Structural attack to anonymous graph of social networks

10Citations
Citations of this article
14Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

With the rapid development of social networks and its applications, the demand of publishing and sharing social network data for the purpose of commercial or research is increasing. However, the disclosure risks of sensitive information of social network users are also arising. The paper proposes an effective structural attack to deanonymize social graph data. The attack uses the cumulative degree of n-hop neighbors of a node as the regional feature and combines it with the simulated annealing-based graph matching method to explore the nodes reidentification in anonymous social graphs. The simulation results on two social network datasets show that the attack is feasible in the nodes reidentification in anonymous graphs including the simply anonymous graph, randomized graph and k-isomorphism graph. © 2013 Tieying Zhu et al.

Cite

CITATION STYLE

APA

Zhu, T., Wang, S., Li, X., Zhou, Z., & Zhang, R. (2013). Structural attack to anonymous graph of social networks. Mathematical Problems in Engineering, 2013. https://doi.org/10.1155/2013/237024

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free