期刊文献+

社会网络中基于集合枚举树的k匿名方法

Set-enumeration tree based k-anonymity approach in social networks
下载PDF
导出
摘要 k匿名方法是一种重要的数据隐私保护方法。在应用k匿名方法保护社会网络中用户的隐私时,现有的方法对社会网络的结构进行匿名化处理,当攻击者了解了网络的文本信息后可以很容易识别出用户的身份等隐私信息。为此,提出一种包含结构和文本的k匿名方法。该方法在采用传统的节点度匿名化的基础上,将社会网络中的文本信息分成不同的值域,对每一个值域构建一个全局的层次结构树,对所有的值域采用集合枚举树来优化文本标记泛化时的信息丢失,并针对集合枚举树的特征提出了三种剪枝方法。实验表明,提出的k匿名方法在实现了社会网络的结构和文本匿名化的同时具有较低额的开销。 k-anonymity is an important approach for protecting users' privacy. While protecting user' s privacy in social networks, current approaches usually anonymize the structure of social networks, and when attackers know more about the text of network, they can easily recognize users' identification. In order to solve this problem, this paper proposed a k-anonymity approach containing both structure and text in a social network. Based on traditional k-anonymity approach for structure, the proposed approach classified text in edges into different domains, constructed a global hierarchy tree for each domain, applied setenumeration tree for all domains to optimize the information loss while generating text notations, and proposed three pruning strategies according to attributes of the set-enumeration tree. The experiments show that, the proposed k-anonymity approach has low execution cost while implementing the k-anonymity approach containing structure and text in social networks.
作者 卢惠林
出处 《计算机应用研究》 CSCD 北大核心 2015年第7期2150-2152,2167,共4页 Application Research of Computers
基金 国家自然科学基金资助项目(61170121)
关键词 社会网络 k匿名 隐私保护 剪枝策略 social network k-anonymity privacy protection pruning strategy
  • 相关文献

参考文献14

  • 1Kossinets G. Effects of missing data in social networks [ J ]. Social Networks, 2006,28 ( 3 ) :247 - 268. 被引量:1
  • 2Freeman L C. Graphic techniques for exploring social network data [ D ]. Irvine : University of California,2001. 被引量:1
  • 3Wondracek G, I-Iolz T, Kirda E, eta/. A practical attack to de-anony- mize social network users[ C]//Proc of IEEE Symposium on Security and Privacy. IS. 1. ] :IEEE Press,2010:223-238. 被引量:1
  • 4Fogel J, Nehmad E. lnternet social network communities: risk taking, trust, and privacy concerns [ J]. Computers in Human Behavior, 2011,25(1) :153-160. 被引量:1
  • 5Narayanan A, Shmatikov V. De-anonymizing social networks [ C ]// Proc of the 30th IEEE Symposium on Security and Privacy. [ S. 1. ] : IEEE Press,2009 : 173-187. 被引量:1
  • 6李栋,徐志明,李生,刘挺,王秀文.在线社会网络中信息扩散[J].计算机学报,2014,37(1):189-206. 被引量:63
  • 7Sweeney L. Achieving k-anonymity privacy protection using generaliza- tion and suppression [ J ]. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2012,10 ( 5 ) : 571- 588. 被引量:1
  • 8Li Na, Das S K. Applications of k-anonymity and/-diversity in pub- lishing online social networks [ M ]//Security and Privacy in Social Networks. New York : Springer,2013 : 153-179. 被引量:1
  • 9Bayardo R J, Agrawal R. Data privacy through optimal k-anonymiza- tion[ C]//Proc of the 21st International Conference on Data Enginee- ring. IS. 1. ] :IEEE Press,2005:217-228. 被引量:1
  • 10丁悦,张阳,王勇,李伟卫.基于能量函数和模块最优化的不确定图聚类[J].计算机应用研究,2012,29(8):3173-3175. 被引量:2

二级参考文献124

  • 1GOETHALS R G, SNOECK M, LEMAHIEU W, et al. Considering (de) Centralization in a Web Services World[C]//Proceedings of Second International Con- ference on Internet and Web Applications and Serv- ices, Mauritius, 2007:22. 被引量:1
  • 2JORDAN C. Sur les Assemblages de Lignes [J]. Journal fur Die Reine und Angewandte Mathematik, 1869(70):185-190. 被引量:1
  • 3WASSERMAN S, FAUST K. Social Network Anal- ysis [M] Cambridge: Cambridge University Press, 1994. 被引量:1
  • 4TUTZAUER F, ELBIRT B. Entropy-based Centrali zation and Its Sampling Distribution in Directed Corn munication Networks [J].Communication Mono graphs, 2009, 76(3): 351-375. 被引量:1
  • 5CRUCITTI P, LATORA V, PORTA S. Centrality Measures in Spatial Networks of Urban Streets [J]. Physical Review E, 2006, 73(3): 1-5. 被引量:1
  • 6YANG C C, SAGEMAN M. Analysis of Terrorist Social Networks with Fractal Views [J}. Journal of Information Science, 2009, 35(3): 299-320. 被引量:1
  • 7GOLDSZMIDT G, YEMINI Y. Distributed Man- agement by Delegation [C]//Proceedings of 15th IEEE International Conference on Distributed Corn-puting Systems, Vancouver, 1995:333-340. 被引量:1
  • 8CRASWELL N, HAWKING D, THISTLEWAITE P. Merging Results from Isolated Search Engines [C]//Proceedings of the Tenth Australasian Data- base Conference, Auckland, 1999.. 189-200. 被引量:1
  • 9KNORR E, NG R, TUCAKOV V. Distance-based Outliers: Algorithms and Applications [J]. VLDB Journal, 2000, 8(3/4): 237-253. 被引量:1
  • 10O'CONNOR B, BALASUBRAMANYAN R, ROU- TLEDGE B, et al. From Tweets to Polls: Linking Text Sentiment to Public Opinion Time Series[J].// Proceedings of the 4th International AAAI Confer- enee on Weblogs and Social Media, Washington, 2010:122-129. 被引量:1

共引文献144

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部