Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2994620.2994629acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

On Profile Linkability despite Anonymity in Social Media Systems

Published: 24 October 2016 Publication History

Abstract

A number of works have recently shown that the privacy offered by pseudonymous identities on social media systems like Twitter or Reddit is threatened by cross-site identity linking attacks. Such attacks link the identities of the same user across websites. Therefore, assessing linkability, i.e., the risk that identities are linked across different websites, remains an important open problem. In this work, we analyze whether anonymity within a single social media site can protect a user from being linked across sites. To this end, we first introduce a relative linkability measure ranking identities within a social media site by their anonymity. We show that anonymity alone is not sufficient to assess linkability risks, by evaluating this measure on a data set comprising 15 million comments gathered from the Reddit social media system.
Second, we mitigate this insufficiency and present our absolute linkability measure, which in addition utilizes information about matching identities. Then, we confirm the validity of this measure on our data set. The measure is able to accurately assess the linkability risk in almost 75% of the cases and, more importantly, is shown to never underestimate the linkability risk.

References

[1]
The online social network reddit. http://www.reddit.com. Accessed Nov 2014.
[2]
Spokeo. http://www.spokeo.com/.
[3]
Alessandro Acquisti, Ralph Gross, and Fred Stutzman. Face recognition and privacy in the age of augmented reality. Journal of Privacy and Confidentiality, 6(2):1, 2014.
[4]
Sadia Afroz, Michael Brennan, and Rachel Greenstadt. Detecting Hoaxes, Frauds, and Deception in Writing Style Online. In Proceedings of the 33rd IEEE Symposium on Security and Privacy (S&P), pages 461--475, 2012.
[5]
Michael Backes, Pascal Berrang, Oana Goga, Krishna Gummadi, and Praveen Manoharan. On Estimating Linkability through Anonymity in Social Media Systems - Supplementary Material. https://infsec.cs.uni-saarland.de/projects/reddit_anonymity/.
[6]
Michael Backes, Pascal Berrang, and Praveen Manoharan. From Closed-world Enforcement to Open-world Assessment of Privacy. http://arxiv.org/abs/1502.03346, 2016. eprint arXiv:1502.03346 -- cs.CR.
[7]
Alket Cecaj, Marco Mamei, and Franco Zambonelli. Re-identification and information fusion between anonymized cdr and social network data. Journal of Ambient Intelligence and Humanized Computing, pages 1--14, 2015.
[8]
James Cheng, Ada Wai-chee Fu, and Jia Liu. k-isomorphism: Privacy Preserving Network Publication Against Structural Attacks. In Proceedings of the 2010 ACM SIGMOD International Conference on Management of Data (SIGMOD), pages 459--470, 2010.
[9]
Cynthia Dwork. Differential Privacy. In Proceedings of the 33rd International Coloqium on Automata, Languages and Programming (ICALP), pages 1--12, 2006.
[10]
Dominik M. Endres and Johannes E. Schindelin. A new metric for probability distributions. IEEE Transactions on Information Theory, 49(7):1858--1860, 2003.
[11]
Oana Goga, Howard Lei, SHK. Parthasarathi, Gerald Friedland, Robin Sommer, and Renata Teixeira. Exploiting innocuous activity for correlating users across sites. In Proceedings of the 22nd International Conference on World Wide Web (WWW), 2013.
[12]
Oana Goga, Patrick Loiseau, Robin Sommer, Renata Teixeira, and Krishna P. Gummadi. On the reliability of profile matching across large online social networks. In Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD), 2015.
[13]
Tereza Iofciu, Peter Fankhauser, Fabian Abel, and Kerstin Bischoff. Identifying users across social tagging systems. In Proceedings of the 5th International Conference on Weblogs and Social Media (ICWSM), 2011.
[14]
Nitish Korula and Silvio Lattanzi. An efficient reconciliation algorithm for social networks. Proceedings of the VLDB Endowment, 7(5):377--388, 2014.
[15]
Sebastian Labitzke, Irina Taranu, and Hannes Hartenstein. What your friends tell others about you: Low cost linkability of social network profiles. In Proceedings of the 5th International ACM Workshop on Social Network Mining and Analysis (SNA-KDD), 2011.
[16]
Ninghui Li and Tiancheng Li. t-closeness: Privacy beyond k-anonymity and l-diversity. In Proceedings of the 23rd International Conference on Data Engineering (ICDE), 2007.
[17]
Ashwin Machanavajjhala, Daniel Kifer, Johannes Gehrke, and Muthuramakrishnan Venkitasubramaniam. L-Diversity: Privacy Beyond K-anonymity. ACM Transactions on Knowledge Discovery from Data (TKDD), 1(1), 2007.
[18]
Mishari Al Mishari and Gene Tsudik. Exploring linkability of user reviews. In Proceedings of the 17th European Symposium on Research in Computer Security (ESORICS), 2012.
[19]
Arvind Narayanan and Vitaly Shmatikov. De-anonymizing Social Networks. In Proceedings of the 30th IEEE Symposium on Security and Privacy (S&P), pages 173--187, 2009.
[20]
Carlton T Northern and Michael L Nelson. An unsupervised approach to discovering and disambiguating social media profiles. In Proceedings of the 2011 Workshop on Mining Data Semantics (MDS), 2011.
[21]
Daniele Perito, Claude Castelluccia, Mohamed Ali Kâafar, and Pere Manils. How Unique and Traceable Are Usernames? In Proceedings of the 10th International Symposium on Privacy Enhancing Technologies (PETS), 2011.
[22]
Andreas Pfitzmann and Marit Hansen. A terminology for talking about privacy by data minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management. http://dud.inf.tu-dresden.de/literatur/Anon_Terminology_v0.34.pdf, 2010. v0.34.
[23]
Yanir Seroussi, Ingrid Zukerman, and Fabian Bohnert. Authorship attribution with topic models. Computational Linguistics, 40(2):269--310, 2014.
[24]
Latanya Sweeney. K-Anonymity: A Model for Protecting Privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 10(5):557--570, 2002.
[25]
Gae-won You, Seung-won Hwang, Zaiqing Nie, and Ji-Rong Wen. Socialsearch: enhancing entity search with social network matching. In Proceedings of the 14th International ACM Conference on Extending Database Technology (EDBT), 2011.
[26]
Bin Zhou and Jian Pei. The k-anonymity and l-diversity approaches for privacy preservation in social networks against neighborhood attacks. Knowledge and Information Systems, 28(1):47--77, 2011.

