Graph Data Anonymization, De-Anonymization Attacks, and De-Anonymizability Quantification: A Survey (Englisch)

In: IEEE Communications Surveys & Tutorials   ;  19 ,  2  ;  1305-1326  ;  2017

Wie erhalte ich diesen Titel?

Download
Kommerziell Vergütung an den Verlag: 27,65 € Grundgebühr: 4,00 € Gesamtpreis: 31,65 €
Akademisch Vergütung an den Verlag: 27,65 € Grundgebühr: 2,00 € Gesamtpreis: 29,65 €

Nowadays, many computer and communication systems generate graph data. Graph data span many different domains, ranging from online social network data from networks like Facebook to epidemiological data used to study the spread of infectious diseases. Graph data are shared regularly for many purposes including academic research and for business collaborations. Since graph data may be sensitive, data owners often use various anonymization techniques that often compromise the resulting utility of the anonymized data. To make matters worse, there are several state-of-the-art graph data de-anonymization attacks that have proven successful in recent years. In this paper, we survey the graph data anonymization, de-anonymization, and de-anonymizability quantification techniques in the past decade. Specifically, we systematically classify, summarize, and analyze state-of-the-art graph data anonymization, de-anonymization, and de-anonymizability quantification techniques. For existing graph data anonymization techniques, we classify them into six categories and analyze their utility performance with respect to 15 fundamental graph utility metrics and seven high-level application utility metrics. For existing de-anonymization attacks, we classify them into two categories and examine their performance with respect to scalability, practicability, robustness, etc. We also analyze the resistance of existing graph anonymization techniques against existing graph de-anonymizaiton attacks. For existing de-anonymizability quantifications, we classify them according to whether they consider seed information or not, and analyze them in terms of their soundness. Our analysis demonstrates that: 1) most anonymization schemes can partially or conditionally preserve most graph utility while losing some application utility and 2) state-of-the-art anonymization schemes are vulnerable to several or all of the emerging structure-based de-anonymization attacks. The actual vulnerability of each anonymization algorithm depends on how much and which data utility it preserves. Based on our summarization and analysis, we discuss the research evolution, future directions, and challenges in the research area of graph data anonymization, de-anonymization, and de-anonymizability quantification.

  • Titel:
    Graph Data Anonymization, De-Anonymization Attacks, and De-Anonymizability Quantification: A Survey
  • Autor / Urheber:
  • Erschienen in:
  • Verlag:
    IEEE
  • Erscheinungsjahr:
    2017
  • Format / Umfang:
    1199427 byte
  • ISSN:
  • DOI:
  • Medientyp:
    Aufsatz (Zeitschrift)
  • Format:
    Elektronische Ressource
  • Sprache:
    Englisch
  • Datenquelle:
  • Exportieren:
  • ORKG:

Inhaltsverzeichnis – Band 19, Ausgabe 2

Zeige alle Jahrgänge und Ausgaben

Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.

