首页 | 本学科首页   官方微博 | 高级检索  
     

基于节点1-邻居图相似性的社会网络匿名技术
引用本文:李啸林,章红艳,许佳钰,许力,黄赞. 基于节点1-邻居图相似性的社会网络匿名技术[J]. 计算机系统应用, 2022, 31(11): 21-30
作者姓名:李啸林  章红艳  许佳钰  许力  黄赞
作者单位:福建师范大学 计算机与网络空间安全学院, 福州 350007;福建师范大学 福建省网络安全与密码技术重点实验室, 福州 350007;福建省无线通讯重点实验室, 福州 350002
基金项目:国家自然科学基金(U1905211, 61771140, 62171132); 福建省科技项目(2021L3032); 企事业合作项目(DH-1565)
摘    要:利用传统的k匿名技术在社会网络中进行隐私保护时会存在聚类准则单一、图中数据信息利用不足等问题.针对该问题,提出了一种利用Kullback-Leibler (KL)散度衡量节点1-邻居图相似性的匿名技术(anonymization techniques for measuring the similarity of node 1-neighbor graph based on Kullback-Leibler divergence, SNKL).根据节点1-邻居图分布的相似性对原始图节点集进行划分,按照划分好的类进行图修改,使修改后的图满足k匿名,完成图的匿名发布.实验结果表明, SNKL方法与HIGA方法相比在聚类系数上的改变量平均降低了17.3%,同时生成的匿名图与原始图重要性节点重合度保持在95%以上.所提方法在有效保证隐私的基础上,可以显著的降低对原始图结构信息的改变.

关 键 词:隐私保护  社会网络  概率不可区分性  k匿名  1-邻居图  网络安全
收稿时间:2022-03-09
修稿时间:2022-04-07

Social Network Data Anonymization Based on Node 1-neighbor Graphs Similarity
LI Xiao-Lin,ZHANG Hong-Yan,XU Jia-Yu,XU Li,HUANG Zan. Social Network Data Anonymization Based on Node 1-neighbor Graphs Similarity[J]. Computer Systems& Applications, 2022, 31(11): 21-30
Authors:LI Xiao-Lin  ZHANG Hong-Yan  XU Jia-Yu  XU Li  HUANG Zan
Affiliation:School of Computer and Cyber Security, Fujian Normal University, Fuzhou 350007, China;Fujian Provincial Key Lab of Network Security & Cryptology, Fujian Normal University, Fuzhou 350007, China; Key Laboratory of Wireless Communication in Fujian Province, Fuzhou 350002, China
Abstract:Using traditional k-anonymization techniques to achieve privacy protection in social networks is faced with problems such as single clustering criterion and under-utilization of data and information in the graph. To solve this problem, this study proposes an anonymization technique measuring the similarity of the node 1-neighbor graph based on the Kullback-Leibler divergence (SNKL). The original graph node set is divided according to the similarity of node 1-neighbor graph distribution, and the graph is modified according to the divided classes so that the modified graph satisfies k-anonymity. On this basis, the anonymous release of the graph is implemented. The experimental results show that compared with the HIGA method, the SNKL method reduces the amount of change in the clustering coefficients by 17.3% on average. Moreover, the overlap ratio between the importance nodes of the generated anonymous graph and those of the original graph is maintained at more than 95%. In addition to protecting privacy effectively, the proposed method can significantly reduce the changes brought to the structural information in the original graph.
Keywords:privacy protection  social network  probabilistic indistinguishability  k-anonymity  1-neighbor graph  cyber security
点击此处可从《计算机系统应用》浏览原始摘要信息
点击此处可从《计算机系统应用》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号