Network user structure disturbance method based on spectral constraint and sensitive area partition

A network user and disturbance method technology, applied in the field of Internet information security, can solve problems such as poor network availability and insufficient privacy protection, and achieve the effects of improving availability, eliminating invalid disturbances, and maintaining structural characteristics.

Active Publication Date: 2015-07-15
杭州新世纪电子科技有限公司 +1
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The privacy of social network users can be well protected as the number of additions, deletions, and exchange edges increases, but the availability of the network becomes poor after the disturbance
Another method is the randomized perturbation method based on spectral constraints. Compared with the randomized social network perturbation method, it can well maintain the structural characteristics of the social network, but the privacy protection is not strong enough.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network user structure disturbance method based on spectral constraint and sensitive area partition

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] The present invention is further described below in conjunction with specific embodiment, but protection scope of the present invention is not limited thereto:

[0020] Such as figure 1 As shown, a network user structure perturbation method based on spectral constraints and sensitive area division includes the following steps:

[0021] 1. A network user structure perturbation method based on spectral constraints and sensitive area division, comprising the following steps:

[0022] 1) Input the network user structure graph G and represent it with the adjacency matrix A, and find the Laplacian matrix L=D-A corresponding to A, where D is the degree sequence of graph G;

[0023] 2) Find the largest eigenvalue of the adjacency matrix A and its corresponding eigenvector λ 1 , e 1 ={x 1 ,x 2 ,...,x n} T ;

[0024] 3) Find the second smallest eigenvalue of the Laplacian matrix L and its corresponding eigenvector μ 2 ,q 2 ={y 1 ,y 2 ,...,y n} T ;

[0025] 4) Divid...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the field of internet information safety, relates to a social network privacy protection method, and particularly relates to a network user structure disturbance method based on spectral constraint and sensitive area partition. The network user structure disturbance method includes the following steps: performing sensitive area and nonsensitive area partition for an input network user structure chart G, and then performing stochastic disturbance based on the spectral constraint on a social network graph, and outputting a network user structure chart G'. The network user structure disturbance method based on the spectral constraint and the sensitive area partition has the advantages that the usability of social network data is improved, invalid disturbance can be eliminated through the method, privacy protection degree is improved, and structural characteristics of a social network can be better maintained while privacy is protected.

Description

Technical field [0001] The invention belongs to the field of Internet information security, relates to a social network privacy protection method, in particular to a network user structure disturbance method based on spectrum constraints and sensitive area division. Background technique [0002] A network user is a point-like network topology composed of individuals or communities. Each point represents an individual, and there may be various interdependent social relationships between individuals, which are represented by edges between points in the topological network. This network topology is completely open on the Internet. Therefore, there is a risk of information leakage on the social network and the relationship between individuals, especially the sensitive information. In order to ensure the smooth analysis of social network data, it is required to maintain the structural characteristics of the original social network data. [0003] At present, the randomized pertu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/24
Inventor 李云水王小号俞翔江颉
Owner 杭州新世纪电子科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products