期刊文献+

一种基于GSNPP算法的社交网络隐私保护方法研究 被引量:14

Study on GSNPP Algorithm Based Privacy-preserving Approach in Social Networks
在线阅读 下载PDF
导出
摘要 随着网络信息技术的快速发展,社交网络迅速涌现。针对社交网络隐私保护问题,提出了一种基于GSNPP算法的隐私保护方法。它通过对社交网络中节点进行聚类,再对生成的簇进行簇内泛化及簇间泛化,来对社交网络进行匿名化处理,拟达到隐私保护的目的;同时量化了社交网络匿名化处理过程中所带来的不同类型信息的丢失。最后通过实验验证了该方法的可行性和有效性。 With the rapid development of network information technology, social networks have sprung up. For the protection of their privacy, we proposed a GSNPP algorithm-based privacy-preserving approach. By clustering the nodes in social networks, and then making generalization not only within cluster but also among clusters, the approach processes the social networks anonymously, to achieve the purpose of privacy protection, then quantifies the information loss of different types in the process of the anonymity of social networks. At last, the results of experiment demonstrate the feasibility and validity of the approach.
出处 《计算机科学》 CSCD 北大核心 2012年第3期104-106,共3页 Computer Science
基金 重庆市信息产业发展资金项目(200921011)资助
关键词 社交网络 隐私保护 聚类方法 K-匿名 Social networks, Privacy preserve, Cluster approach, k-anonymity
  • 相关文献

参考文献13

  • 1Hay M, Miklau G, Jensen D, et al. Anonymizing social networks [R]. 07-19. University of Massachusetts Amherst, 2007.
  • 2Liu K, Terzi E. Towards identity anonymization on graphs [C]// Proceedings of the 2008 ACM SIGMOD International Conference on Management of Data (SIGMOD' 08). New York, NY, USA, ACM Press, 2008 : 93.
  • 3Liu Kun, Das K, Grandison T, et al. Privacy preserving data analysis on graphs and social networks[C]//Kargupta H, Han J, Yu P, et al. , eds. Nexteneration Data Mining. CRC Press, 2008.
  • 4Zheleva E,Getoor L. Preserving the privacy of sensitive relationships in graph data[C]//Proeeedings of the 1st ACM SIGKDD Workshop on Privacy, Security, and Trust in KDD(PinKDD' 07). 20071153-171.
  • 5Han Jia-wei, Kamber M, Data Ming. Concepts and Techniques(第二版)[M].范明,阵小峰,译.北京:机械:工业出版社,2007:255-259.
  • 6Zhou Bin, Pei J ian, Luk W-S. A Brief Survey on Anonymization Techniques for Privacy Preserving Publishing of Social Network Data[J]. ACM SIGKDD Explorations, ACM Press, 2008, 10 (2) : 12-22.
  • 7Zhou B, Pei J. Preserving Privacy in Social Networks against Neighborhood Attacks[C]//IEEE International Conference on Data Engineering(ICDE). 2008 : 506-515.
  • 8Byun J W, Kamra A, Bertino E, et al. Efficient k-Anonymization using Clustering Techniques [C] // International Conference on Database Systems for Advanced Applications(DASFAA). 2007:188-200.
  • 9Blake E K C, Merz C J. UCI repository of machine learning databases[EB/OL], http//www, ics. uci. edu/-mlearn/MLReposi- tory. html, 1998.
  • 10岑婷婷,韩建民,王基一,李细雨.隐私保护中K-匿名模型的综述[J].计算机工程与应用,2008,44(4):130-134. 被引量:18

二级参考文献45

共引文献27

同被引文献103

  • 1杨煜尧,赵方,罗海勇,陶冶,蓝星灿.一种基于地理位置信息的移动互联网社交模型[J].计算机研究与发展,2011,48(S2):307-313. 被引量:11
  • 2周昌令,钱群,赵伊秋,尚群.校园无线网用户群体的移动行为聚集分析[J].通信学报,2013,34(S2):111-116. 被引量:4
  • 3周明,孙树栋.遗传算法原理及应用[M].北京:国防工业出版社,2005.
  • 4蔡莉,颜丽君.基于遗传算法的隐私自动协商机制研究[C].Internationalconferenceoninternet Technology and Applications 2010.
  • 5Rosenchein J S, Zlotkin G. Rulers of Encounter : Designing Conventions for Automated Negotia- tion among Computers [ M] . MIT Press, Cambridge, MA, 1994.
  • 6Carminati B,Frrari E,Petego A.Security and privacy in social networks[J].Encyclopedia of Information Science and Techno-logy,2009,7:3369-3376.
  • 7Sweeney L.K-anonymity:A model for protecting privacy[J].International Journal of Uncertainty,Fuzziness and Knowledge-based Systems,2002,0(5):557-570.
  • 8Hay M,Milau G,Jensen D,et al.Resisting structural reidentification in anonymized social networks[J].Proceedings of the VLDB Endowment,2008,1(1):102-114.
  • 9Liu Kun,Terzi E.Towards identity anony- mization on graphs[C]∥Proceedings of the ACM SIGMOD Conference.Vancouver,Canada,2008:93-106.
  • 10Zhou Bin,Pei Jian.Preserving privacy in social networks against neighborhood attack[C]∥IEEE 24th International Conference on Data Engineering.2008:506-515.

引证文献14

二级引证文献37

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部