期刊文献+

支持隐私保护的社交网络信息推荐方法 被引量:4

Social network information recommendation method of supporting privacy protection
原文传递
导出
摘要 针对社交网络信息推荐中的信息传播带来隐私泄露的问题,结合信息传播模型,提出了一种支持隐私保护的社交网络信息推荐方法,通过好友的兴趣度、熟悉度和兴趣相似度推测用户兴趣,进行文本匹配和推荐候选集排序;通过个性化隐私偏好设置允许用户设置受限访问用户列表,并使用隐私保护方法计算信息传播至黑名单用户的概率,设置隐私泄露阈值对黑名单用户访问隐私博文的概率进行控制,达到信息推荐中保护用户隐私的目的。实验结果表明,所提方法可以在保证推荐效果的同时更好地保护用户隐私。 Aiming at the problem of privacy disclosure caused by information dissemination in social network information recommendation, a kind of social network information recommendation method that supports privacy protection is proposed in combination with information dissemination model. Users′ interests are predicted by friends′ interest, familiarity and interest similarity, and then text matching and recommendation candidate set sorting are carried out. Through personalized privacy preference setting, users are allowed to set restricted access to user list, and privacy protection method is used to calculate the probability of information spreading to blacklist users, and privacy disclosure threshold is set to control the probability of blacklist users accessing privacy blog posts to protect user privacy in information recommendation. Experimental results show that the proposed method can guarantee the recommendation effect and protect user privacy better.
作者 张超 梁英 方浩汕 ZHANG Chao;LIANG Ying;FANG Hao-shan(Research Center for Ubiquitous Computing Systems,Institute of Computing Technology,Chinese Academy of Sciences,Beijing 100190,China;School of Artificial Intelligence,University of Chinese Academy of Sciences,Beijing 100049,China;School of Software Engineering,Shandong University,Jinan 250101,Shandong,China)
出处 《山东大学学报(理学版)》 CAS CSCD 北大核心 2020年第3期9-18,共10页 Journal of Shandong University(Natural Science)
基金 国家重点研发计划项目(2018YFB1004704,2016YFB0800403)。
关键词 社交网络 信息推荐 隐私保护 访问控制 数据挖掘 social network information recommendation privacy protection access control data mining
  • 相关文献

参考文献2

二级参考文献14

  • 1曾鸿.信息老化测度与评估[J].中国管理信息化(综合版),2006,9(11):88-89. 被引量:3
  • 2段宇锋.网络信息资源老化规律研究[J].图书情报知识,2005,22(4):28-31. 被引量:40
  • 3DENNING D E. A lattice model of secure information flow [ J ]. Communications of the ACM, 1976, 19 ( 5 ) : 236-243.
  • 4GAO Feng, HE Jingsha, PENG Shufen,et al. An approach for privacy protection based-on ontology[ C ]// Proceedings of the 2nd International Conference on Networks Security, Wireless Communications and Trusted Computing. Wash- ington: IEEE Computer Society, 2010: 24-25.
  • 5SANDHU R S. Lattic-based access control model [J ]. IEEE Computer, 1993, 26 ( 11 ) :9-19.
  • 6GAO Feng, HE Jingsha, PENG Shufen, et al. A quantif- ying metric for privacy protection based-on information theory [ C ]// Proceedings of the 3rd International Sympo- sium on Intelligent Information Technology and Security Informatics. Washington : IEEE Computer, 2010 : 2-4.
  • 7LI Min, WANG Hua, DAVID Ross. Trust-based access control for privacy protection in collaborative environment [ C ]// Proceedings of 2009 IEEE International Confer- ence on e-Business Engineering. Washington: IEEE Computer Society, 2009 : 21-23.
  • 8GIANG P D, HUNG L X, SHAIKH R A, et al. Trust- based approach to control privacy exposure in ubiquitous computing environments [ C ] // Proceedings of 2007 IEEE International Conference on Pervasive Services. Washing- ton: IEEE Computer Society, 2001: 5-207.
  • 9LU Yi, WANG Weichao, XU Dongyan, et al, Trust- based privacy preservation for peer-to-peer data sharing[ J ]. IEEE Transactions on Systems, Man, and Cybernet- ics, 2006, 36(3 ) :498-502.
  • 10Dion Hoe‐LianGoh,Peng KinNg.Link decay in leading information science journals[J].J Am Soc Inf Sci.2006(1)

共引文献15

同被引文献59

引证文献4

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部