Spy vs. Spy: Rumor source obfuscation

Giulia Fanti, Peter Kairouz, Sewoong Oh, Pramod Viswanath

Research output: Contribution to journalConference article

Abstract

Anonymous messaging platforms, such as Secret, Yik Yak, and Whisper, have emerged as important social media for sharing one's thoughts without the fear of being judged by friends, family, or the public. Further, such anonymous platforms are crucial in nations with authoritarian governments; the right to free expression and sometimes the personal safety of the author of the message depend on anonymity. Whether for fear of judgment or personal endangerment, it is crucial to keep anonymous the identity of the user who initially posted a sensitive message. In this paper, we consider an adversary who observes a snapshot of the spread of a message at a certain time. Recent advances in rumor source detection shows that the existing messaging protocols are vulnerable against such an adversary. We introduce a novel messaging protocol, which we call adaptive diffusion, and show that it spreads the messages fast and achieves a perfect obfuscation of the source when the underlying contact network is an infinite regular tree: all users with the message are nearly equally likely to have been the origin of the message. Experiments on a sampled Facebook network show that it effectively hides the location of the source even when the graph is finite, irregular and has cycles.

Original languageEnglish (US)
Pages (from-to)271-284
Number of pages14
JournalPerformance Evaluation Review
Volume43
Issue number1
DOIs
StatePublished - Jun 24 2015
EventACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, SIGMETRICS 2015 - Portland, United States
Duration: Jun 15 2015Jun 19 2015

Fingerprint

Experiments

Keywords

  • Anonymous social media
  • Privacy
  • Rumor spreading

ASJC Scopus subject areas

  • Software
  • Hardware and Architecture
  • Computer Networks and Communications

Cite this

Spy vs. Spy : Rumor source obfuscation. / Fanti, Giulia; Kairouz, Peter; Oh, Sewoong; Viswanath, Pramod.

In: Performance Evaluation Review, Vol. 43, No. 1, 24.06.2015, p. 271-284.

Research output: Contribution to journalConference article

Fanti, Giulia ; Kairouz, Peter ; Oh, Sewoong ; Viswanath, Pramod. / Spy vs. Spy : Rumor source obfuscation. In: Performance Evaluation Review. 2015 ; Vol. 43, No. 1. pp. 271-284.
@article{347ce0e8c74142b6a6dc6f6d1f6dc4e8,
title = "Spy vs. Spy: Rumor source obfuscation",
abstract = "Anonymous messaging platforms, such as Secret, Yik Yak, and Whisper, have emerged as important social media for sharing one's thoughts without the fear of being judged by friends, family, or the public. Further, such anonymous platforms are crucial in nations with authoritarian governments; the right to free expression and sometimes the personal safety of the author of the message depend on anonymity. Whether for fear of judgment or personal endangerment, it is crucial to keep anonymous the identity of the user who initially posted a sensitive message. In this paper, we consider an adversary who observes a snapshot of the spread of a message at a certain time. Recent advances in rumor source detection shows that the existing messaging protocols are vulnerable against such an adversary. We introduce a novel messaging protocol, which we call adaptive diffusion, and show that it spreads the messages fast and achieves a perfect obfuscation of the source when the underlying contact network is an infinite regular tree: all users with the message are nearly equally likely to have been the origin of the message. Experiments on a sampled Facebook network show that it effectively hides the location of the source even when the graph is finite, irregular and has cycles.",
keywords = "Anonymous social media, Privacy, Rumor spreading",
author = "Giulia Fanti and Peter Kairouz and Sewoong Oh and Pramod Viswanath",
year = "2015",
month = "6",
day = "24",
doi = "10.1145/2796314.2745866",
language = "English (US)",
volume = "43",
pages = "271--284",
journal = "Performance Evaluation Review",
issn = "0163-5999",
publisher = "Association for Computing Machinery (ACM)",
number = "1",

}

TY - JOUR

T1 - Spy vs. Spy

T2 - Rumor source obfuscation

AU - Fanti, Giulia

AU - Kairouz, Peter

AU - Oh, Sewoong

AU - Viswanath, Pramod

PY - 2015/6/24

Y1 - 2015/6/24

N2 - Anonymous messaging platforms, such as Secret, Yik Yak, and Whisper, have emerged as important social media for sharing one's thoughts without the fear of being judged by friends, family, or the public. Further, such anonymous platforms are crucial in nations with authoritarian governments; the right to free expression and sometimes the personal safety of the author of the message depend on anonymity. Whether for fear of judgment or personal endangerment, it is crucial to keep anonymous the identity of the user who initially posted a sensitive message. In this paper, we consider an adversary who observes a snapshot of the spread of a message at a certain time. Recent advances in rumor source detection shows that the existing messaging protocols are vulnerable against such an adversary. We introduce a novel messaging protocol, which we call adaptive diffusion, and show that it spreads the messages fast and achieves a perfect obfuscation of the source when the underlying contact network is an infinite regular tree: all users with the message are nearly equally likely to have been the origin of the message. Experiments on a sampled Facebook network show that it effectively hides the location of the source even when the graph is finite, irregular and has cycles.

AB - Anonymous messaging platforms, such as Secret, Yik Yak, and Whisper, have emerged as important social media for sharing one's thoughts without the fear of being judged by friends, family, or the public. Further, such anonymous platforms are crucial in nations with authoritarian governments; the right to free expression and sometimes the personal safety of the author of the message depend on anonymity. Whether for fear of judgment or personal endangerment, it is crucial to keep anonymous the identity of the user who initially posted a sensitive message. In this paper, we consider an adversary who observes a snapshot of the spread of a message at a certain time. Recent advances in rumor source detection shows that the existing messaging protocols are vulnerable against such an adversary. We introduce a novel messaging protocol, which we call adaptive diffusion, and show that it spreads the messages fast and achieves a perfect obfuscation of the source when the underlying contact network is an infinite regular tree: all users with the message are nearly equally likely to have been the origin of the message. Experiments on a sampled Facebook network show that it effectively hides the location of the source even when the graph is finite, irregular and has cycles.

KW - Anonymous social media

KW - Privacy

KW - Rumor spreading

UR - http://www.scopus.com/inward/record.url?scp=84955584375&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84955584375&partnerID=8YFLogxK

U2 - 10.1145/2796314.2745866

DO - 10.1145/2796314.2745866

M3 - Conference article

AN - SCOPUS:84955584375

VL - 43

SP - 271

EP - 284

JO - Performance Evaluation Review

JF - Performance Evaluation Review

SN - 0163-5999

IS - 1

ER -