You are not logged in.

Vertex re-identification attack using neighbourhood-pair properties

Abawajy, Jemal, Ninggal, Mohd Izuan Hafez and Herawan, Tutut 2016, Vertex re-identification attack using neighbourhood-pair properties, Concurrency computation: practice and experience, vol. 28, no. 10, pp. 2906-2919, doi: 10.1002/cpe.3687.

Attached Files
Name Description MIMEType Size Downloads

Title Vertex re-identification attack using neighbourhood-pair properties
Author(s) Abawajy, Jemal
Ninggal, Mohd Izuan Hafez
Herawan, Tutut
Journal name Concurrency computation: practice and experience
Volume number 28
Issue number 10
Start page 2906
End page 2919
Total pages 14
Publisher Wiley
Place of publication London, Eng.
Publication date 2016-07
ISSN 1532-0626
1532-0634
Keyword(s) social network
vertex re-identification attack
privacy
neighbourhood-pair properties
Summary There has been a growing interest in sharing and mining social network data for a wide variety of applications. In this paper, we address the problem of privacy disclosure risks that arise from publishing social network data. Specifically, we look at the vertex re-identification attack that aims to link specific vertex in social network data to specific individual in the real world. We show that even when identifiable attributes such as names are removed from released social network data, re-identification attack is still possible by manipulating abstract information. We present a new type of vertex re-identification attack model called neighbourhood-pair attack. This attack utilizes the information about the local communities of two connected vertices to identify the target individual. We show both theoretically and empirically that the proposed attack provides higher re-identification rate compared with the existing re-identification attacks that also manipulate network structure properties. The experiments conducted also show that the proposed attack is still possible even on anonymised social network data.
Language eng
DOI 10.1002/cpe.3687
Field of Research 080303 Computer System Security
Socio Economic Objective 970108 Expanding Knowledge in the Information and Computing Sciences
HERDC Research category C1 Refereed article in a scholarly journal
ERA Research output type C Journal article
Copyright notice ©2016, Wiley
Persistent URL http://hdl.handle.net/10536/DRO/DU:30082849

Document type: Journal Article
Collection: School of Information Technology
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Versions
Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 0 times in TR Web of Science
Scopus Citation Count Cited 0 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 104 Abstract Views, 2 File Downloads  -  Detailed Statistics
Created: Thu, 14 Apr 2016, 15:52:44 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.