynthia Dwork, Jon Kleinberg WWW 2007 – Best Paper

GENERAL METHOD

Watermark the graph so that finding the watermark allows us to find individuals

Reveals the removed names Reveals edges between revealed names

Page 6: Anonymized Social Networks, Hidden Patterns, and Structural Stenography Lars Backstrom, Cynthia Dwork, Jon Kleinberg WWW 2007 – Best Paper

WALK BASED ATTACK

Create a subgraph S to embed Desired Properties of Subgraph

Doesn't already exist in the graph

Can be easily found

No non-trivial automorphisms (can't be mapped to itself beyond the identity)

Page 7: Anonymized Social Networks, Hidden Patterns, and Structural Stenography Lars Backstrom, Cynthia Dwork, Jon Kleinberg WWW 2007 – Best Paper
Page 8: Anonymized Social Networks, Hidden Patterns, and Structural Stenography Lars Backstrom, Cynthia Dwork, Jon Kleinberg WWW 2007 – Best Paper

WALK BASED ATTACK

Let k = (2+d)logn be the number of nodes in the subgraph

Page 9: Anonymized Social Networks, Hidden Patterns, and Structural Stenography Lars Backstrom, Cynthia Dwork, Jon Kleinberg WWW 2007 – Best Paper

x2 x3

x1 x4

Page 10: Anonymized Social Networks, Hidden Patterns, and Structural Stenography Lars Backstrom, Cynthia Dwork, Jon Kleinberg WWW 2007 – Best Paper

WALK BASED ATTACK

Let k = (2+d)logn be the number of nodes in the subgraph

Pick W = {w1...wb} users to target

Page 11: Anonymized Social Networks, Hidden Patterns, and Structural Stenography Lars Backstrom, Cynthia Dwork, Jon Kleinberg WWW 2007 – Best Paper

x2 x3

x1

w1

w2

w3

x4

Page 12: Anonymized Social Networks, Hidden Patterns, and Structural Stenography Lars Backstrom, Cynthia Dwork, Jon Kleinberg WWW 2007 – Best Paper

WALK BASED ATTACK

Let k = (2+d)logn be the number of nodes in the subgraph

Pick W = {w1...wb} users to target

Pick a unique set of nodes in the subgraph to connect to each wi

Page 13: Anonymized Social Networks, Hidden Patterns, and Structural Stenography Lars Backstrom, Cynthia Dwork, Jon Kleinberg WWW 2007 – Best Paper

x2 x3

x1

w1

w2

w3

x4

Page 14: Anonymized Social Networks, Hidden Patterns, and Structural Stenography Lars Backstrom, Cynthia Dwork, Jon Kleinberg WWW 2007 – Best Paper

WALK BASED ATTACK

Let k = (2+d)logn be the number of nodes in the subgraph

Pick W = {w1...wb} users to target

Pick a unique set of nodes in the subgraph to connect to each wi

Pick an external degree for each xi

and create additional spurious edges

Page 15: Anonymized Social Networks, Hidden Patterns, and Structural Stenography Lars Backstrom, Cynthia Dwork, Jon Kleinberg WWW 2007 – Best Paper

x2 x3

x1

w1

w2

w3

x4

Page 16: Anonymized Social Networks, Hidden Patterns, and Structural Stenography Lars Backstrom, Cynthia Dwork, Jon Kleinberg WWW 2007 – Best Paper

WALK BASED ATTACK

Create the internal edges by including each edge (xi,xi+1).

Include all other edges with probability ½

Theoretical result guarantees that w.h.p. this subgraph doesn't exist in G and has no automorphisms.

Page 17: Anonymized Social Networks, Hidden Patterns, and Structural Stenography Lars Backstrom, Cynthia Dwork, Jon Kleinberg WWW 2007 – Best Paper

x2 x3

x1

w1

w2

w3

x4

Page 18: Anonymized Social Networks, Hidden Patterns, and Structural Stenography Lars Backstrom, Cynthia Dwork, Jon Kleinberg WWW 2007 – Best Paper

FINDING THE SUBGRAPH

Find all nodes with degree(x1)

Find all nodes connected to x1 with

degree(x2). Repeat by building a

tree With high probability the tree will be pruned to our embedded subgraph.

Page 19: Anonymized Social Networks, Hidden Patterns, and Structural Stenography Lars Backstrom, Cynthia Dwork, Jon Kleinberg WWW 2007 – Best Paper

x2 x3

x1 w1

w2

w3

x4

d

b

c

a

e

deg(x1) = 5 deg(x2) = 4

x2

w3

x3

x4

x1

deg(x3) = 6 deg(x4) = 7

w2

Page 20: Anonymized Social Networks, Hidden Patterns, and Structural Stenography Lars Backstrom, Cynthia Dwork, Jon Kleinberg WWW 2007 – Best Paper

QUESTION

What could we do to foil this attack?

Page 21: Anonymized Social Networks, Hidden Patterns, and Structural Stenography Lars Backstrom, Cynthia Dwork, Jon Kleinberg WWW 2007 – Best Paper

Evaluation

LJ Data = 4.4 mil people, 77 mil edges

Page 22: Anonymized Social Networks, Hidden Patterns, and Structural Stenography Lars Backstrom, Cynthia Dwork, Jon Kleinberg WWW 2007 – Best Paper

EVALUATION

Using 7 nodes the attack succeeds w.h.p

Can attack 34 - 70 nodes and ~560 - 2400 edges

Our subgraph is not 'obvious' in the graph without the degree sequence

Page 23: Anonymized Social Networks, Hidden Patterns, and Structural Stenography Lars Backstrom, Cynthia Dwork, Jon Kleinberg WWW 2007 – Best Paper

CUT-BASED ATTACK

Requires O(√logn) nodes instead of O(logn) (theoretical lower bound)

Create a subgraph in a similar manner

Each x1 connects to one wi

Use min-cut methods to find H Walk-based attack is better

This subgraph is highly disconnected = sticks out

Page 24: Anonymized Social Networks, Hidden Patterns, and Structural Stenography Lars Backstrom, Cynthia Dwork, Jon Kleinberg WWW 2007 – Best Paper

(SEMI)-PASSIVE ATTACKS

Walk and Cut based attacks are active

Groups of users could also collude to execute an attack on their neighbors

Experiments show this works for groups as small as 3 or 4 users

How do you defend against this?

Page 25: Anonymized Social Networks, Hidden Patterns, and Structural Stenography Lars Backstrom, Cynthia Dwork, Jon Kleinberg WWW 2007 – Best Paper

Questions?