{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,5]],"date-time":"2025-07-05T04:46:45Z","timestamp":1751690805606,"version":"3.41.0"},"publisher-location":"Cham","reference-count":61,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319318103"},{"type":"electronic","value":"9783319318110"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-31811-0_3","type":"book-chapter","created":{"date-parts":[[2016,4,1]],"date-time":"2016-04-01T10:59:22Z","timestamp":1459508362000},"page":"36-51","source":"Crossref","is-referenced-by-count":7,"title":["A Literature Survey and Classifications on Data Deanonymisation"],"prefix":"10.1007","author":[{"given":"Dalal","family":"Al-Azizy","sequence":"first","affiliation":[]},{"given":"David","family":"Millard","sequence":"additional","affiliation":[]},{"given":"Iraklis","family":"Symeonidis","sequence":"additional","affiliation":[]},{"given":"Kieron","family":"O\u2019Hara","sequence":"additional","affiliation":[]},{"given":"Nigel","family":"Shadbolt","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,4,2]]},"reference":[{"key":"3_CR1","doi-asserted-by":"crossref","unstructured":"Ding, X., Zhang, L., Wan, Z., Gu, M.: A brief survey on de-anonymization attacks. In: Online Social Networks, in International Conference on Computational Aspects of Social Networks, pp. 611\u2013615 (2010)","DOI":"10.1109\/CASoN.2010.139"},{"issue":"12","key":"3_CR2","doi-asserted-by":"publisher","first-page":"e28071","DOI":"10.1371\/journal.pone.0028071","volume":"6","author":"K Emam El","year":"2011","unstructured":"El Emam, K., Jonker, E., Arbuckle, L., Malin, B.: A systematic review of re-identification attacks on health data. PLoS ONE 6(12), e28071 (2011)","journal-title":"PLoS ONE"},{"issue":"1","key":"3_CR3","first-page":"51","volume":"1","author":"S Sharma","year":"2012","unstructured":"Sharma, S., Gupta, P., Bhatnagar, V.: Anonymisation in social network: a literature survey and classification. Int. J. Soc. Netw. 1(1), 51\u201366 (2012)","journal-title":"Int. J. Soc. Netw."},{"issue":"1\u20132","key":"3_CR4","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1007\/s11257-011-9110-z","volume":"22","author":"E Toch","year":"2012","unstructured":"Toch, E., Wang, Y., Cranor, L.F.: Personalization and privacy: a survey of privacy risks and remedies in personalization-based systems. User Model. User-adapt. Interact. 22(1\u20132), 203\u2013220 (2012)","journal-title":"User Model. User-adapt. Interact."},{"key":"3_CR5","first-page":"1701","volume":"57","author":"P Ohm","year":"2010","unstructured":"Ohm, P.: Broken promises of privacy: responding to the surprising failure of anonymization. UCLA Law Rev. 57, 1701 (2010)","journal-title":"UCLA Law Rev."},{"issue":"1","key":"3_CR6","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1080\/13600869.2013.869909","volume":"28","author":"Z Alexin","year":"2014","unstructured":"Alexin, Z.: Does fair anonymization exist? Int. Rev. Law, Comput. Technol. 28(1), 21\u201344 (2014)","journal-title":"Int. Rev. Law, Comput. Technol."},{"issue":"1","key":"3_CR7","first-page":"93","volume":"2","author":"C Dwork","year":"2008","unstructured":"Dwork, C., Naor, M.: On the difficulties of disclosure prevention in statistical databases or the case for differential privacy. J. Priv. Confidentiality 2(1), 93\u2013107 (2008)","journal-title":"J. Priv. Confidentiality"},{"key":"3_CR8","unstructured":"O\u2019Hara, K.: Transparent Government, Not Transparent Citizens: A Report on Privacy and Transparency for the Cabinet Office (2011)"},{"issue":"10","key":"3_CR9","first-page":"1108","volume":"24","author":"Xiaoxun Sun","year":"2011","unstructured":"Sun, X., Wang, H., Zhang, Y.: On the identity anonymization of high-dimensional rating data, No. March (2011), pp. 1108\u20131122 (2012)","journal-title":"Concurrency and Computation: Practice and Experience"},{"issue":"05","key":"3_CR10","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertainty, Fuzziness Knowl. Based Syst. 10(05), 557\u2013570 (2002)","journal-title":"Int. J. Uncertainty, Fuzziness Knowl. Based Syst."