期刊文献+

针对社交网络边权重的差分隐私保护 被引量:3

Differential privacy protection for social network edge weights
下载PDF
导出
摘要 针对社交网络边权重隐私保护中的弱保护和最短路径不可分析问题,提出一种满足差分隐私保护模型的边权重保护策略。将社交网络划分为全次图、缺次图、零次图,设计扰动方案及查询函数,对不同图进行查询获取其边权重并按扰动方案对不同的边权重添加不同的Laplace噪声,实现抵御攻击者拥有最大背景知识的攻击的边权重隐私保护,保证一组节点的最短路径不变,且其长度与原路径长度相近。该策略有强保护性及最短路径可分析性,从理论上验证了算法的可行性,通过实验验证了算法的正确性。 Aiming at the weak protection and unanalysable shortest path in the edge weight privacy protection of social network,an edge weight protection strategy based on differential privacy model was proposed.The social network was divided into whole-timesgraph,sub-times-graph and zero-times-graph.By designing the perturbation scheme and the query function,the edge weights of the different graphs were got and the different Laplace noise was added to different edge weights according to the perturbation scheme.The edge weight privacy protection against the attacker with the largest background knowledge was realized,and the shortest path of a group of nodes was kept unchanged and its length was close to the original path length.The strategy has strong protection ability and analysable shortest path.The feasibility of the algorithm is proved theoretically,and the correctness of the algorithm is verified by experiments.
出处 《计算机工程与设计》 北大核心 2018年第1期44-48,共5页 Computer Engineering and Design
关键词 社交网络 边权重 隐私保护 差分隐私 数据挖掘 social network edge weight privacy protection differential privacy data mining
  • 相关文献

参考文献11

二级参考文献223

  • 1张勇,倪巍伟,崇志宏,胡新平.基于邻域相关性的面向聚类数据扰动方法[J].计算机研究与发展,2011,48(S3):79-85. 被引量:1
  • 2杨煜尧,赵方,罗海勇,陶冶,蓝星灿.一种基于地理位置信息的移动互联网社交模型[J].计算机研究与发展,2011,48(S2):307-313. 被引量:11
  • 3Hay M, Miklau G, Jensen D, et al. Anonymizing social networks [R]. 07-19. University of Massachusetts Amherst, 2007.
  • 4Liu K, Terzi E. Towards identity anonymization on graphs [C]// Proceedings of the 2008 ACM SIGMOD International Conference on Management of Data (SIGMOD' 08). New York, NY, USA, ACM Press, 2008 : 93.
  • 5Liu Kun, Das K, Grandison T, et al. Privacy preserving data analysis on graphs and social networks[C]//Kargupta H, Han J, Yu P, et al. , eds. Nexteneration Data Mining. CRC Press, 2008.
  • 6Zheleva E,Getoor L. Preserving the privacy of sensitive relationships in graph data[C]//Proeeedings of the 1st ACM SIGKDD Workshop on Privacy, Security, and Trust in KDD(PinKDD' 07). 20071153-171.
  • 7Han Jia-wei, Kamber M, Data Ming. Concepts and Techniques(第二版)[M].范明,阵小峰,译.北京:机械:工业出版社,2007:255-259.
  • 8Zhou Bin, Pei J ian, Luk W-S. A Brief Survey on Anonymization Techniques for Privacy Preserving Publishing of Social Network Data[J]. ACM SIGKDD Explorations, ACM Press, 2008, 10 (2) : 12-22.
  • 9Zhou B, Pei J. Preserving Privacy in Social Networks against Neighborhood Attacks[C]//IEEE International Conference on Data Engineering(ICDE). 2008 : 506-515.
  • 10Byun J W, Kamra A, Bertino E, et al. Efficient k-Anonymization using Clustering Techniques [C] // International Conference on Database Systems for Advanced Applications(DASFAA). 2007:188-200.

共引文献331

同被引文献14

引证文献3

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部