Link Privacy in Social Networks
- 1 April 2008
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
- No. 10636382,p. 1355-1357
- https://doi.org/10.1109/icde.2008.4497554
Abstract
We consider a privacy threat to a social network in which the goal of an attacker is to obtain knowledge of a significant fraction of the links in the network. We formalize the typical social network interface and the information about links that it provides to its users in terms of lookahead. We consider a particular threat in which an attacker subverts user accounts to gain information about local neighborhoods in the network and pieces them together in order to build a global picture. We analyze, both experimentally and theoretically, the number of user accounts an attacker would need to subvert for a successful attack, as a function of his strategy for choosing users whose accounts to subvert and a function of the lookahead provided by the network. We conclude that such an attack is feasible in practice, and thus any social network that wishes to protect the link privacy of its users should take great care in choosing the lookahead of its interface, limiting it to 1 or 2, whenever possible.Keywords
This publication has 3 references indexed in Scilit:
- Wherefore art thou r3579x?Published by Association for Computing Machinery (ACM) ,2007
- A Random Graph Model for Power Law GraphsExperimental Mathematics, 2001
- Social Network AnalysisPublished by Cambridge University Press (CUP) ,1994