Structural Vulnerabilities And Link Privacy

1845 Words Apr 6th, 2015 8 Pages
Structural vulnerabilities and Link Privacy in Social Networks
Introduction/Background:
In social networks, a link represents a relationship between two nodes in the network. These links can represent email conversations, web surfing, co-purchases of two or more products (e.g. Amazon), friendships (e.g. Facebook), followers (e.g. Twitter), etc. Often times these relationships are sensitive and/or confidential in nature [ying-wu] and the users are operating under the assumption that their private relationships will not be disclosed.
In recent years the amount of data accumulated from social networks has become very large, and there is a lot of valuable information to gain from analyzing and applying data mining to social network data. Although it is easy to omit the unique identifiers of the nodes when supplying data for analysis, there are still many ways in which user’s identities can be revealed through exploiting the structure of the social network graph [fard-wang]. A common way of preventing attackers from exploiting such structural vulnerabilities is to create a new graph in which k true edges have been replaced with k false edges, making it difficult for the adversary to know whether or not a link between two users is authentic. This method, however usable, has some significant weaknesses depending on the application the data is being used for [fard-wang][ying-wu][fard-wang-yu], and typically link privacy comes at the cost of usability. We focus this section on the…
Open Document