期刊文献+

无线网络攻击中保护用户敏感隐私信息仿真 被引量:7

Simulation of User Sensitive Privacy Information in Wireless Network Attacks
在线阅读 下载PDF
导出
摘要 关于用户隐私信息保护方法的研究,可以更好的提高用户隐私数据的安全等级。在无线网络攻击中对隐私信息的保护需要先对数据进行匿名处理,将数据匿名属性逐步细分化,完成对隐私信息的保护。传统方法通过组建完整的用户隐私信息保护模型,对不同网络攻击形式下的隐私数据进行分类处理,但忽略了对数据进行匿名化处理,导致信息保护效果不理想。提出基于贪心理论(GSNPP)的用户隐私信息保护方法。对无线网络中隐私数据节点进行聚类,生成多个簇,通过簇内泛化及簇间泛化对多分簇攻击下的网络隐私数据进行匿名处理,结合指数机制将隐私数据匿名属性逐步细分化,评估全部用户隐私信息保护细分策略的可用性,以评估结果为依据完成用户隐私信息保护。实验结果表明,所提方法能够有效提升无线网络攻击下用户隐私信息保护效果。 A protection method for privacy information of user based on greed theory (GSNPP) is proposed.Firstly,the data node of privacy in wireless network is clustered to generate many clusters.The data of network privacy are processed anonymously under clusters attack through intra-cluster generalization and inter-cluster generalization.Then,the anonymity attribute of privacy data are subdivided gradually integrated with index mechanism,and the usability of subdivision strategy of protection for all users' privacy information is evaluated.Finally,the protection of privacy information is completed according to evaluation results.Experiment results show that the method can improve protection effect under attack of wireless network effectively.It has good robustness.
作者 韩立权
出处 《计算机仿真》 北大核心 2017年第3期277-280,共4页 Computer Simulation
关键词 无线网络攻击下 用户信息保护 隐私信息保护 Under the attack of wireless network User information protection Privacy information protection
  • 相关文献

参考文献10

二级参考文献141

  • 1王永胜,吴德伟,刘勇.基于NS2网络仿真研究[J].计算机仿真,2004,21(11):257-259. 被引量:15
  • 2杨晓春,刘向宇,王斌,于戈.支持多约束的K-匿名化方法[J].软件学报,2006,17(5):1222-1231. 被引量:60
  • 3张锋,常会友.基于分布式数据的隐私保持协同过滤推荐研究[J].计算机学报,2006,29(8):1487-1495. 被引量:17
  • 4ENCK W, GILBERT P, CHUN B G,et al. TaintDroid : an information- flow tracking system for real-time privacy monitoring on smartphones [ C ]//Proc of the 9th USENIX Conference on Operating Systems De- sign and Implementation. Berkeley : USENIX Association, 2010 : 255- 270.
  • 5WONDRACEK G, HOLZ T, KIRDA E,et al. A practical attack to de- anonymize social network users[ C ]//Proc of IEEE Symposium on Se- curity and Privacy. [ S. h ] :IEEE Computer Society,2010: 223-238.
  • 6CANNY J. Collaborative filtering with privacy [ C]//Proc of IEEE Symposium on Security and Privacy. [ S. 1. ] :IEEE Computer Society, 2002 : 45- 57.
  • 7KIOGH E, CHAKRABARTI K, PAZZANI M, et al. Dimensionality re- duction for fast similarity search in large time series databases [ J ]. Knowledge and Information Systems,2001,3(3) :263-286.
  • 8MILLER B N,KONSTAN J A, RIEDL J. PocketLens:toward a perso- nal recommender system[ J ]. ACM Trans on Information Systems, 2004,22 ( 3 ) :437- 476.
  • 9POLAT H, DU W. Privacy-preserving top-N recommendation on hori- zontally partitioned data[ C ]//Proc of IEEE/WIC/ACM International Conference on Web Intelligence. [ S. 1. ] : IEEE Computer Society, 2005 : 725- 731.
  • 10POLAT H, DU W. Knowledge discovery in databases [ C ]//Proc of PKDD. Berlin : Springer,2005.

共引文献42

同被引文献59

引证文献7

二级引证文献25

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部