期刊文献+

改进的k度匿名图构造算法

Improved Algorithm for Constructing k-Degree Anonymous Graphs
下载PDF
导出
摘要 在社交网络中,为防范用户隐私泄漏,在用户数据发布前需要做匿名化处理.针对以节点度数为背景知识的隐私攻击,将社交网络匿名化问题建模为图的k度匿名化问题;其主要方法是对图添加尽可能少的边或点来满足度匿名化要求,其中要求添加边或点较少是期望尽可能保持原图结构特性.目前,加边类算法并不能很好地保留平均路径长度等结构特性;加边且可加点类算法尽管能更好地保留原图结构特性,但添加的边或点较多.本文融合两类算法的策略提出改进算法.新算法利用贪心法生成匿名度序列,然后基于社区结构加边,并且优先满足其匿名代价高于平均匿名代价的节点的匿名化要求;若加边不能完成匿名化,则通过加点实现图匿名化.真实数据集上的实验结果表明新算法能更好地保留图的几种典型的结构特性,并且添加的边或点更少. In social networks,anonymization processing is required to prevent the leakage of user privacy before user data is released.In this study,the social network anonymization is modeled as the k-degree anonymization of graphs given the privacy attack with the background of node degrees.The major method is to add as few edges or nodes as possible to the graph to meet the degree-anonymization requirements,and by doing this,the structural characteristics of the original graph are expected to be maintained to a large extent.At present,the edge-adding algorithms cannot well retain the basic structural characteristics such as the average path length,while the edge-node adding algorithms can better retain the structural characteristics of the original graph after adding many edges or nodes.Considering this situation,this study proposes an improved algorithm combining the two algorithms.Firstly,the greedy algorithm is used to generate the anonymity sequence,and then the edge-adding operation is performed on the basis of the community structure.The anonymization requirements of nodes with higher anonymity costs than the average anonymity costs are satisfied first,and node adding can be applied to the graph when edge adding cannot complete the anonymization.The experimental results of actual datasets show that the new algorithm can better retain several typical structural characteristics of the graph,and the number of added edges or nodes is less.
作者 曾滔 ZENG Tao(School of Computer Science,South China Normal University,Guangzhou 510631,China)
出处 《计算机系统应用》 2022年第5期157-164,共8页 Computer Systems & Applications
关键词 社交网络 隐私保护 k度匿名化 度序列 加边 加点 复杂网络 social network privacy protection k-degree anonymization degree sequence edge adding node adding complex network
  • 相关文献

参考文献2

二级参考文献114

  • 1汪小帆,李翔,陈关荣.2012网络科学导论(北京:高等教育出版社),第161页.
  • 2Crandall D, Cosley D, Huttenlocher D, et al. Feedback effects between similarity and social influence in online communities/ /Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. New York, USA, 2008: 160-168.
  • 3Moreno J L, Jennings H H. Who Shall Survive?: A New Approach to the Problem of Human Interrelations. Washington: Nervous and Mental Disease Publishing Coorperation , 1934.
  • 4Scott J P. Social Network Analysis: A Handbook. 2nd Edition. London: SAGE Publications, 2000.
  • 5Freeman L C. The Development of Social Network Analysis: A Study in the Sociology of Science. Vancouver: Empirical Press, 2004.
  • 6Leskovec J, Horvitz E. Planetary-scale views on a large instant-messaging network/ /Proceedings of the 17th International Conference on World Wide Web. New York, USA, 2008: 915-924.
  • 7Adamic L. Adar E. Friends and neighbors on the Web.Social Networks, 2003, 25(3): 211-230.
  • 8Park H W, Thelwall M. Hyperlink analyses of the World Wide Web: A review. Journal of Computer-Mediated Communication, 2003, 8(4).
  • 9Easley D, Kleinberg J. Networks, Crowds. and Markets: Reasoning about a Highly Connected World. New York: Cambridge University Press. 2010.
  • 10Leskovec J. Lang K J, Dasgupta A, Mahoney M W. Statistical properties of community structure in large social and information networks/ /Proceedings of the 17th International Conference on World Wide Web. New York, USA, 2008: 695-704.

共引文献67

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部