},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Bayardo, R.J., Agrawal, R.: Data privacy through optimal k-anonymization. In: 21st International Conference Data and Engineering, pp. 217\u2013228 (2005)","DOI":"10.1109\/ICDE.2005.42"},{"key":"3_CR12","unstructured":"Li, N.: Provably Private Data Anonymization: Or, k-Anonymity Meets Differential Privacy (2010)"},{"issue":"1","key":"3_CR13","doi-asserted-by":"publisher","first-page":"3\u2013es","DOI":"10.1145\/1217299.1217302","volume":"1","author":"A Machanavajjhala","year":"2007","unstructured":"Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: L-diversity: privacy beyond k-anonymity. ACM Trans. Knowl. Discov. Data 1(1), 3\u2013es (2007)","journal-title":"ACM Trans. Knowl. Discov. Data"},{"issue":"1","key":"3_CR14","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/s10115-010-0311-2","volume":"28","author":"B Zhou","year":"2010","unstructured":"Zhou, B., Pei, J.: The k-anonymity and l-diversity approaches for privacy preservation in social networks against neighborhood attacks. Know. Inf. Syst. 28(1), 47\u201377 (2010)","journal-title":"Know. Inf. Syst."},{"key":"3_CR15","first-page":"106","volume":"7","author":"N Li","year":"2007","unstructured":"Li, N.: t-closeness: privacy beyond k-anonymity and -diversity. ICDE 7, 106\u2013115 (2007)","journal-title":"ICDE"},{"key":"3_CR16","doi-asserted-by":"crossref","unstructured":"Domingo-Ferrer, J., Torra, V.: A critique of k-anonymity and some of its enhancements. In: Third International Conference Availability, Reliability and Security, pp. 990\u2013993 (2008)","DOI":"10.1109\/ARES.2008.97"},{"key":"3_CR17","doi-asserted-by":"crossref","unstructured":"Narayanan, A., Shi, E., Rubinstein, B.I.P.: Link prediction by de-anonymization: how we won the Kaggle social network challenge. In: Neural Networks (IJCNN) (2011)","DOI":"10.1109\/IJCNN.2011.6033446"},{"key":"3_CR18","unstructured":"Sharad, K., Danezis, G.: De-anonymizing D4D datasets. In: Workshop on Hot Topics in Privacy Enhancing Technologies (2013)"},{"key":"3_CR19","doi-asserted-by":"crossref","unstructured":"Narayanan, A., Shmatikov, V.: Robust de-anonymization of large sparse datasets. In: IEEE Symposium on Security and Privacy, pp. 111\u2013125 (2008)","DOI":"10.1109\/SP.2008.33"},{"issue":"00311","key":"3_CR20","doi-asserted-by":"crossref","first-page":"373","DOI":"10.3233\/SJU-2001-18412","volume":"18","author":"S Bender","year":"2001","unstructured":"Bender, S., Brand, R., Bacher, J.: Re-identifying register data by survey data: an empirical study. Stat. J. United Nations ECE 18(00311), 373\u2013381 (2001)","journal-title":"Stat. J. United Nations ECE"},{"issue":"4","key":"3_CR21","first-page":"1","volume":"3","author":"G Guly\u00e1s","year":"2011","unstructured":"Guly\u00e1s, G., Imre, S.: Analysis of identity separation against a passive clique-based de-anonymization attack. Infocomm. J. 3(4), 1\u201310 (2011)","journal-title":"Infocomm. J."