Fundamental Privacy Limits in Bipartite Networks under Active Attacks

06/09/2021
by   Mahshad Shariatnasab, et al.
0

This work considers active deanonymization of bipartite networks. The scenario arises naturally in evaluating privacy in various applications such as social networks, mobility networks, and medical databases. For instance, in active deanonymization of social networks, an anonymous victim is targeted by an attacker (e.g. the victim visits the attacker's website), and the attacker queries her group memberships (e.g. by querying the browser history) to deanonymize her. In this work, the fundamental limits of privacy, in terms of the minimum number of queries necessary for deanonymization, is investigated. A stochastic model is considered, where i) the bipartite network of group memberships is generated randomly, ii) the attacker has partial prior knowledge of the group memberships, and iii) it receives noisy responses to its real-time queries. The bipartite network is generated based on linear and sublinear preferential attachment, and the stochastic block model. The victim's identity is chosen randomly based on a distribution modeling the users' risk of being the victim (e.g. probability of visiting the website). An attack algorithm is proposed which builds upon techniques from communication with feedback, and its performance, in terms of expected number of queries, is analyzed. Simulation results are provided to verify the theoretical derivations.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
02/11/2022

Privacy Limits in Power-Law Bipartite Networks under Active Fingerprinting Attacks

This work considers the fundamental privacy limits under active fingerpr...
research
07/31/2021

Bipartite Graft III: General Case

This paper is a sequel of our previous paper (N. Kita: Bipartite graft I...
research
05/02/2019

Passive and active attackers in noiseless privacy

Differential privacy offers clear and strong quantitative guarantees for...
research
11/06/2020

Single-Node Attack for Fooling Graph Neural Networks

Graph neural networks (GNNs) have shown broad applicability in a variety...
research
09/24/2021

Evaluating X-vector-based Speaker Anonymization under White-box Assessment

In the scenario of the Voice Privacy challenge, anonymization is achieve...
research
05/11/2023

The Privacy-Utility Tradeoff in Rank-Preserving Dataset Obfuscation

Dataset obfuscation refers to techniques in which random noise is added ...
research
03/22/2022

ANOSY: Approximated Knowledge Synthesis with Refinement Types for Declassification

Non-interference is a popular way to enforce confidentiality of sensitiv...

Please sign up or login with your details

Forgot password? Click here to reset