Metadata-Conscious Anonymous Messaging

Giulia Fanti, Peter Kairouz, Sewoong Oh, Kannan Ramchandran, Pramod Viswanath

Research output: Contribution to journalArticle

Abstract

Anonymous messaging platforms allow users to spread messages over a network (e.g., a social network) without revealing message authorship to other users. Popular demand for anonymous messaging is evidenced by the success of mobile apps like Whisper and Yik Yak. In such platforms, the spread of messages is typically modeled as a diffusion process. Recent advances in network analysis have revealed that such diffusion processes are vulnerable to author deanonymization by adversaries with access to metadata, such as timing information. In this work, we ask the fundamental question of how to intervene in the propagation of anonymous messages in order to make it difficult to find the source. In particular, we study the performance of a message propagation protocol called adaptive diffusion introduced in [1]. We prove that it achieves asymptotically optimal source-hiding and significantly outperforms standard diffusion. We further demonstrate empirically that adaptive diffusion hides the source effectively on real social graphs.

Original languageEnglish (US)
Article number7559814
Pages (from-to)582-594
Number of pages13
JournalIEEE Transactions on Signal and Information Processing over Networks
Volume2
Issue number4
DOIs
StatePublished - Dec 2016

Fingerprint

Metadata
Electric network analysis
Application programs
Network protocols

Keywords

  • Communication networks
  • privacy

ASJC Scopus subject areas

  • Signal Processing
  • Information Systems
  • Computer Networks and Communications

Cite this

Metadata-Conscious Anonymous Messaging. / Fanti, Giulia; Kairouz, Peter; Oh, Sewoong; Ramchandran, Kannan; Viswanath, Pramod.

In: IEEE Transactions on Signal and Information Processing over Networks, Vol. 2, No. 4, 7559814, 12.2016, p. 582-594.

Research output: Contribution to journalArticle

Fanti, Giulia ; Kairouz, Peter ; Oh, Sewoong ; Ramchandran, Kannan ; Viswanath, Pramod. / Metadata-Conscious Anonymous Messaging. In: IEEE Transactions on Signal and Information Processing over Networks. 2016 ; Vol. 2, No. 4. pp. 582-594.
@article{b898059bd55546ecb1bac90bf3dbbaa0,
title = "Metadata-Conscious Anonymous Messaging",
abstract = "Anonymous messaging platforms allow users to spread messages over a network (e.g., a social network) without revealing message authorship to other users. Popular demand for anonymous messaging is evidenced by the success of mobile apps like Whisper and Yik Yak. In such platforms, the spread of messages is typically modeled as a diffusion process. Recent advances in network analysis have revealed that such diffusion processes are vulnerable to author deanonymization by adversaries with access to metadata, such as timing information. In this work, we ask the fundamental question of how to intervene in the propagation of anonymous messages in order to make it difficult to find the source. In particular, we study the performance of a message propagation protocol called adaptive diffusion introduced in [1]. We prove that it achieves asymptotically optimal source-hiding and significantly outperforms standard diffusion. We further demonstrate empirically that adaptive diffusion hides the source effectively on real social graphs.",
keywords = "Communication networks, privacy",
author = "Giulia Fanti and Peter Kairouz and Sewoong Oh and Kannan Ramchandran and Pramod Viswanath",
year = "2016",
month = "12",
doi = "10.1109/TSIPN.2016.2605761",
language = "English (US)",
volume = "2",
pages = "582--594",
journal = "IIEEE Transactions on Signal and Information Processing over Networks",
issn = "2373-776X",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
number = "4",

}

TY - JOUR

T1 - Metadata-Conscious Anonymous Messaging

AU - Fanti, Giulia

AU - Kairouz, Peter

AU - Oh, Sewoong

AU - Ramchandran, Kannan

AU - Viswanath, Pramod

PY - 2016/12

Y1 - 2016/12

N2 - Anonymous messaging platforms allow users to spread messages over a network (e.g., a social network) without revealing message authorship to other users. Popular demand for anonymous messaging is evidenced by the success of mobile apps like Whisper and Yik Yak. In such platforms, the spread of messages is typically modeled as a diffusion process. Recent advances in network analysis have revealed that such diffusion processes are vulnerable to author deanonymization by adversaries with access to metadata, such as timing information. In this work, we ask the fundamental question of how to intervene in the propagation of anonymous messages in order to make it difficult to find the source. In particular, we study the performance of a message propagation protocol called adaptive diffusion introduced in [1]. We prove that it achieves asymptotically optimal source-hiding and significantly outperforms standard diffusion. We further demonstrate empirically that adaptive diffusion hides the source effectively on real social graphs.

AB - Anonymous messaging platforms allow users to spread messages over a network (e.g., a social network) without revealing message authorship to other users. Popular demand for anonymous messaging is evidenced by the success of mobile apps like Whisper and Yik Yak. In such platforms, the spread of messages is typically modeled as a diffusion process. Recent advances in network analysis have revealed that such diffusion processes are vulnerable to author deanonymization by adversaries with access to metadata, such as timing information. In this work, we ask the fundamental question of how to intervene in the propagation of anonymous messages in order to make it difficult to find the source. In particular, we study the performance of a message propagation protocol called adaptive diffusion introduced in [1]. We prove that it achieves asymptotically optimal source-hiding and significantly outperforms standard diffusion. We further demonstrate empirically that adaptive diffusion hides the source effectively on real social graphs.

KW - Communication networks

KW - privacy

UR - http://www.scopus.com/inward/record.url?scp=85049513432&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85049513432&partnerID=8YFLogxK

U2 - 10.1109/TSIPN.2016.2605761

DO - 10.1109/TSIPN.2016.2605761

M3 - Article

AN - SCOPUS:85049513432

VL - 2

SP - 582

EP - 594

JO - IIEEE Transactions on Signal and Information Processing over Networks

JF - IIEEE Transactions on Signal and Information Processing over Networks

SN - 2373-776X

IS - 4

M1 - 7559814

ER -