skip to main content
10.1145/2817946.2817956acmconferencesArticle/Chapter ViewAbstractPublication PagescosnConference Proceedingsconference-collections
research-article
Free Access

Towards Graph Watermarks

Authors Info & Claims
Published:02 November 2015Publication History

ABSTRACT

From network topologies to online social networks, many of today's most sensitive datasets are captured in large graphs. A significant challenge facing the data owners is how to share sensitive graphs with collaborators or authorized users, e.g. ISP's network topology graphs with a third party networking equipment vendor. Current tools can provide limited node or edge privacy, but significantly modify the graph reducing its utility.

In this work, we propose a new alternative in the form of graph watermarks. Graph watermarks are small graphs tailor-made for a given graph dataset, a secure graph key, and a secure user key. To share a sensitive graph G with a collaborator C, the owner generates a watermark graph W using G, the graph key, and C's key as input, and embeds W into G to form G'. If G' is leaked by C, its owner can reliably determine if the watermark W generated for C does in fact reside inside G', thereby proving C is responsible for the leak. Graph watermarks serve both as a deterrent against data leakage and a method of recourse after a leak. We provide robust schemes for embedding and extracting watermarks, and use analysis and experiments on large real graphs to show that they are unique and difficult to forge. We study the robustness of graph watermarks against both single and powerful colluding attacker models, then propose and evaluate mechanisms to dramatically improve resilience.

