首页 | 本学科首页   官方微博 | 高级检索  
     

基于推文与属性的社交网络用户重识别方法
引用本文:高伟,张敏.基于推文与属性的社交网络用户重识别方法[J].计算机系统应用,2017,26(12):94-103.
作者姓名:高伟  张敏
作者单位:中国科学院大学, 北京 100049;中国科学院 软件研究所, 北京 100190,中国科学院 软件研究所, 北京 100190
基金项目:国家自然科学基金重点项目(61232005);国家自然科学基金(61402456)
摘    要:大数据隐私安全正成为各界关注的热点. 攻击者通过识别用户不同网站的账户,可以构建用户的完整画像,对用户隐私形成威胁. 模拟评估攻击者的重识别能力是进行用户隐私保护的前提. 因此,本文提出一种高相似同天同行为算法. 该算法通过检测账户在不同网站是否存在多次同天发表相近或相同内容的行为,判断账户是否属于同一用户,并通过为用户属性构建一种权重计算模型,进一步提高用户重识别的准确率. 经过对两个国内主流社交网站的一万多用户进行实验,本文算法表现出良好的效果. 实验表明,即使不考虑用户社交关系,用户的推文与属性依然提供了足够的信息使攻击者将用户不同网站的账户相关联,从而导致更多的隐私被泄露.

关 键 词:社交网络  用户重识别  推文  属性  相似度
收稿时间:2017/3/16 0:00:00

Method for Users Re-Identification across Social Networks Based on Tweets and Attributes
GAO Wei and ZHANG Min.Method for Users Re-Identification across Social Networks Based on Tweets and Attributes[J].Computer Systems& Applications,2017,26(12):94-103.
Authors:GAO Wei and ZHANG Min
Affiliation:University of Chinese Academy of Sciences, Beijing 100049, China;Institute of Software, Chinese Academy of Sciences, Beijing 100190, China and Institute of Software, Chinese Academy of Sciences, Beijing 100190, China
Abstract:Big data Privacy security is becoming the hot spot in the various social industries, because attackers can build an integrate portrait to threaten privacy of users by identifying accounts in different sites. Simulation assessment of the attacker re-identification ability is the precondition of users'' privacy protection. Therefore, this paper proposes a high similarity algorithm in same day with same behaviors. The core idea of the algorithm is as follows: if a couple account issues similar or identical content on the same day, which also appears many times in different websites, then these two accounts may belong to a person with a high possibility. In addition, this paper builds a new weighting model for the users'' attributes to improve the accuracy of user re-identification. After the experiment on more than ten thousand users of the two major domestic social networking site, this algorithm proves to be effective. Experimental results show that even if attacker don''t consider users'' social relations, the users'' tweets, attributes, still provide enough information to make the attacker correlate their different accounts, which will lead to leak of more privacy.
Keywords:social network  users re-identification  tweets  attributes  similarity
点击此处可从《计算机系统应用》浏览原始摘要信息
点击此处可从《计算机系统应用》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号