期刊文献+

基于k-subgrap算法的社交网络隐私保护研究 被引量:1

Research of Personal Information Privacy Protection in Social Network Service Based on K-subgrap Algorithm
下载PDF
导出
摘要 针对社交网络隐私保护问题,本文提出一种新的隐私保护方法——k-subgraph划分算法,它通过对社交网络进行分割,通过泛化顶点标签和扰乱图的结构特征,来对社交网络进行匿名化处理,拟达到隐私保护的目的;仿真实验表明,该方法可以有效地保护社交网络中个体的隐私信息,同时保证了社交网络中匿名数据的可用性。 In view of the social network privacy protection issues, this paper proposes a new privacyprotection method - k - subgraph division rules, it through the social network segmentation, throughgeneralization vertex labels and disrupt the figure structure characteristics, come to anonymize the socialnetwork, is proposed to achieve the purpose of privacy protection; Simulation experiments show that thismethod can offer in a network of individual privacy protection, anonymous social network at the sametime also can guarantee availability.
出处 《科技通报》 北大核心 2015年第1期155-157,171,共4页 Bulletin of Science and Technology
基金 河南省科技攻关项目(No.122102210510)资助 河南省教育厅科技攻关项目(No.13A520786)资助
关键词 社交网络 隐私保护 隐私规则 泛化 数据发布 信息损失 social network service privacy protection the privacy rule generalization information loss data publication
  • 相关文献

参考文献3

二级参考文献47

  • 1罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 2Boyed D, Ellison N. Social network sites:Definition, history, and scholarship [J]. Journal of Computer- Mediated Communication, 2008, 13(1): 201-230.
  • 3Nagy J, Pecho P. Social network security [C]// Proceedings of the 3rd IEEE International Conference on Emerging Security Information, Systems and Technologies. Athens, Greece.. IEEE Computer Society, 2009: 321-325.
  • 4Douglis F. It's all about the (social) network[J]. IEEE Internet Computing, 2010, 14(1): 4-6.
  • 5Limsaiprom P, Tantatsanawong P. Social network anomaly and attack patterns analysis[C]//Proceedings of the 6th IEEE International Conference on Networked Computing. Heidelberg, Germany: IEEE Press, 2010: 11-13.
  • 6Hogben G. Security issues in the future of social networking[R/OL]. W3C Workshop on the Future of Social Networking, 2009 [2011-04-20]. http://www. w3. org/2008/09/msnws/papers/Future_of_ SN_ Giles_Hogben_ENISA. pdf.
  • 7Poppe R. Scalable face labeling in online social networks [C]// IEEE International Conference on Automatic Face & Gesture Recognition and Workshops. California, USA: IEEE Press, 2011: 566-571.
  • 8Jagatic T, Johnson N, Jakobsson M, et al. Social phishing[J]. Communications of the ACM, 2007, 50(3) : 94-100.
  • 9Douceur J R. The sybil attack[J]. Lecture Notes in Computer Science, 2002, 2 429: 251-260.
  • 10Ge M, Lam K, Wang X Q, et al. VisualSec.. A secure message delivery scheme for online social networks based on profile images [C]// Proceedings of GLOBECOM'09 : Global Telecommunications Conference. HI, USA: IEEE Press, 2009: 1-6.

共引文献57

同被引文献4

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部