期刊文献+

一种查询日志匿名化算法 被引量:2

An algorithm for anonymization of query log
下载PDF
导出
摘要 查询日志的发布会泄露用户的隐私。提出一种基于差分隐私的查询日志匿名化算法:首先构建用户查询项模型进行相似度计算并利用所求结果对用户查询项模型进行聚类,其次在聚类过程中添加指数噪音来满足差分隐私,最后发布匿名化数据。实验表明:该算法有效地提高了查询日志的实用性和隐私保护程度。 A user profile set anonymization algorithm is proposed in this paper. Firstly, the user profile model is extracted to compute similarityand cluster with the computing result. Secondly, exponential noise is added in the cluster process for differential privacy. Finally, the anonymity data are released. Experimental results demonstrate that the proposed anonymization cluster algorithm promotesdata utility and level of privacy protection.
出处 《北京信息科技大学学报(自然科学版)》 2013年第5期24-27,31,共5页 Journal of Beijing Information Science and Technology University
基金 国家自然科学基金项目(61370139) 教育部人文社会科学项目(11YJC870011) 北京市教委科技计划面上项目(KM201211232014) 研究生教育提高项目(YJT201309)
关键词 差分隐私 隐私保护 查询日志 数据发布 匿名化 differential privacy privacy protection query log data release anonymization
  • 相关文献

参考文献10

  • 1李清华,康海燕,苑晓姣,X10NG Li,任俊玲.个性化搜索中用户兴趣模型匿名化研究[J].西安交通大学学报,2013,47(4):131-136. 被引量:7
  • 2Liu Junqiang, Wang Ke. Enforcing vocabulary k-anonymity by semantic similarity based clustering [ C ]//IEEE International Conference on Data Mining, 2010:899 - 904.
  • 3He Yeye, Jeffrey F. Anonymization of set- valued data via top-down local generalization I J]. Proceedings of the VLDB Endowment, 2009,2( 1 ) :934 -935.
  • 4Hong Yuan, He Xiaoyun, Jaideep Vaidya, et al. Effective anonymization of query logs [ C ]// CIKM "09 Proceedings of the 18th ACM conference on Information and knowledge management,2009 : 1465 - 1468.
  • 5Aleksandra Korolova, Krishnaram Kenthapadi, Nina Mishra, et al. Releasing search queries and clicks privately[ C ]//WWW 09 Proceedings of the 18th international conference on World wide web,2009 : 171 - 180.
  • 6Hong Yuan, Jaideep Vaidya, Lu Haibing, et al. Differentially private search log sanitization with optimal output utility [ C ] /// EDBT "12 Proceedings of the 15th International Conference on Extending Database Technology, 2012:50 -61.
  • 7Dwork C. Differential privacy [ C ]//Proc. 33ra International Colloquium on Automata, Languages and Programming, 2006 : 1 - 12.
  • 8McSherry F, Talwar K. Mechanism design via differential privacy [ J ]. Foundations of Computer Science ,2007:94 - 103.
  • 9Yabo Xu, Ke Wang, Benyu Zhang. Privacy- enhancing personalized web search [ C ]//WWW" 07 Proceedings of the 16th international conference on World Wide Web ,2007:591 -600.
  • 10田久乐,赵蔚.基于同义词词林的词语相似度计算方法[J].吉林大学学报(信息科学版),2010,28(6):602-608. 被引量:178

二级参考文献17

  • 1余刚,裴仰军,朱征宇,陈华月.基于词汇语义计算的文本相似度研究[J].计算机工程与设计,2006,27(2):241-244. 被引量:25
  • 2余慧佳,刘奕群,张敏,茹立云,马少平.基于大规模日志分析的搜索引擎用户行为分析[J].中文信息学报,2007,21(1):109-114. 被引量:117
  • 3程涛,施水才,王霞,吕学强.基于同义词词林的中文文本主题词提取[J].广西师范大学学报(自然科学版),2007,25(2):145-148. 被引量:11
  • 4关毅,王晓龙.基于统计的汉语词汇间语义相似度计算[C]//全国第七届计算语言学联合学术会议论文集,哈尔滨,2003:221-227.
  • 5YU Sheng-quan,HE Ke-kang.The Research of Adaptive Learning System Based on Internet[C] ∥The Third Global Chinese Computer Application Conference Analects.Macao,China:Macao University Press,1999:34-40.
  • 6梅家驹,竺一鸣,高蕴琦,等.同义词词林[M].上海:上海辞书出版社,1993:106-108.
  • 7刘群,李素建.基于"知网"的词汇语义相似度计算[C] ∥计算语言学与中文语言处理--第三届汉语词汇语义学研讨会论文集.台北:台北市中研院语言学研究所,2002:59-76.
  • 8SWEENEY L.Kanonymity: a model for protecting privacy[J].Int’l Journal on Uncertainty,Fuzziness and KnowledgeBased Systems,2002,10(5): 557-570.
  • 9MACHANAVAJJHALA A,GEHRKE J,KIFER D.lDiversity: privacy beyond Kanonymity [C]∥Proc of the 22nd Int’l Conf on Data Engineering.Piscataway,NJ,USA: IEEE Computer Society,2006: 24-35.
  • 10LI N,LI T,VENKATASUBRAMANIAN S.tCloseness: privacy beyond kanonymity and ldiversity [C]∥Proc of the 23rd Int’l Conf on Data Engineering.Piscataway,NJ,USA: IEEE Computer Society,2007: 106-115.

共引文献182

同被引文献10

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部