},{"key":"3_CR22","unstructured":"Torra, V., Stokes, K.: A formalization of re-identification in terms of compatible probabilities. CoRR, abs\/1301.5, pp. 1\u201320 (2013)"},{"key":"3_CR23","doi-asserted-by":"crossref","unstructured":"Datta, A., Sharma, D., Sinha, A.: Provable de-anonymization of large datasets with sparse dimensions. in principles of security and trust (2012)","DOI":"10.1007\/978-3-642-28641-4_13"},{"key":"3_CR24","doi-asserted-by":"crossref","unstructured":"Gulyas, G.G., Imre, S.: Measuring importance of seeding for structural de-anonymization attacks in social networks. In: The Sixth IEEE Workshop on SECurity and SOCial Networking, pp. 610\u2013615 (2014)","DOI":"10.1109\/PerComW.2014.6815276"},{"issue":"1","key":"3_CR25","doi-asserted-by":"publisher","first-page":"102","DOI":"10.14778\/1453856.1453873","volume":"1","author":"M Hay","year":"2008","unstructured":"Hay, M., Miklau, G., Jensen, D.: Resisting structural re-identification in anonymized social networks. Proceedings of the VLDB Endowment 1(1), 102\u2013114 (2008)","journal-title":"Proceedings of the VLDB Endowment"},{"issue":"1","key":"3_CR26","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1186\/1472-6947-12-66","volume":"12","author":"FK Dankar","year":"2012","unstructured":"Dankar, F.K., El Emam, K., Neisa, A., Roffey, T.: Estimating the re-identification risk of clinical data sets. BMC Med. Inf. Decis. Making 12(1), 66 (2012)","journal-title":"BMC Med. Inf. Decis. Making"},{"key":"3_CR27","doi-asserted-by":"crossref","unstructured":"Cecaj, A., Mamei, M., Bicocchi, N.: Re-identification of anonymized CDR datasets using social network data. In: The Third IEEE International Workshop on the Impact of Human Mobility in Pervasive Systems and Applications, pp. 237\u2013242 (2014)","DOI":"10.1109\/PerComW.2014.6815210"},{"key":"3_CR28","unstructured":"Zhang, A., Xie, X., Chang, K.C.-C., Gunter, C.A., Han, J., Wang, X.F.: Privacy risk in anonymized heterogeneous information networks. In: EDBT (2014)"},{"key":"3_CR29","doi-asserted-by":"crossref","unstructured":"Pedarsani, P., Grossglauser, M.: On the privacy of anonymized networks. In: Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining - KDD 2011, p. 1235 (2011)","DOI":"10.1145\/2020408.2020596"},{"key":"3_CR30","first-page":"1","volume":"2013","author":"T Zhu","year":"2013","unstructured":"Zhu, T., Wang, S., Li, X., Zhou, Z., Zhang, R.: Structural attack to anonymous graph of social networks. Math. Probl. Eng. 2013, 1\u20138 (2013)","journal-title":"Math. Probl. Eng."},{"key":"3_CR31","doi-asserted-by":"crossref","unstructured":"Narayanan, A., Shmatikov, V.: De-anonymizing social networks. In: 30th IEEE Symposium on Security and Privacy, pp. 173\u2013187 (2009)","DOI":"10.1109\/SP.2009.22"},{"key":"3_CR32","doi-asserted-by":"crossref","unstructured":"Srivatsa, M., Hicks, M.: Deanonymizing mobility traces: using social networks as a side-channel. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security. ACM (2012)","DOI":"10.1145\/2382196.2382262"},{"key":"3_CR33","doi-asserted-by":"crossref","unstructured":"Sharad, K., Danezis, G.: An automated social graph de-anonymization technique. arXiv Prepr, arXiv:1408.1276 (2014)","DOI":"10.1145\/2665943.2665960"},{"key":"3_CR34","doi-asserted-by":"crossref","unstructured":"Nilizadeh, S., Kapadia, A., Ahn, Y.-Y.: Community-enhanced de-anonymization of online social networks. In: CCS 2014 (2014)","DOI":"10.1145\/2660267.2660324"},{"issue":"2","key":"3_CR35","doi-asserted-by":"publisher","first-page":"290","DOI":"10.1109\/TC.2012.202","volume":"63","author":"W Peng","year":"2014","unstructured":"Peng, W., Li, F., Zou, X., Wu, J.: A two-stage deanonymization attack against anonymized social networks. IEEE Trans. Comput. 63(2), 290\u2013303 (2014)","journal-title":"IEEE Trans. Comput."},{"key":"3_CR36","doi-asserted-by":"crossref","unstructured":"Backstrom, L., Dwork, C., Kleinberg, J.: Wherefore art thou R3579X? anonymized social networks, hidden patterns, and structural steganography. In: Proceedings of the 16th International Conference on World Wide Web. ACM (2007)","DOI":"10.1145\/1242572.1242598"},{"key":"3_CR37","doi-asserted-by":"crossref","unstructured":"Bringmann, K., Friedrich, T., Krohmer, A.: De-anonymization of heterogeneous random graphs in quasilinear time. In: ESA, pp. 197\u2013208 (2014)","DOI":"10.1007\/978-3-662-44777-2_17"},{"issue":"4","key":"3_CR38","doi-asserted-by":"publisher","first-page":"161","DOI":"10.3311\/PPee.7878","volume":"58","author":"B Simon","year":"2014","unstructured":"Simon, B., Guly\u00e1s, G.G., Imre, S.: Analysis of grasshopper, a novel social network de-anonymization algorithm. Periodica Polytechnica Electr. Eng. Comput. Sci. 58(4), 161\u2013173 (2014)","journal-title":"Periodica Polytechnica Electr. Eng. Comput. Sci."