期刊文献+

基于个性化k匿名隐私保护的资源推荐算法

Resource Recommendation Algorithm Based on K-anonymity for Generalizing User Query Requests
下载PDF
导出
摘要 现有资源推荐算法依据用户喜好来进行资源推荐,未考虑用户主观并不愿意个人隐私或者兴趣爱好受到数据挖掘,也未考虑第三方服务器存在隐私泄露的危险。为解决用户的隐私保护问题,本文提出个性化k匿名隐私保护算法,将用户查询请求中的敏感属性经泛化后,构造逻辑上的匿名化查询请求等价类,采用数据轮转的方式使同一等价类中的用户相互随机转发接收到的其他用户的数据;由于每个人想要保护的隐私属性不同,其敏感属性的权重各不相同,故本文提出基于敏感属性的权重求和公式结合用户自主设置的敏感属性权重值,为平台用户推荐最优选择方案。安全性分析表明该方法有效抵御相似性攻击、背景知识攻击、俘获服务器攻击。实验表明,在牺牲一定时间效率的情况下该方法不仅满足匹配结果的正确性,且加强了资源推荐过程中隐私保护性能。 Existing resource recommendation algorithms make resource recommendation based on user preferences,without considering the subjective reluctance of users to personal privacy or the data mining of interests and hobbies,or the risk of privacy disclosure of third-party servers.To solve the problem of user privacy,this paper puts forward the K-anonymous privacy protection algorithm.After the generalization of sensitive attributes of user query requests,it constructs a logical anonymous query request equivalence class,uses the method of data rotary to enable users in the same equivalence class to randomly forward the received data from other users.Because the privacy attributes that each person wants to protect are different,the weight of its sensitive attribute is different,so this paper proposes the weight summation formula based on the sensitive attribute combined with the sensitive attribute weight value set by the user independently,and recommends the optimal selection scheme for the platform user.The security analysis shows that this method can effectively resist similarity attack,background knowledge attack and capture server attack.Experiments show that this method not only satisfies the correctness of matching results,but also enhances the privacy protection performance in the process of resource recommendation.
作者 彭丽寻 刘丰恺 Peng Li-xun;Liu Feng-kai(Jiangsu University,Zhenjiang 212013,Jiangsu)
出处 《电脑与电信》 2020年第6期66-73,共8页 Computer & Telecommunication
关键词 隐私保护 资源推荐 匿名 敏感属性 泛化 privacy protection resource recommendation anonymity sensitivity generalization
  • 相关文献

参考文献10

二级参考文献137

  • 1余力,刘鲁.电子商务个性化推荐研究[J].计算机集成制造系统,2004,10(10):1306-1313. 被引量:104
  • 2姜传贤,孙星明,易叶青,杨恒伏.基于JADE算法的数据库公开水印算法的研究[J].系统仿真学报,2006,18(7):1781-1784. 被引量:9
  • 3Shardanand U, Maes P. Social information filtering: Algorithms for automating "Word of Mouth". In: Proc. of the Conf. on Human Factors in Computing Systems. New York: ACM Press, 1995.210-217.
  • 4Hill W, Stead L, Rosenstein M, Furnas G. Recommending and evaluating choices in a virtual community of use. In: Proc. of the Conf. on Human Factors in Computing Systems. New York: ACM Press, 1995. 194-201.
  • 5Resnick P, Iakovou N, Sushak M, Bergstrom P, Riedl J. GroupLens: An open architecture for collaborative filtering of netnews. In: Proc. of the Computer Supported Cooperative Work Conf. New York: ACM Press, 1994. 175-186.
  • 6Baeza-Yates R, Ribeiro-Neto B. Modern Information Retrieval. New York: Addison-Wesley Publishing Co., 1999.
  • 7Murthi BPS, Sarkar S. The role of the management sciences in research on personalization. Management Science, 2003,49(10): 1344-1362.
  • 8Smith SM, Swinyard WR. Introduction to marketing models. 1999. http://marketing.byu.edu/htmlpages/courses/693r/modelsbook/ preface.html
  • 9Adomavicius G, Tuzhilin A. Toward the next generation of recommender systems: A survey of the state-of-the-art and possible extensions. IEEE Trans. on Knowledge and Data Engineering, 2005,17(6):734-749.
  • 10Resnick P, Varian HR. Recommender systems. Communications of the ACM, 1997,40(3):56-58.

共引文献1538

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部