抗CFP攻擊的社交網(wǎng)絡(luò)隱私保護(hù)算法研究
[Abstract]:With the advent of the Internet and big data era, the Internet has brought great convenience to people, but also make people's privacy protection is threatened to a great extent. It is much easier to collect, integrate, analyze and disseminate user information in the existing network environment than in the period when the speed of data dissemination is not so developed. Therefore, how to protect personal privacy on the Internet has become a hot issue. At present, there are many methods and models of social network privacy protection, among which the most classical is the k-anonymous social network privacy protection algorithm. It requires at least K-1 records to be identical to each identified record in a k- anonymous dataset. Therefore, k-anonymous social network privacy protection algorithm to a certain extent to protect personal privacy. However, the existing k- anonymity technology in privacy protection, all the nodes in the social network are set private, ignoring the existence of a large number of public nodes in the actual network. The identity of these public nodes is public and the attacker can use the connection between them and the private node as the background knowledge to re-identify the private node attack, that is, the Connection Fingerprint (CFP) attack. The original anti-CFP privacy protection algorithm protects the centrality of public nodes well, but there are still some shortcomings, and the nature of social network graph is not considered as much as possible. In this paper, an improved privacy protection algorithm against CFP social networks is proposed. The main work is as follows: first, the original privacy protection algorithm against CFP attack is analyzed. For CFP attacks, the existing privacy protection algorithms of social networks randomly select the private nodes in the equivalent group when implementing edge substitution, ignoring the centrality of each private node in the network diagram. Secondly, an improved privacy protection algorithm (N-hop-K-anony) against CFP attacks is proposed, which is an improved privacy protection algorithm against CFP attacks, that is, K-anony algorithm takes into account the shortcomings of graph properties. The idea is: in the n-hop range, at least the remaining k-1 nodes for any private node v are the same as the public nodes connected there.When N-hop-K-anony performs node side substitution, it starts from several evaluation criteria of the nature of social network graph. Finally, the network aggregation coefficient is selected as the theoretical basis to improve the original algorithm. The improved algorithm deals with edge substitution and encodes the improved algorithm. Thirdly, the contrast experiment of the improved algorithm is carried out on the four real and effective data sets of email-Eu-core,College Msg,Facebook and ca-Gr Qc. Through comparison experiments, we can find that the improved algorithm can protect node centrality to some extent, especially tight centrality and medium centrality, in the case of basically consistent time performance, and in the network aggregation coefficient, the improved algorithm can protect node centrality to a certain extent, especially the close-centrality and intermediate-centrality. The improved algorithm also has better experimental results than before.
【學(xué)位授予單位】:吉林大學(xué)
【學(xué)位級(jí)別】:碩士
【學(xué)位授予年份】:2017
【分類號(hào)】:TP309
【參考文獻(xiàn)】
相關(guān)期刊論文 前7條
1 劉向宇;李佳佳;安云哲;周大海;夏秀峰;;一種保持結(jié)點(diǎn)可達(dá)性的高效社會(huì)網(wǎng)絡(luò)圖匿名算法[J];軟件學(xué)報(bào);2016年08期
2 仝偉;毛云龍;陳慶軍;王彬入;張保佳;仲盛;;抗大數(shù)據(jù)分析的隱私保護(hù):研究現(xiàn)狀與進(jìn)展[J];網(wǎng)絡(luò)與信息安全學(xué)報(bào);2016年04期
3 姚瑞欣;李暉;曹進(jìn);;社交網(wǎng)絡(luò)中的隱私保護(hù)研究綜述[J];網(wǎng)絡(luò)與信息安全學(xué)報(bào);2016年04期
4 王姣;范科峰;王勇;;面向數(shù)據(jù)發(fā)布和挖掘的隱私保護(hù)研究進(jìn)展[J];網(wǎng)絡(luò)與信息安全學(xué)報(bào);2016年01期
5 劉君;喬建忠;;復(fù)雜網(wǎng)絡(luò)中k-核與網(wǎng)絡(luò)聚集系數(shù)的關(guān)聯(lián)性研究[J];通信學(xué)報(bào);2015年01期
6 劉向宇;王斌;楊曉春;;社會(huì)網(wǎng)絡(luò)數(shù)據(jù)發(fā)布隱私保護(hù)技術(shù)綜述[J];軟件學(xué)報(bào);2014年03期
7 任靜涵;張保穩(wěn);陳曉樺;;隱私保護(hù)數(shù)據(jù)挖掘研究進(jìn)展[J];信息安全與通信保密;2008年05期
,本文編號(hào):2283812
本文鏈接:http://sikaile.net/shoufeilunwen/xixikjs/2283812.html