检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:王正彬[1] 沈明玉[1] 赵皎[1] WANG Zhengbin;SHEN Mingyu;ZHAO Jiao(College of Computer and Information, Hefei University of Technology, Hefei 230000, China)
机构地区:[1]合肥工业大学计算机与信息学院,合肥230000
出 处:《计算机工程与应用》2017年第11期131-136,共6页Computer Engineering and Applications
摘 要:互联网的发展使社交网络成为人们聊天、交友、发表言论的重要平台。在社交网络中会存在大量信息,其中涉及到个人身份,社交结构,属性联系等信息就构成了隐私信息,因此需对隐私信息进行有效的保护。分析发现,现有部分基于结构扰动的社交网络隐私保护方案存在对网络结构扰动大、信息丢失率高等弊端。为此,提出了一种基于节点重构的隐私保护方案,重点解决了边缘节点与受保护节点的相似性分析与选取,边缘节点的同构化改造,以及最优化扰动原隐私节点结构等问题。实验结果表明提出的方法在有效保护社交网络隐私的同时,还能确保信息的高可用性。With the development of the Internet,social network has becoming an important platform of people chat,make friends,speech.There are a lot of privacy information in the social network,as a result the information which involve the personal identity,social structure,attribute contact and so on constitute the privacy information.Therefore,effective protection should be carried out on social network.Analysis finds that the existing part of the social network privacy protection scheme based on structure disturbance has some drawbacks of high network structure disturbance and high information losing.This article puts forward a novel privacy protection scheme based on node reconfiguration focusing on solving the problems of the similarity analysis and selection of the edge nodes and protected node,the edge nodes isomorphic transformation,as well as the optimal disturbance in the original privacy node structure.The test results show that the method can effectively protects the privacy of social networks,also can guarantee the availability of the network structure at the same time.
分 类 号:TP393[自动化与计算机技术—计算机应用技术]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.15