},{"issue":"10","key":"3_CR39","doi-asserted-by":"crossref","first-page":"1010","DOI":"10.14778\/2794367.2794371","volume":"8","author":"Ehsan Kazemi","year":"2015","unstructured":"Kazemi, E., Hassani, S.H., Grossglauser, M.: Growing a graph matching from a handful of seeds. In: 41st International Conference on Very Large Data Bases (2015)","journal-title":"Proceedings of the VLDB Endowment"},{"key":"3_CR40","doi-asserted-by":"crossref","unstructured":"Ding, X., Zhang, L., Wan, Z., Gu, M.: De-anonymizing dynamic social networks. In: IEEE Global Telecommunications Conference \u2013 GLOBECOM, pp. 1\u20136 (2011)","DOI":"10.1109\/GLOCOM.2011.6133607"},{"issue":"8","key":"3_CR41","doi-asserted-by":"publisher","first-page":"1597","DOI":"10.1016\/j.jcss.2014.04.024","volume":"80","author":"S Gambs","year":"2014","unstructured":"Gambs, S., Killijian, M.-O., N\u00fa\u00f1ez del Prado Cortez, M.: De-anonymization attack on geolocated data. J. Comput. Syst. Sci. 80(8), 1597\u20131614 (2014)","journal-title":"J. Comput. Syst. Sci."},{"key":"3_CR42","first-page":"237","volume-title":"Lecture Notes in Computer Science","author":"Shouling Ji","year":"2014","unstructured":"Ji, S., Li, W., Srivatsa, M., He, J.S., Beyah, R.: Structure based data de-anonymization of social networks and mobility traces (2014)"},{"key":"3_CR43","doi-asserted-by":"crossref","unstructured":"Okuno, T., Ichino, M., Kuboyama, T., Yoshiura, H.: Content-based de-anonymisation of tweets. In: The Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 53\u201356 (2011)","DOI":"10.1109\/IIHMSP.2011.57"},{"issue":"4","key":"3_CR44","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2700836","volume":"6","author":"H Fu","year":"2008","unstructured":"Fu, H., Zhang, A., Xie, X.: Effective social graph de-anonymization based on graph structure and descriptive information. ACM Trans. Intell. Syst. Technol. 6(4), 1\u201329 (2008)","journal-title":"ACM Trans. Intell. Syst. Technol."},{"key":"3_CR45","doi-asserted-by":"crossref","unstructured":"Unnikrishnan, J., Naini, F. M.: De-anonymizing private data by matching statistics. In: Allerton Conference on Communication, Control, and Computing, No. EPFL-CONF-196580 (2013)","DOI":"10.1109\/Allerton.2013.6736722"},{"key":"3_CR46","doi-asserted-by":"crossref","unstructured":"Zheleva, E., Getoor, L.: To join or not to join: the illusion of privacy in social networks with mixed public and private user profiles, pp. 531\u2013540 (2009)","DOI":"10.1145\/1526709.1526781"},{"key":"3_CR47","doi-asserted-by":"crossref","unstructured":"Wondracek, G., Holz, T., Kirda, E., Kruegel, C.: A practical attack to de-anonymize social network users. In: IEEE Symposium on Security and Privacy, pp. 223\u2013238 (2010)","DOI":"10.1109\/SP.2010.21"},{"key":"3_CR48","unstructured":"Korayem, M., Crandall, D. J.: De-anonymizing users across heterogeneous social computing platforms. In: Proceedings of the Seventh International AAAI Conference on Weblogs and Social Media, pp. 1\u20134 (2013)"},{"key":"3_CR49","doi-asserted-by":"crossref","unstructured":"Lane, N.D., Xie, J., Moscibroda, T., Zhao, F.: On the feasibility of user de-anonymization from shared mobile sensor data. In: Proceedings of the Third International Workshop on Sensing Applications on Mobile Phones - PhoneSense 2012, pp. 1\u20135 (2012)","DOI":"10.1145\/2389148.2389151"},{"issue":"2","key":"3_CR50","first-page":"377","volume":"5","author":"MM Merener","year":"2012","unstructured":"Merener, M.M.: Theoretical results on de-anonymization via linkage attacks. Trans. Data Priv. 5(2), 377\u2013402 (2012)","journal-title":"Trans. Data Priv."