ShareSafe is designed for both academia and industry. On one hand ShareSafe provide an uniform platform to test new graph data algorithms. On the other hand, ShareSafe provides a plat form for data owners to test the privacy of their data before release.
ShareSafe is created in Java thus theoretically could support any platform that one can run a JVM on. However while implementing the graphic user interface(GUI), we used an open sourced library “SWT (The Standard Widget Toolkit)” thus to use the GUI you must have a platform with SWT support.
ShareSafe currently contains the 15 Structured Data de-anonymization techniques discussed in the paper which includes:
- The Walk-Based active attack from Wherefore art thou r3579x? anonymized social networks, hidden patterns, and structural steganography
- The Cut-Based active attack from Wherefore art thou r3579x? anonymized social networks, hidden patterns, and structural steganography
- The passive attack from Wherefore art thou r3579x? anonymized social networks, hidden patterns, and structural steganography.
- The attack from De-anonymizing social networks
- The attack from Link prediction by de-anonymization: How we won the kaggle social network challenge.
- The attack from Community-enhanced de-anonymization of online social networks
- The distance vector attack from Deanonymizing mobility traces: Using social networks as a side-channel
- The random spanning tree attack from Deanonymizing mobility traces: Using social networks as a side-channel
- The Recursive Subgraph Matching attack from Deanonymizing mobility traces: Using social networks as a side-channel.
- The attack from A bayesian method for matching two similar graphs without seeds
- The attack from On the performance of percolation graph matching
- The De-Anonymization attack from Structure based data de-anonymization of social networks and mobility traces
- The Adaptive De-Anonymization attack from Structure based data de-anonymization of social networks and mobility traces
- The attack from An efficient reconciliation algorithm for social networks
- The attack from Structural data de-anonymization: Quantification, practice, and implications
ShareSafe current contains 12 graph utility metrics and 7 application utility metrics as detailed in the paper.Graph Utility Metrics:
- Degree
- Join Degree
- Effective Diameter
- Path Length
- Local Clustering Coefficient
- Global Clustering Coefficient
- Closeness Centrality
- Betweenness Centrality
- Eigen Vector
- Network Constraint
- Network Resilience
- Infectiousness
Application Utility Metrics:
- Role eXtraction
- Reliable Email
- Influence Maximization
- Minimum-sized Influential Node Set
- Community Detection
- Secure Routing
- Sybil Detection
ShareSafe current contains 11 graph anonymization techniques as detailed in the paper.
- naive ID removal
- Add/Del Edge Editing
- Switch Edge Editing
- k-DA
- k-iso
- bounded t-means clustering
- union-split clustering
- Sala et al.’s DP based algorithm
- Proserpio et al.’s DP based algorithm
- Xiao et al.’s DP based algorithm
- Random Walk based algorithm