References

  1. Agrawal, R., and Kiernan, J. Watermarking relational databases. In Proc. of VLDB (2002). Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Albert, R., Jeong, H., and Barabási, A.-L. Internet: Diameter of the world-wide web. Nature 401, 6749 (1999), 130--131.Google ScholarGoogle ScholarCross RefCross Ref
  3. Arrington, M. How "dirty" mp3 files are a back door into cloud drm. TechCrunch, April 2010.Google ScholarGoogle Scholar
  4. Backstrom, L., Dwork, C., and Kleinberg, J. Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography. In WWW (2007). Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Bender, W., Gruhl, D., Morimoto, N., and Lu, A. Techniques for data hiding. IBM systems journal (1996), 313--336. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Cho, E., Myers, S. A., and Leskovec, J. Friendship and mobility: user movement in location-based social networks. In KDD (2011). Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Collberg, C. S., Kobourov, S. G., Carter, E., and Thomborson, C. D. Graph-based approaches to software watermarking. In WG (2003).Google ScholarGoogle Scholar
  8. Cook, S. A. The complexity of theorem-proving procedures. In STOC (1971). Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Gilbert, E. N. Random graphs. The Annals of Mathematical Statistics (1959), 1141--1144.Google ScholarGoogle ScholarCross RefCross Ref
  10. Hanhijärvi, S., Garriga, G. C., and Puolamäki, K. Randomization techniques for graphs. In SDM (2009).Google ScholarGoogle Scholar
  11. Hay, M., Miklau, G., Jensen, D., Towsley, D., and Weis, P. Resisting structural re-identification in anonymized social networks.Google ScholarGoogle Scholar
  12. Hay, M., Miklau, G., Jensen, D., Weis, P., and Srivastava, S. Anonymizing social networks. Tech. Rep. 07--19, UMass, 2007.Google ScholarGoogle Scholar
  13. Kamran, M., et al. A robust, distortion minimizing technique for watermarking relational databases using once-for-all usability constraints. IEEE TKDE (2012). Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Lee, S.-J., and Jung, S.-H. A survey of watermarking techniques applied to multimedia. In ISIE (2001).Google ScholarGoogle Scholar
  15. Leskovec, J., Adamic, L. A., and Huberman, B. A. The dynamics of viral marketing. TWEB (2007). Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Leskovec, J., et al. Statistical properties of community structure in large social and information networks. In WWW (2008). Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Leskovec, J., Huttenlocher, D., and Kleinberg, J. Predicting positive and negative links in online social networks. In WWW (2010). Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Leskovec, J., Kleinberg, J., and Faloutsos, C. Graphs over time: densification laws, shrinking diameters and possible explanations. In KDD (2005). Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Leskovec, J., Kleinberg, J., and Faloutsos, C. Graph evolution: Densification and shrinking diameters. TKDD (2007). Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Leskovec, J., Lang, K. J., Dasgupta, A., and Mahoney, M. W. Community structure in large networks: Natural cluster sizes and the absence of large well-defined clusters. Internet Mathematics 6, 1 (2009), 29--123.Google ScholarGoogle ScholarCross RefCross Ref
  21. Leskovec, J., and Mcauley, J. J. Learning to discover social circles in ego networks. In Advances in neural information processing systems (2012), pp. 539--547.Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Li, Y., Swarup, V., and Jajodia. Fingerprinting relational databases: Schemes and specialties. IEEE TDSC 2, 1 (2005), 34--45. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Liu, K., and Terzi, E. Towards identity anonymization on graphs. In SIGMOD (2008). Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Macq, B. M., and Quisquater, J.-J. Cryptology for digital tv broadcasting. Proceedings of the IEEE (1995), 944--957.Google ScholarGoogle ScholarCross RefCross Ref
  25. Menezes, A. J., Oorschot, P. v., and Vanstone, S. Handbook of Applied Cryptography. CRC Press, Inc., 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Mislove, A., Marcon, M., Gummadi, K., Druschel, P., and Bhattacharjee, B. Measurement and analysis of online social networks. In IMC (2007). Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Narayanan, A., and Shmatikov, V. De-anonymizing social networks. In Proc. of IEEE S&P (May 2009). Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Narayanan, A., and Shmatikov, V. Link prediction by de-anonymization: How we won the kaggle social network challenge. In IJCNN (2011).Google ScholarGoogle Scholar
  29. Ohbuchi, R., Ueda, H., and Shuh, E. Robust watermarking of vector digital maps. In ICME (2002).Google ScholarGoogle Scholar
  30. Ohbuchi, R., Ueda, H., and Shuh, E. Watermarking 2d vector maps in the mesh-spectral domain. In Shape Modeling International (2003). Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Qu, G., and Potkonjak, M. Analysis of watermarking techniques for graph coloring problem. In ICCAD (1998). Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Richardson, M., Agrawal, R., and Domingos, P. Trust management for the semantic web. In The Semantic Web-ISWC 2003. Springer, 2003, pp. 351--368.Google ScholarGoogle Scholar
  33. Robshaw, M. J. B. MD2, MD4, MD5, SHA and other hash functions. Tech. Rep. TR-101, RSA Laboratories, 1995. v. 4.0.Google ScholarGoogle Scholar
  34. Ruanaidh, J. O., Dowling, W., and Boland, F. Phase watermarking of digital images. In ICIP (1996).Google ScholarGoogle Scholar
  35. Sala, A., Cao, L., Wilson, C., Zablit, R., Zheng, H., and Zhao, B. Y. Measurement-calibrated graph models for social network experiments. In Proc. of WWW (2010). Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Sala, A., Zhao, X., Wilson, C., Zheng, H., and Zhao, B. Y. Sharing graphs using differentially private graph models. In IMC (2011). Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Steve, W. Information authentication for a slippery new age. Dr. Dobbs Journal (1995), 18--26.Google ScholarGoogle Scholar
  38. Takac, L., and Zabovsky, M. Data analysis in public social networks. In International Scientific Conference AND International Workshop Present Day Trends of Innovations (2012).Google ScholarGoogle Scholar
  39. Venkatesan, R., Vazirani, V., and Sinha, S. A graph theoretic approach to software watermarking. In Information Hiding (2001). Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. Wilson, C., Sala, A., Puttaswamy, K. P. N., and Zhao, B. Y. Beyond social graphs: User interactions in online social networks and their implications. ACM Trans. on the Web 6, 4 (2012). Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. Wolfe, G., Wong, J. L., and Potkonjak, M. Watermarking graph partitioning solutions. In DAC (2001). Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. Xia, X.-G., Boncelet, C. G., and Arce, G. R. A multiresolution watermark for digital images. In ICIP (1997). Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. Yang, J., and Leskovec, J. Defining and evaluating network communities based on ground-truth. In Proceedings of the ACM SIGKDD Workshop on Mining Data Semantics (2012), ACM, p. 3. Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. Ying, X., and Wu, X. Randomizing social networks: a spectrum preserving approach. In SDM (2008).Google ScholarGoogle Scholar
  45. Zhao, X., Liu, Q., Zhou, L., Zheng, H., and Zhao, B. Y. Graph watermarks. Arxiv preprint arXiv:1506.00022 (2015).Google ScholarGoogle Scholar
  46. Zhou, B., et al. Preserving privacy in social networks against neighborhood attacks. In Proc. of ICDE (2008). Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. Zhu, W., Thomborson, C., and Wang, F.-Y. A survey of software watermarking. In ISI. 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. Zou, L., Chen, L., and Özsu, M. T. K-automorphism: A general framework for privacy preserving network publication. In VLDB (2009). Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Towards Graph Watermarks

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      COSN '15: Proceedings of the 2015 ACM on Conference on Online Social Networks
      November 2015
      280 pages
      ISBN:9781450339513
      DOI:10.1145/2817946

      Copyright © 2015 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 2 November 2015

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Author Tags

      Qualifiers

      • research-article

      Acceptance Rates

      COSN '15 Paper Acceptance Rate22of82submissions,27%Overall Acceptance Rate69of307submissions,22%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader