Taming the Devil: Techniques for Evaluating Anonymized Network Data

NDSS(2008)

引用 66|浏览21
暂无评分
摘要
Anonymization plays a key role in enabling the pub- lic release of network datasets, and yet there are few, if any, techniques for evaluating the efficacy of network data anonymization techniques with respect to the pri- vacy they afford. In fact, recent work suggests that many state-of-the-art anonymization techniques may leak more information than first thought. In this pa- per, we propose techniques for evaluating the anonymity of network data. Specifically, we simulate the behavior of an adversary whose goal is to deanonymize objects, such as hosts or web pages, within the network data. By doing so, we are able to quantify the anonymity of the data using information theoretic metrics, objectively compare the efficacy of anonymization techniques, and examine the impact of selective deanonymization on the anonymity of the data. Moreover, we provide several concrete applications of our approach on real network data in the hope of underscoring its usefulness to data publishers.
更多
查看译文
关键词
web pages,computer science
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要