114,166 research outputs found
Quantification of De-anonymization Risks in Social Networks
The risks of publishing privacy-sensitive data have received considerable
attention recently. Several de-anonymization attacks have been proposed to
re-identify individuals even if data anonymization techniques were applied.
However, there is no theoretical quantification for relating the data utility
that is preserved by the anonymization techniques and the data vulnerability
against de-anonymization attacks.
In this paper, we theoretically analyze the de-anonymization attacks and
provide conditions on the utility of the anonymized data (denoted by anonymized
utility) to achieve successful de-anonymization. To the best of our knowledge,
this is the first work on quantifying the relationships between anonymized
utility and de-anonymization capability. Unlike previous work, our
quantification analysis requires no assumptions about the graph model, thus
providing a general theoretical guide for developing practical
de-anonymization/anonymization techniques.
Furthermore, we evaluate state-of-the-art de-anonymization attacks on a
real-world Facebook dataset to show the limitations of previous work. By
comparing these experimental results and the theoretically achievable
de-anonymization capability derived in our analysis, we further demonstrate the
ineffectiveness of previous de-anonymization attacks and the potential of more
powerful de-anonymization attacks in the future.Comment: Published in International Conference on Information Systems Security
and Privacy, 201
Measuring social dynamics in a massive multiplayer online game
Quantification of human group-behavior has so far defied an empirical,
falsifiable approach. This is due to tremendous difficulties in data
acquisition of social systems. Massive multiplayer online games (MMOG) provide
a fascinating new way of observing hundreds of thousands of simultaneously
socially interacting individuals engaged in virtual economic activities. We
have compiled a data set consisting of practically all actions of all players
over a period of three years from a MMOG played by 300,000 people. This
large-scale data set of a socio-economic unit contains all social and economic
data from a single and coherent source. Players have to generate a virtual
income through economic activities to `survive' and are typically engaged in a
multitude of social activities offered within the game. Our analysis of
high-frequency log files focuses on three types of social networks, and tests a
series of social-dynamics hypotheses. In particular we study the structure and
dynamics of friend-, enemy- and communication networks. We find striking
differences in topological structure between positive (friend) and negative
(enemy) tie networks. All networks confirm the recently observed phenomenon of
network densification. We propose two approximate social laws in communication
networks, the first expressing betweenness centrality as the inverse square of
the overlap, the second relating communication strength to the cube of the
overlap. These empirical laws provide strong quantitative evidence for the Weak
ties hypothesis of Granovetter. Further, the analysis of triad significance
profiles validates well-established assertions from social balance theory. We
find overrepresentation (underrepresentation) of complete (incomplete) triads
in networks of positive ties, and vice versa for networks of negative ties...Comment: 23 pages 19 figure
On analysis of complex network dynamics – changes in local topology
Social networks created based on data gathered in various computer systems are structures that constantly evolve. The nodes and their connections change because they are influenced by the external to the network events.. In this work we present a new approach to the description and quantification of patterns of complex dynamic social networks illustrated with the data from the Wroclaw University of Technology email dataset. We propose an approach based on discovery of local network connection patterns (in this case triads of nodes) as well as we measure and analyse their transitions during network evolution. We define the Triad Transition Matrix (TTM) containing the probabilities of transitions between triads, after that we show how it can help to discover the dynamic patterns of network evolution. One of the main issues when investigating the dynamical process is the selection of the time window size. Thus, the goal of this paper is also to investigate how the size of time window influences the shape of TTM and how the dynamics of triad number change depending on the window size. We have shown that, however the link stability in the network is low, the dynamic network evolution pattern expressed by the TTMs is relatively stable, and thus forming a background for fine-grained classification of complex networks dynamics. Our results open also vast possibilities of link and structure prediction of dynamic networks. The future research and applications stemming from our approach are also proposed and discussed
Comparison of contact patterns relevant for transmission of respiratory pathogens in Thailand and the Netherlands using respondent-driven sampling
Understanding infection dynamics of respiratory diseases requires the identification and quantification of behavioural, social and environmental factors that permit the transmission of these infections between humans. Little empirical information is available about contact patterns within real-world social networks, let alone on differences in these contact networks between populations that differ considerably on a socio-cultural level. Here we compared contact network data that were collected in the Netherlands and Thailand using a similar online respondent-driven method. By asking participants to recruit contact persons we studied network links relevant for the transmission of respiratory infections. We studied correlations between recruiter and recruited contacts to investigate mixing patterns in the observed social network components. In both countries, mixing patterns were assortative by demographic variables and random by total numbers of contacts. However, in Thailand participants reported overall more contacts which resulted in higher effective contact rates. Our findings provide new insights on numbers of contacts and mixing patterns in two different populations. These data could be used to improve parameterisation of mathematical models used to design control strategies. Although the spread of infections through populations depends on more factors, found similarities suggest that spread may be similar in the Netherlands and Thailand
- …