期刊文献+

社交网络中攻击背景下个人隐私泄露度量研究 被引量:5

Leakage metrics of personal privacy under attack background in social network
下载PDF
导出
摘要 社交网络中隐私泄露受多种因素的影响,针对不能有效度量隐私泄露的问题,尤其是在攻击者拥有背景知识的时候,必须综合考虑背景知识来设计隐私泄露度量方法.构建一个个人隐私泄露多维分析模型,对隐私泄露的影响因素进行较全面的分析,结合泄露指标的计算,推导出影响较大的因素.提出一种背景知识分类和量化方法,能划分关键背景知识和非关键背景知识;在此基础上提出一个攻击背景下隐私泄露度量信息熵模型和隐私泄露的综合度量方法,解决隐私泄露有效度量的问题.所提出的模型和背景知识量化方法可为攻击背景下隐私泄露风险分析与评估提供可行的计算基础,实验验证和分析结果表明度量模型是可行的、有效的. Aiming at the problem of accurate measurement of privacy leakage in social networks,especially when attackers has attack background knowledge,while privacy leakage is affected by many factors,a privacy leakage metrics method considering background knowledge should be considered comprehensively.A multi⁃dimensional analysis model for personal privacy leakage is proposed in this paper.Influencing factors of privacy leakage can be analyzed comprehensively.The greater influencing factor is deduced through calculation of leakage index.A method of classification and quantification of background knowledge is proposed,which can distinguish key background knowledge and non key background knowledge.On this basis,an information entropy model and a comprehensive measurement method of privacy leakage are proposed to solve the problem of measuring privacy leakage accurately.The proposed model and background knowledge quantification method can provide a favorable support for the quantitative research on the impact of attack background knowledge.Experimental verification and analysis results show that the measurement model is feasible and effective.
作者 胡文彬 张宏宇 王晨曦 王倪传 李慧 Hu Wenbin;Zhang Hongyu;Wang Chenxi;Wang Nizhuan;Li Hui(School of Computer Engineering,Jiangsu Ocean University,Lianyungang,222005,China;School of Computer And Information,Hohai University,Nanjing,210098,China)
出处 《南京大学学报(自然科学版)》 CAS CSCD 北大核心 2021年第2期289-298,共10页 Journal of Nanjing University(Natural Science)
基金 国家自然科学基金(61701318),江苏省高校自然科学研究项目(18KJB416001) 江苏省六大人才高峰(SWYY⁃017) 连云港市第五期“521高层次人才培养工程”(zkk201604)。
关键词 社交网络 背景知识 隐私泄露 隐私攻击 泄露度量 信息熵 泄露风险分析 social network background knowledge privacy disclosure privacy attack leakage metrics information entropy leakage risk analysis
  • 相关文献

参考文献11

二级参考文献114

  • 1赵克勤.集对分析对不确定性的描述和处理[J].信息与控制,1995,24(3):162-166. 被引量:150
  • 2Armbrust M, Fox A, Griffith R, et al. Above the clouds: A Berkeley view of cloud computing [EB/OL]. [2014-07-02]. http://x-integrate, de/x-in-cms, nsf]id/DE Von Regenmachern und Wolkenbruechen _-_ Impact _ 2009 _ Nachlese/MYMfile/ abovetheclouds, pdf.
  • 3Harauz J, Kaufman L M, Potter B. Data security in the world of cloud computing [J]. IEEE Security & Privacy, 2009, 7(4): 61-64.
  • 4McMillan R. Cloud computing a ' security nightmare', says Cisco CEO [EB/OL]. [ 2014- 07 -02 ]. http://www. networkworld, comnews/2009/042309-cloud-computing-a- security-nightmare, html.
  • 5Virvilis N, Dritsas S, Gritzalis D. Secure cloud storage; Available infrastructures and architectures review and evaluation [G] //LNCS 6863". Proc of Trust, Privacy and Security in Digital Business. Berlin~ Springer, 2011, 74-85.
  • 6Rivest R, Adleman L, Dertouzos M. On data banks and privacy homomorphisms [J]. Foundations of Secure Computation, 1978, 4(11)~ 169-180.
  • 7Rivest R, Shamir A, Adleman L. A method for obtaining digital signatures and public-key cryptosystems [J]. Communications of the ACM, 1978, 21(2) : 120-126.
  • 8Rappe R. Homomorphic cryptosystems and their applications [D]. Dortmund, Germany~ University of Dortmund, 2004.
  • 9E1Gamal T. A public-key cryptosystem and a signature scheme based on discrete logarithms [J]. IEEE Trans on Information Theory, 1985, 31 (4) ~ 469-472.
  • 10Paillier P. Public-key cryptosystems based on composite degree residuosity classes [G] //LNCS 1592: Proc of Eurocrypt'99. Berlin: Springer, 1999: 223-238.

共引文献172

同被引文献48

引证文献5

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部