Privacy protecting method for social network based on undirected graph modification

A social network and privacy protection technology, applied in the field of social network privacy protection based on undirected graph modification, can solve problems such as complex attack methods and different data application scenarios, so as to avoid relocation, protect personal privacy security, and promote research and development. Applied effect

Active Publication Date: 2013-07-24
ZHEJIANG UNIV
View PDF2 Cites 32 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although these methods prevent simple privacy attacks, due to the complexity of data, the diversity of attack models, and different data application scenarios in social networks, the attack methods to be faced will be more complex.
When the attacker collects the user's multi-level neighbor relationship and searches for the target user in the published social network graph, neither of the previous two methods can effectively prevent this complex attack method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privacy protecting method for social network based on undirected graph modification
  • Privacy protecting method for social network based on undirected graph modification
  • Privacy protecting method for social network based on undirected graph modification

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] In order to describe the present invention more specifically, the technical solutions of the present invention will be described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0037] Such as figure 1 As shown, a social network privacy protection method based on undirected graph modification includes the following steps:

[0038] (1) Construct an undirected graph of the social network to be released;

[0039] For the social network to be published, it can be abstracted as an undirected graph H, each user can be regarded as a node in the graph, the connection between users can be regarded as the connection between nodes, and the attribute information of users can be regarded as Is the attribute of the node, the entire undirected graph H can be expressed as H={V,B,S,L}, where V represents the node set, B represents the connection set, S represents the attribute set, and L represents the attribute and node mapping relationship. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a privacy protecting method for a social network based on undirected graph modification. The method comprises the following steps: (1) establishing an undirected graph of the social network; (2) digging the maximum frequent subgraph; (3) establishing a node mapping relation; (4) iteratively expanding the subgraph and improving the mapping table; and (6) forming an anonymity isomorphic graph by adding mapping lines and virtual nodes to the undirected graph. According to the method, the virtual nodes are added, so that each node has other nodes symmetrical thereto, so that re-positioning of user identity is avoided, and personal privacy safety of the user is effectively protected. In addition, the local structure of the social network is finely modified, social network graph data can be externally and safely issued, so that the method is suitable for researching characteristic analysis and statistics of the local structure of the social network, and promotes data digging technology in research and application in the field of social network.

Description

technical field [0001] The invention belongs to the technical field of network privacy encryption, and in particular relates to a social network privacy protection method based on undirected graph modification. Background technique [0002] A social network refers to an Internet application that provides communication and interaction services for online aggregated users in various forms based on certain social relationships or common interests. This kind of social relationship network established with the relationship between people as the core is mapped on the Internet to form a user-centered and people-oriented Internet application. There is a certain correspondence between the connections between nodes on the social network and the connections between offline people, so mining the local structural information of the social network has great economic and social value. With the popularization and promotion of social networks such as Facebook and Twitter, people are increas...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F17/30G06F21/60
Inventor 尹建伟项克林李莹吴健邓水光吴朝晖
Owner ZHEJIANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products