期刊文献+

分布式个性化社会网络隐私保护方法 被引量:1

Distributed Personalized Social Privacy Protection Method
下载PDF
导出
摘要 提出了一种基于图结构扰乱的分布式个性化社会网络隐私保护方法 DP-GSPerturb(Distributed personalized graph structure perturbation).该方法在分布式环境下,以节点为中心,通过节点间消息传递和节点值更新,查找敏感源节点的可达节点,传递可达信息给敏感源节点,随机扰乱敏感源节点的连接关系,实现敏感连接关系的个性化隐私保护.实验结果表明,DP-GSPerturb方法提高了处理大规模社会网络图数据的效率和数据发布的可用性. DP-GSPerturb is a distributed personalized social privacy protection method based on graph structure perturbation; it is proposed to solve sensitive link privacy issues in personalized social networks. The method is a node-centric method that searches reachable nodes of sensitive source nodes, transfers reachable information to sensitive source nodes, and randomly perturbs links of sensitive source nodes through between-node messaging, node value updating to achieve the personalized privacy protection of sensitive link in the distributed environment. The experimental results show that DP-GSPerturb improves not only the processing speed of large-scale graph data but also the availability of data published.
出处 《微电子学与计算机》 CSCD 北大核心 2017年第6期72-77,83,共7页 Microelectronics & Computer
基金 国家自然科学基金项目(61562065)
关键词 分布式 社会网络 个性化隐私保护 图结构扰乱 边隐私 distributed social network personalized privacy protection graph structure perturbation link privacy
  • 相关文献

参考文献1

二级参考文献12

  • 1Yang Jun, Liu Xiangyu, Yang Xiaochun. Automorphism liased K-secuuure for privacy in social network [ C ]//Proc of the 29(h Data-base of China Academic Conference. Heijing : Computer Researchand Development, 2012 : 264- 271.
  • 2Hay M, Miklau G, Jensen D,et al. Resisting structural re-identifica-tion in anonymized social networks [ J]. VLDB,2008,1 ( 1 ) : 102-114.
  • 3Liu Kun, Terzi E. Towards identity anonymization on graphs[ C ]//Proc of ACM SIGMOD International Conference on Management ofData. New York:ACM Press,2008 :93-106.
  • 4Chester S, Gaertner J, Stege U, et al. Anonymizing subsets of socialnetworks with degree constrained subgraphs [ C ] //Proc of Internation-al Conference on Advances in Social Networks Analysis and Mining.2012:418-422.
  • 5Chester S, Kapron B, Ramesh G,et al. A;-anonymization of socialnetworks by vertex addition [ C]//Proc of ADBIS Research Communi-cations. Vienna : Austrian Computer Society. 2011 : 107-116.
  • 6Yuan Mingxuan, Chen Lei, Yu P S. Personalized privacy protectionin social networks[ J]. VLDB,2010,4(2) :141-150.
  • 7Chester S,Kapron B M,Srivastava G, et al. Complexity of socialnetwork anonymization [ J ] . Social Network Analysis and Mining,2013,3(2) :151-166.
  • 8Zhou Bin, Pei Jian. The /c-anonymity and /-diversity approaches forprivacy preservation in social networks against neighborhood attacks[J]. Know-ledge and Information Systems,2011,28(1) :47-77.
  • 9Yuan Mingxuan, Chen Lei, Yu PS, et al. Protecting sensitive labelsin social network data anonymization [ J ]. IEEE Trans on Know-ledge and Data Engineering,2013,25(3) :633-647.
  • 10Xiao Xiaokui, Tao Yufei. Anatomy : simple and effective privacypreservation [ C ] //Proc of the 32nd International Conference on VeryLarge Data Bases. 2006 : 139-150.

共引文献1

同被引文献9

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部