首页 | 本学科首页   官方微博 | 高级检索  
     

基于节点分割的社交网络属性隐私保护
引用本文:付艳艳,张敏,冯登国,陈开渠.基于节点分割的社交网络属性隐私保护[J].软件学报,2014,25(4):768-780.
作者姓名:付艳艳  张敏  冯登国  陈开渠
作者单位:中国科学院 软件研究所 可信计算与信息保证实验室, 北京 100190;中国科学院 软件研究所 可信计算与信息保证实验室, 北京 100190;中国科学院 软件研究所 可信计算与信息保证实验室, 北京 100190;国家超级计算深圳中心(深圳云计算中心), 广东 深圳 518055
基金项目:国家自然科学基金(61232005,61100237);深圳市战略新兴产业发展专项资金(CXZZ20120831113048965)
摘    要:现有研究表明,社交网络中用户的社交结构信息和非敏感属性信息均会增加用户隐私属性泄露的风险.针对当前社交网络隐私属性匿名算法中存在的缺乏合理模型、属性分布特征扰动大、忽视社交结构和非敏感属性对敏感属性分布的影响等弱点,提出一种基于节点分割的隐私属性匿名算法.该算法通过分割节点的属性连接和社交连接,提高了节点的匿名性,降低了用户隐私属性泄露的风险.此外,量化了社交结构信息对属性分布的影响,根据属性相关程度进行节点的属性分割,能够很好地保持属性分布特征,保证数据可用性.实验结果表明,该算法能够在保证数据可用性的同时,有效抵抗隐私属性泄露.

关 键 词:社交网络  属性隐私  匿名  节点分割
收稿时间:2013/9/10 0:00:00
修稿时间:2013/12/18 0:00:00

Attribute Privacy Preservation in Social Networks Based on Node Anatomy
FU Yan-Yan,ZHANG Min,FENG Deng-Guo and CHEN Kai-Qu.Attribute Privacy Preservation in Social Networks Based on Node Anatomy[J].Journal of Software,2014,25(4):768-780.
Authors:FU Yan-Yan  ZHANG Min  FENG Deng-Guo and CHEN Kai-Qu
Affiliation:Laboratory of TCA, Institute of Software, The Chinese Academy of Sciences, Beijing 100190, China;Laboratory of TCA, Institute of Software, The Chinese Academy of Sciences, Beijing 100190, China;Laboratory of TCA, Institute of Software, The Chinese Academy of Sciences, Beijing 100190, China;National Supercomputing Center in Shenzhen (Shenzhen Cloud Computing Center), Shenzhen 518055, China
Abstract:Recent research shows that social structures or non-sensitive attributes of users can increase risks of user sensitive attribute disclosure in social networks. Most of the existing private attribute anonymization schemes have many defects, such as lack of proper model, too much distortion on attributes distribution, neglect social structure and non-sensitive attributes' influence on sensitive attributes. In this paper, an attribute privacy preservation scheme based on node anatomy is proposed. It allocates original node's attribute links and social links to new nodes to improve original node's anonymity, thus protects user from sensitive attribute disclosure. Meanwhile, it measures social structure influence on attribute distribution, and splits attributes according to attributes' correlations. Experimental results show that the proposed scheme can maintain high data utility and resist private attribute disclosure.
Keywords:social network  attribute privacy  anonymity  node anatomy
本文献已被 CNKI 等数据库收录!
点击此处可从《软件学报》浏览原始摘要信息
点击此处可从《软件学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号