期刊文献+

保护私有信息的社交网络合群判定

Privacy-preserving join decision in social networks
原文传递
导出
摘要 为了解决社交网络中用户申请加入群组的合适性判断问题,将安全多方计算技术中的求和协议与秘密比较协议相结合提出了保护私有信息的合群判定协议.其中基础协议解决一维线性模型下问题的安全求解,扩展协议对基于圆边界的多维模型情况进行判定.针对单一申请者与网络群组多用户的特点,将问题转换为两方计算模型可实现的形式,在证明了协议正确性的基础上分析协议的复杂度,并且利用安全视图的方法逐步验证了在协议执行过程中不会泄露任何个人的隐私数据.实际使用中协议能够有效地回避盲目的系统推荐和管理员离线所产生的判定时延,同时保护申请者和群组成员的隐私数据. ABSTRACT In order to decide the appropriateness of a new user applying to join in a group in the social network, a privacy-preserving protocol was designed by the secure sum protocol and secure comparison protocol. In the privacy-preserving protocol, the secure basis protocol was devised for problems under a one-dimensional linear model, and the advanced protocol for a multi-dimensional model with a circular boundary. For the case of a single applicant and a multi-user group, the solution was converted and realized in a two-party computation model. After the proof of correctness, the complexity was discussed, and there is no leaking message during the process by the analysis of data views in each step. The privacy-preserving protocol avoids not only the blindness of auto recommendation by the net-system but also the decision delay due to the administrator's offline. In the meanwhile, the privacy of the applicant and group members can be protected without leaking any information.
出处 《北京科技大学学报》 EI CAS CSCD 北大核心 2014年第5期695-700,共6页 Journal of University of Science and Technology Beijing
关键词 社交网络 数据保密 网络安全 网络协议 social networks security of data network security network protocols
  • 相关文献

参考文献14

  • 1Dung L T, Bao H T. A distributed solution for privacy preserving outlier detection//3rd International Conference on Knowledge and Systems Engineering. Hanoi, 2011 : 26.
  • 2Lin H, Zhu Q S. A spectral clustering-based dataset structure analysis and outlier detection progress. J Comput Inf Syst, 2012, 8(1): 115.
  • 3Yao A C C. Protocol for secure computations (extended abstract) //21st Annual IEEE Symposium FCS. New York, 1982:160.
  • 4江峰,杜军威,眭跃飞,曹存根.基于边界和距离的离群点检测[J].电子学报,2010,38(3):700-705. 被引量:24
  • 5Zhou Z Y, Huang L S, Yang W, et al. Privacy preserving outlier detection over vertically partitioned data // International Confer- ence on E-business and Information System Security. Wuhan, 2009 : 1.
  • 6Zhang Y Y, Chao H C, Chen M, et al. Outlier detection and countermeasure for hierarchical wireless sensor networks. IET Inf Secur, 2010, 4(4) : 361.
  • 7Du W L, Atallah M J. Secure multi-party computation problems and their applications: a review and open problems// NSPW31 Proceedings of the 2001 Workshop on New Security Paradigms.New Mexico, 2001 : 13.
  • 8Li L, Huang L S, Yang W, et al. Privacy-preserving outlier de- tection over arbitrarily partitioned data//3rd International Sympo- sium on Information Engineering and Electronic Commerce. Huang- sbi, 2011:147.
  • 9Pareek V, Mishra A, Sharma A, et al. A deviation based outlier intrusion detection system. Commun Comput Inf Sci, 2010, 89 : 395.
  • 10李顺东,司天歌,戴一奇.集合包含与几何包含的多方保密计算[J].计算机研究与发展,2005,42(10):1647-1653. 被引量:21

二级参考文献39

共引文献70

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部