},{"key":"3_CR51","doi-asserted-by":"crossref","unstructured":"Frankowski, D., Cosley, D., Sen, S., Terveen, L., Riedl, J.: You are what you say: privacy risks of public mentions. In: Proceedings of the 29th SIGIR 2006, pp. 565\u2013572 (2006)","DOI":"10.1145\/1148170.1148267"},{"issue":"3","key":"3_CR52","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1016\/j.jbi.2004.04.005","volume":"37","author":"B Malin","year":"2004","unstructured":"Malin, B., Sweeney, L.: How (not) to protect genomic data privacy in a distributed network: using trail re-identification to evaluate and design anonymity protection systems. J. Biomed. Inform. 37(3), 179\u2013192 (2004)","journal-title":"J. Biomed. Inform."},{"key":"3_CR53","unstructured":"Malin, B., Sweeney, L., Newton, E.: Trail re-identification: learning who you are from where you have been. In: Workshop on Privacy in Data (2003)"},{"key":"3_CR54","unstructured":"Foukarakis, M., Antoniades, D., Antonatos, S., Markatos, E.P.: On the anonymization and deanonymization of netflow traffic. In: Proceedings of FloCon (2008)"},{"key":"3_CR55","doi-asserted-by":"crossref","unstructured":"Biryukov, A., Pustogarov, I., Weinmann, R.-P.: Trawling for tor hidden services: detection, measurement, deanonymization. In: 2013 IEEE Symposium on Security and Privacy, pp. 80\u201394 (2013)","DOI":"10.1109\/SP.2013.15"},{"key":"3_CR56","unstructured":"Pataky, M.: De-anonymization of an Internet user based on his web browser. In: CER Comparative European Research, pp. 125\u2013128 (2014)"},{"key":"3_CR57","doi-asserted-by":"crossref","unstructured":"Danezis, G., Troncoso, C.: You cannot hide for long: de-anonymization of real-world dynamic behaviour. In: WPES 2013, pp. 49\u201359 (2013)","DOI":"10.1145\/2517840.2517846"},{"key":"3_CR58","doi-asserted-by":"crossref","unstructured":"Calandrino, J.A., Kilzer, A., Narayanan, A., Felten, E.W., Shmatikov, V.: You might also like: privacy risks of collaborative filtering, privacy risks of collaborative filtering. In: IEEE Symposium on Security and Privacy. IEEE (2011)","DOI":"10.1109\/SP.2011.40"},{"key":"3_CR59","doi-asserted-by":"crossref","unstructured":"Danezis, G., Troncoso, C.: Vida: how to use Bayesian inference to de-anonymize persistent communications. In: Privacy Enhancing Technologies (2009)","DOI":"10.1007\/978-3-642-03168-7_4"},{"key":"3_CR60","doi-asserted-by":"crossref","unstructured":"Ji, S., Li, W., Srivatsa, M., Beyah, R.: Structural data de-anonymization: quantification, practice, and implications. In: CCS 2014 (2014)","DOI":"10.1145\/2660267.2660278"},{"key":"3_CR61","doi-asserted-by":"crossref","unstructured":"Ji, S., Li, W., Gong, N.Z., Mittal, P., Beyah, R.: On your social network de-anonymizablity: quantification and large scale evaluation with seed knowledge. In: The 2015 Network and Distributed System Security (NDSS) Symposium, San Diego, CA, US, pp. 8\u201311 (2015)","DOI":"10.14722\/ndss.2015.23096"}],"container-title":["Lecture Notes in Computer Science","Risks and Security of Internet and Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-31811-0_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,2]],"date-time":"2025-06-02T02:27:43Z","timestamp":1748831263000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-31811-0_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319318103","9783319318110"],"references-count":61,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-31811-0_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}