Cited By

View all
  • (2024)User Identity Linkage on Social Networks: A Review of Modern Techniques and ApplicationsIEEE Access10.1109/ACCESS.2024.350037412(171241-171268)Online publication date: 2024
  • (2023)The access control double bind: How everyday interfaces regulate access and privacy, enable surveillance, and enforce identityConvergence: The International Journal of Research into New Media Technologies10.1177/1354856523119370630:3(1186-1218)Online publication date: 19-Aug-2023
  • (2023)Enhancing the Unlinkability of Circuit-Based Anonymous Communications with k-FunnelsProceedings of the ACM on Networking10.1145/36291401:CoNEXT3(1-26)Online publication date: 28-Nov-2023
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
WPES '16: Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society
October 2016
198 pages
ISBN:9781450345699
DOI:10.1145/2994620
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 24 October 2016

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. anonymity
  2. linkability
  3. social media systems

Qualifiers

  • Research-article

Funding Sources

Conference

CCS'16
Sponsor:

Acceptance Rates

WPES '16 Paper Acceptance Rate 14 of 72 submissions, 19%;
Overall Acceptance Rate 106 of 355 submissions, 30%

Upcoming Conference

CCS '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)43
  • Downloads (Last 6 weeks)2
Reflects downloads up to 25 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)User Identity Linkage on Social Networks: A Review of Modern Techniques and ApplicationsIEEE Access10.1109/ACCESS.2024.350037412(171241-171268)Online publication date: 2024
  • (2023)The access control double bind: How everyday interfaces regulate access and privacy, enable surveillance, and enforce identityConvergence: The International Journal of Research into New Media Technologies10.1177/1354856523119370630:3(1186-1218)Online publication date: 19-Aug-2023
  • (2023)Enhancing the Unlinkability of Circuit-Based Anonymous Communications with k-FunnelsProceedings of the ACM on Networking10.1145/36291401:CoNEXT3(1-26)Online publication date: 28-Nov-2023
  • (2023)The Impact of Linkability On Privacy LeakageProceedings of the International Conference on Advances in Social Networks Analysis and Mining10.1145/3625007.3627832(364-370)Online publication date: 6-Nov-2023
  • (2022)Consent in the Age of AR: Investigating The Comfort With Displaying Personal Information in Augmented RealityProceedings of the 2022 CHI Conference on Human Factors in Computing Systems10.1145/3491102.3502140(1-14)Online publication date: 29-Apr-2022
  • (2022)Disguising Reddit sources and the efficacy of ethical researchEthics and Information Technology10.1007/s10676-022-09663-w24:3Online publication date: 10-Sep-2022
  • (2021)An Identity Privacy Protection Scheme in LTE-WLAN Heterogeneous Converged NetworkIEEE Access10.1109/ACCESS.2021.30808399(78356-78367)Online publication date: 2021
  • (2021)Matching user accounts with spatio-temporal awareness across social networksInformation Sciences10.1016/j.ins.2021.04.030570(1-15)Online publication date: Sep-2021
  • (2021)Tuser3: A Profile Matching Based Algorithm Across Three Heterogeneous Social NetworksAdvanced Data Mining and Applications10.1007/978-3-030-65390-3_16(191-206)Online publication date: 6-Jan-2021
  • (2020)A Global Optimal Model for Protecting PrivacyWireless Personal Communications10.1007/s11277-020-07110-xOnline publication date: 22-Jan-2020
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media