682
Editorial: Second Quarter 2017 IEEE Communications Surveys and Tutorials
Lin, Ying-Dar | 2017
688
5G: Adaptable Networks Enabled by Versatile Radio Access Technologies
Sexton, Conor / Kaminski, Nicholas J. / Marquez-Barja, Johann M. / Marchetti, Nicola / DaSilva, Luiz A. | 2017
721
Power-Domain Non-Orthogonal Multiple Access (NOMA) in 5G Systems: Potentials and Challenges
Riazul Islam, S. M. / Avazov, Nurilla / Dobre, Octavia A. / Kyung-sup Kwak, | 2017
743
Coordinated Multi-Point Clustering Schemes: A Survey
Bassoy, Selcuk / Farooq, Hasan / Imran, Muhammad A. / Imran, Ali | 2017
765
Jammer Localization in Multi-Hop Wireless Network: A Comprehensive Survey
Xianglin Wei, / Qiping Wang, / Tongxiang Wang, / Jianhua Fan, | 2017
800
Void-Handling Techniques for Routing Protocols in Underwater Sensor Networks: Survey and Challenges
Ghoreyshi, Seyed Mohammad / Shahrabi, Alireza / Boutaleb, Tuleen | 2017
828
A Survey of Network Lifetime Maximization Techniques in Wireless Sensor Networks
Yetgin, Halil / Cheung, Kent Tsz Kan / El-Hajjar, Mohammed / Hanzo, Lajos | 2017
855
Low Power Wide Area Networks: An Overview
Raza, Usman / Kulkarni, Parag / Sooriyabandara, Mahesh | 2017
874
An Ultra Wideband Survey: Global Regulations and Impulse Radio Research Based on Standards
Niemela, Ville / Haapola, Jussi / Hamalainen, Matti / Iinatti, Jari | 2017
891
A Survey on Large-Scale Software Defined Networking (SDN) Testbeds: Approaches and Challenges
Tao Huang, / Yu, F. Richard / Chen Zhang, / Jiang Liu, / Jiao Zhang, / Yunjie Liu, | 2017
918
A Survey on the Contributions of Software-Defined Networking to Traffic Engineering
Mendiola, Alaitz / Astorga, Jasone / Jacob, Eduardo / Higuero, Marivi | 2017
954
Resource Management in Cloud Networking Using Economic Analysis and Pricing Models: A Survey
Nguyen Cong Luong, / Ping Wang, / Niyato, Dusit / Yonggang Wen, / Zhu Han, | 2017
1002
A Survey on Replica Server Placement Algorithms for Content Delivery Networks
Sahoo, Jagruti / Salahuddin, Mohammad A. / Glitho, Roch / Elbiaze, Halima / Ajib, Wessam | 2017
1027
A Survey on Multiple-Antenna Techniques for Physical Layer Security
Xiaoming Chen, / Wing Kwan Ng, Derrick / Gerstacker, Wolfgang H. / Hsiao-Hwa Chen, | 2017
1054
Security and Privacy in Device-to-Device (D2D) Communication: A Review
Haus, Michael / Waqas, Muhammad / Ding, Aaron Yi / Yong Li, / Tarkoma, Sasu / Ott, Jorg | 2017
1080
Social Authentication Applications, Attacks, Defense Strategies and Future Research Directions: A Systematic Review
Alomar, Noura / Alsaleh, Mansour / Alarifi, Abdulrahman | 2017
1112
Network-Based Secret Communication in Clouds: A Survey
Ullrich, Johanna / Zseby, Tanja / Fabini, Joachim / Weippl, Edgar | 2017
1145
A Survey of Stealth Malware Attacks, Mitigation Measures, and Steps Toward Autonomous Open World Solutions
Rudd, Ethan M. / Rozsa, Andras / Gunther, Manuel / Boult, Terrance E. | 2017
1173
Network Utility Maximization-Based Congestion Control Over Wireless Networks: A Survey and Potential Directives
Quoc-Viet Pham, / Won-Joo Hwang, | 2017
1201
Instantly Decodable Network Coding: From Centralized to Device-to-Device Communications
Douik, Ahmed / Sorour, Sameh / Al-Naffouri, Tareq Y. / Alouini, Mohamed-Slim | 2017
1225
Sequence Sets in Wireless Communication Systems: A Survey
Velazquez-Gutierrez, Juan M. / Vargas-Rosales, Cesar | 2017
1249
Resource Allocation for Underlay Cognitive Radio Networks: A Survey
El Tanab, Manal / Hamouda, Walaa | 2017
1277
Advances on Spectrum Sensing for Cognitive Radio Networks: Theory and Applications
Ali, Abdelmohsen / Hamouda, Walaa | 2017
1305
Graph Data Anonymization, De-Anonymization Attacks, and De-Anonymizability Quantification: A Survey
Shouling Ji, / Mittal, Prateek / Beyah, Raheem | 2017
1327
Recent Advances in Indoor Localization: A Survey on Theoretical Approaches and Applications
Yassin, Ali / Nasser, Youssef / Awad, Mariette / Al-Dubai, Ahmed / Ran Liu, / Chau Yuen, / Raulefs, Ronald / Aboutanios, Elias | 2017
1347
A Survey of Selected Indoor Positioning Methods for Smartphones
Davidson, Pavel / Piche, Robert | 2017
C1
Table of contents
| 2017