期刊文献+

社会网络隐私保护中K-同构算法研究 被引量:3

Research on K-isomorphism Algorithm for Social Network Privacy Preserving
下载PDF
导出
摘要 针对社会网络发布图数据面临的隐私泄露问题,提出了一种k-同构隐私保护算法.通过对原始图数据进行有效划分为k个子图,同时为降低匿名成本,增加与删除边数量近似相等,保证发布的图数据是k-同构的,有效阻止了攻击者基于背景知识的结构化攻击.通过真实数据集进行实验,结果表明算法具有高的有效性,能减少信息丢失,提高匿名质量. As traditional privacy-preserving technology can't be directly applied to the social network data of higher dimension, to solve published graph data for social network facing the issues of privacy disclosure, a k-isomorphism privacy protection algorithm is proposed. By the original graph data is divided into k sub-graphs effectively, in order to reduce the cost of anonymity, the number of edges added edges approximately equal to the deleted, and ensure the release of the graph data is the k isomorphic, which effectively prevents the attacker based on a structural background knowledge attack. Real data set by experiment results show that the algorithm has high validity and can reduce the loss of information, also improve the quality of anonymity.
出处 《微电子学与计算机》 CSCD 北大核心 2012年第5期99-103,共5页 Microelectronics & Computer
基金 国家自然科学基金项目(61163015) 内蒙古自然科学基金重点项目(20080404Zd21) 教育部"春晖计划"基金(Z2009-1-01024)
关键词 社会网络 隐私保护 图数据 k-同构 social network privacy preserving graph data k-isomorphism
  • 相关文献

参考文献7

  • 1Liu K,Terzi E. Towards identity anonymization on graphs[A].USA,New York:SIGMODI,2008.93-106.
  • 2刘恒,王铁军,周明天,佘堃.普适环境中基于角色的隐私保护系统设计[J].微电子学与计算机,2010,27(12):42-46. 被引量:2
  • 3Zheleva E,Getoor L. Preserving the privacy of sensi- tive relationships in graph data[A].San Jose,CA,USA:ACM,2007.153-171.
  • 4Ying X,Wu X. Randomizing social networks: a spec- trum preserving approach[A].United States of America,2008.739-750.
  • 5Lei Zou,Lei Chen,Tamer Ozsu M. K-automorphism:a general framework for privacy preserving network publieation[J].VLDI3,2009,(01):946-957.
  • 6James Cheng,Ada Wai-Chee Fu,Jia Liu. K-Isomor- phism; privacy preserving network publication against structural attacks[A].USA,Indianapolis,Indiana:ACM,2010.459-470.
  • 7Zhou B,Pei J. Preserving privacy in social networks against neighborhood attacks[A].Cancun,Mexico:IEEE Computer Soci- ety,2008.506-515.

二级参考文献4

共引文献1

同被引文献23

  • 1高阳,张宏莉.动态网络社区发现综述[J].智能计算机与应用,2020,0(1):197-199. 被引量:2
  • 2Sweeney L. k-anonmity: a model for protecting privacy [ J]. International Journal of Uncertainty Fuzziness and Knowledge Based Systems ,2002,10(5 ) :557-570.
  • 3Machanavajjhala A, Kifer D, Gehrke J, et al. 1-diversity : priva- cy beyond k-anonymity [ J ]. ACM Transactions on Knowledge Discovery from Data,2007,1 ( 1 ) : 1-52.
  • 4Wong R, Li J, Fu A. ( a, k ) - anonymity : an enhanced k- ano- nymlty model for pri'~aey preserving data publishing [ C ]// Proc of 2006 12th ACM SIGKDD international conference on knowledge discovery and data mining. [ s. 1. ] : ACM, 2006 : 754-759.
  • 5Liang Xiaohui, Barua M, Lu Rongxing, et al. HeahhShare : a- chieving secure and privacy- preserving health information sharing through health social networks[ ~ ]. Computer Commu- nications ;2012,35 ( 15 ) : 1910 - 1920.
  • 6Liu Hua, Krishnamachari B, Annavaram M. Game theoretic ap- proach to location sharing with privacy in a community-based mobile safety application[ C]//Proc of 2008 4th ACM inter- nutional symposium on QoS and security for wireless and mo- bile networks. [ s. 1. ] :ACM ,2008:27-31.
  • 7van Dongen S. Graph clustering by flow simulation [ D ]. U- trecht : Univ of Utrecht,2000.
  • 8韩建民,于娟,虞慧群,贾泂.面向敏感值的个性化隐私保护[J].电子学报,2010,38(7):1723-1728. 被引量:40
  • 9戴爱明,高学东,王立敏.一个基于中心度的社团结构发现新算法[J].计算机应用研究,2011,28(8):2909-2911. 被引量:4
  • 10兰丽辉,孙英慧,鞠时光.社会网络发布中敏感边的隐私保护[J].吉林大学学报(信息科学版),2011,29(4):324-331. 被引量:5

引证文献3

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部