期刊文献+

基于信息混淆的社会网络隐私保护机制 被引量:3

Research on information mixing-based protection mechanism in online social networks
下载PDF
导出
摘要 提出了一种基于信息混淆的社会网络隐私保护机制,其原理在于对整个社会网络里的隐私信息进行混淆,而非加密,使得需要保护的隐私信息以环形结构在社会网络里扩散开来。该机制以非集中化的方式工作,由用户之间的相互协作来保护用户的隐私信息。以"人人网"为平台,利用Firefox的扩展开发功能实现了该隐私保护的核心机制,证明了其可行性与可用性。该机制能够保证多方面的利益:要求隐私保护的主体用户、广告商、经过授权的用户及第三方应用。 A privacy protection mechanism based on information mixing is proposed. The principle of privacy-buddy mechanism ismixing private information in the to be spread in a ring-like way entiresocialnetwork, butnottheencryptionofprivateintormation, whichallowsprlvatelntormation The mechanism works in a decentralized way and does not need centralized trusted third-party server. Users protect their privacy through collaboration. A version of PB on renren.com as a Firefox extension is implemented. This version provides evidence for feasibility and availability of the core mechanism. Our mechanism can ensure the interests of multiple aspects: users demanding privacy protection, advertisers and authorized users or third-party applications requiring access to private information.
作者 南丽丽 吴涛
出处 《计算机工程与设计》 CSCD 北大核心 2011年第10期3278-3283,共6页 Computer Engineering and Design
关键词 社会网络 隐私保护 信息混淆 隐私环 广告隐私 social network privacy protection information mixing privacy ring advertisement privacy
  • 相关文献

参考文献17

  • 1ChoicePoint,http ://en.wikipedia.org/wiki/ChoicePoint[OL] .2011. 被引量:1
  • 2Ralph Gross, Alessandro Acquisti, John Heinz H. Information revelation and privacy in online social networks[C].Proceedings of the ACM Workshop on Privacy in the Electronic Society.New York,NY, USA:ACM,2005:71-80. 被引量:1
  • 3Lain Ieng-Fat, Chen Kuan-Ta,Chen Ling-Jyh.Involtmtary infor- mation leakage in social network services[C].Proceedings of the 3rd International Workshop on Security:Advances in Informa- tion and Computer Security.Berlin,Heidelberg:Springer-Verlag, 2008:167-183. 被引量:1
  • 4Shane Ahem,Dean Eckles,Nathaniel Good,et al.Over-exposed?: privacy patterns and considerations in online and mobile photo sharing[C].Proceedings of the SIGCHI Conference on Human Factors in Computing Systems.New York,NY, USA:ACM,2007: 357-366. 被引量:1
  • 5Leyla Bilge, Thorsten Strufe, Davide Balzarotti, et al. All your contacts are belong to us:automated identity theft attacks on so- cial networks[C].Proceedings of the 18th International Conference on World Wide Web. New York, NY, USA: ACM, 2009:551- 560. 被引量:1
  • 6Elena Zheleva, Lise Getoor.To join or not to join: the illusion of privacy in social networks with mixed public and private user profiles[C].Proceedings of the 18th International Conference on World Wide Web.New York,NY, USA:ACM,2009:531-540. 被引量:1
  • 7Alan Mislove,Bimal Viswanath,Krishna P Gummadi,et al.You Are who you know: inferring user profiles in online social net- works[C].Proceedings of the third ACM International Conference on Web Search and Data Mining. New York, NY, USA: ACM, 2010:251-260. 被引量:1
  • 8Aleksandra Korolova, Rajeev Motwani, Shubha U Nabar, et al. Link privacy in social networks[C].Proceeding of the 17th ACM Conference on Information and Knowledge Management.New York,NY, USA:ACM,2008:289-298. 被引量:1
  • 9Randolph Baden,Adam Bender,Neil Spring, et al.Persona:an on- line social network with user-defined privacy[C].Proceedings of the ACM SIGCOMM Conference on Data Communication.New York,NY, USA:ACM,2009:135-146. 被引量:1
  • 10Amin Tootoonchian, Stefan Saroiu, Yashar Ganjali, et al.Lockr: better privacy for social networks[C].Proceedings of the 5th In- ternational Conference on Emerging Networking Experiments and Technologies.New York,NY, USA:ACM,2009. 被引量:1

同被引文献45

  • 1赵耘华,白光伟,沈航.基于消息复用的位置服务隐私保护算法[J].微电子学与计算机,2015,32(2):148-152. 被引量:2
  • 2陈鸿鹄.智能图书馆设计思想及结构初探[J].现代情报,2006,26(1):116-118. 被引量:67
  • 3Bhagat S,Cormode G,Krishnamurthy B,et al.Class-based graph anonymization for social network data[C] //Proc of the35th Int’l Conf on Very Large Databases,2009:766-777. 被引量:1
  • 4Gao J,Xu JY,Jin R,et al.Neighborhood-privacy protected shortest distance computing in cloud[C] //Proc of the ACM SIGMOD Int’l Conf on Management of Data,2011:409-420. 被引量:1
  • 5杨俊,刘向宇,杨晓春,等.基于图自同构的k-Secure社会网络隐私保护方法[C] //第29届中国数据库学术会议论文集,2012:264-271. 被引量:2
  • 6Zhelea E,Getdoor L.Preserving the privacy of sensitive relationships in graph data[C] //Proceedings of the 1st ACM SIGKDD Workshop on Privacy,Security,and Trust in KDD,2007. 被引量:1
  • 7Li J,Han J M,Luo F W,et al.K-Sensitive edge anonymity model for sensitive relationship preservation on publishing social network[C] //The 3rd International Conference on Information Technology and Computer Science,2011:146-149. 被引量:1
  • 8Zheleva E,Getoor L.Preserving the privacy of sensitive relationships in graph data[C] //Proc of the 1st ACM SIGKDD Workshop on Privacy,Security,and Trust in KDD,2007:153-171. 被引量:1
  • 9Campan A,Truta T M,Cooper N.P-sensitive K-anonymity with generalization constraints[J] .Transactions on Data Privacy Journal,2010,3(2):65-89. 被引量:1
  • 10Duckham M, Kulik L. A formal model of obfuscation and negotiation for location privacy[C]//PERVASIVE 2005. Germany, Munich, 2005 : 152-170. 被引量:1

引证文献3

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部