首页 | 本学科首页   官方微博 | 高级检索  
     

基于k-频繁子图聚类的二分图匿名方法
引用本文:吴宏伟,张健沛,杨 静. 基于k-频繁子图聚类的二分图匿名方法[J]. 计算机工程与应用, 2013, 49(17): 18-23
作者姓名:吴宏伟  张健沛  杨 静
作者单位:1.哈尔滨工程大学 计算机科学与技术学院,哈尔滨 1500002.哈尔滨理工大学 计算中心,哈尔滨 150080
摘    要:针对以二分图形式发布的社会网络隐私泄露问题,提出了一种面向敏感边识别攻击的社会网络二分图匿名方法。在已有k-安全分组的理论基础上,结合二分图的稀疏性和敏感边识别攻击形式,分别提出了正单向、逆单向以及完全(c1,c2)-安全性原则,并在此基础上,形式化地定义了一类抗敏感边识别攻击的社会网络二分图安全匿名问题;同时,还提出了一种基于k-频繁子图聚类的二分图划分算法和一种基于二分图(c1,c2)-安全性的匿名算法来保证发布二分图的安全性。实验结果表明,该算法在与已有方法相当时间开销的前提下,能产生更小的信息损失度,有效地抵制了敏感边识别攻击,实现了二分图的安全发布。

关 键 词:社会网络  隐私匿名  聚类  敏感边识别攻击  k-频繁子图  

Novel bipartite graph anonymous method based on k-frequent subgraph clustering
WU Hongwei,ZHANG Jianpei,YANG Jing. Novel bipartite graph anonymous method based on k-frequent subgraph clustering[J]. Computer Engineering and Applications, 2013, 49(17): 18-23
Authors:WU Hongwei  ZHANG Jianpei  YANG Jing
Affiliation:1.College of Computer Science and Technology, Harbin Engineering University, Harbin 150000, China2.Computer Centre, Harbin University of Science and Technology, Harbin 150080, China
Abstract:In this paper, a novel bipartite graph anonymous method is proposed to against sensitive edges identification attacks from malicious users and to preserve the privacy of?members in social networks. A positive one-way (c1, c2)-security, a negative one-way (c1, c2)-security, and a two-way (c1, c2)-security principles are introduced. These definitions are based on the k-security group theory, the sparsity of bipartite graphs, and the sensitive edges identification attacks in social networks. A bipartite graph anonymous problem is defined to against sensitive edges identification attacks. A bigraph partitioning algorithm is presented on the basis of k-frequent subgraphs clustering and a bipartite graph anonymous algorithm is given to assure the safety of the published bipartite graph. The experimental results show that under the equal time-cost conditions, the proposed method not only produces less information loss than that of the existing methods, but also effectively resists sensitive edges identification attacks and realizes security release of bipartite graphs.
Keywords:social networks  privacy anonymity  clustering  sensitive edges identification attack  k-frequent subgraph  
点击此处可从《计算机工程与应用》浏览原始摘要信息
点击此处可从《计算机工程与应用》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号