Improving Privacy in Graphs Through Node Addition

10/19/2019
by   Nazanin Takbiri, et al.
0

The rapid growth of computer systems which generate graph data necessitates employing privacy-preserving mechanisms to protect users' identity. Since structure-based de-anonymization attacks can reveal users' identity's even when the graph is simply anonymized by employing naive ID removal, recently, k-anonymity is proposed to secure users' privacy against the structure-based attack. Most of the work ensured graph privacy using fake edges, however, in some applications, edge addition or deletion might cause a significant change to the key property of the graph. Motivated by this fact, in this paper, we introduce a novel method which ensures privacy by adding fake nodes to the graph. First, we present a novel model which provides k-anonymity against one of the strongest attacks: seed-based attack. In this attack, the adversary knows the partial mapping between the main graph and the graph which is generated using the privacy-preserving mechanisms. We show that even if the adversary knows the mapping of all of the nodes except one, the last node can still have k-anonymity privacy. Then, we turn our attention to the privacy of the graphs generated by inter-domain routing against degree attacks in which the degree sequence of the graph is known to the adversary. To ensure the privacy of networks against this attack, we propose a novel method which tries to add fake nodes in a way that the degree of all nodes have the same expected value.

READ FULL TEXT
research
12/04/2019

Leveraging Prior Knowledge Asymmetries in the Design of Location Privacy-Preserving Mechanisms

The prevalence of mobile devices and Location-Based Services (LBS) neces...
research
09/27/2021

Query-based Adversarial Attacks on Graph with Fake Nodes

While deep neural networks have achieved great success on the graph anal...
research
09/27/2018

Asymptotic Loss in Privacy due to Dependency in Gaussian Traces

Rapid growth of the Internet of Things (IoT) necessitates employing priv...
research
06/22/2021

NetFense: Adversarial Defenses against Privacy Attacks on Neural Networks for Graph Data

Recent advances in protecting node privacy on graph data and attacking g...
research
12/23/2019

Privacy Attacks on Network Embeddings

Data ownership and data protection are increasingly important topics wit...
research
10/25/2018

Attack Graph Convolutional Networks by Adding Fake Nodes

Graph convolutional networks (GCNs) have been widely used for classifyin...
research
11/06/2018

Defeating the Downgrade Attack on Identity Privacy in 5G

3GPP Release 15, the first 5G standard, includes protection of user iden...

Please sign up or login with your details

Forgot password? Click here to reset