计算机科学
次线性函数
二部图
身份(音乐)
计算机安全
社交网络(社会语言学)
理论计算机科学
块(置换群论)
万维网
社会化媒体
数学
离散数学
几何学
声学
物理
图形
作者
Mahshad Shariatnasab,Farhad Shirani,Elza Erkip
标识
DOI:10.1109/jsac.2022.3142299
摘要
This work considers active deanonymization of bipartite networks. The scenario arises naturally in evaluating privacy in various applications such as social networks, mobility networks, and medical databases. For instance, in active deanonymization of social networks, an anonymous victim is targeted by an attacker (e.g. the victim visits the attacker’s website), and the attacker queries her group memberships (e.g. by querying the browser history) to deanonymize her. In this work, the fundamental limits of privacy, in terms of the minimum number of queries necessary for deanonymization, is investigated. A stochastic model is considered, where 1) the bipartite network of group memberships is generated randomly; 2) the attacker has partial prior knowledge of the group memberships; and 3) it receives noisy responses to its real-time queries. The bipartite network is generated based on linear and sublinear preferential attachment, and the stochastic block model. The victim’s identity is chosen randomly based on a distribution modeling the users’ risk of being the victim (e.g. probability of visiting the website). An attack algorithm is proposed which builds upon techniques from communication with feedback, and its performance, in terms of expected number of queries, is analyzed. Simulation results are provided to verify the theoretical derivations.
科研通智能强力驱动
Strongly Powered by AbleSci AI