Unlock instant, AI-driven research and patent intelligence for your innovation.

Social network privacy protection method, system and device

A privacy protection and social network technology, applied in digital data protection, instruments, data processing applications, etc., can solve problems such as information loss, data utility reduction, network structure changes, etc., to enhance stability, reduce impact, and improve effects. Effect

Active Publication Date: 2019-05-31
GUANGDONG UNIV OF TECH
View PDF2 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to the serious information loss problem in the cluster-based anonymous model after generalization, the network structure changes dramatically and the data utility decreases sharply.
However, most of the anonymization methods for graph data modification or transformation use disturbance methods such as adding, deleting nodes or edges, and subgraph isomorphism to achieve k-degree anonymity. Unable to overcome large information loss problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Social network privacy protection method, system and device
  • Social network privacy protection method, system and device
  • Social network privacy protection method, system and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0062] The core of this application is to provide a method, system, equipment, and computer-readable storage medium for protecting social network privacy, which are used to reduce information loss in the process of protecting social network privacy.

[0063] In order to make the purpose, technical solutions and advantages of the embodiments of this application clearer, the technical solutions in the embodiments of this application will be described clearly and completely in conjunction with the drawings in the embodiments of this application. Obviously, the described embodiments It is a part of the embodiments of this application, but not all the embodiments. Based on the embodiments in this application, all other embodiments obtained by those of ordinary skill in the art without creative work fall within the protection scope of this application.

[0064] Please refer to figure 1 , figure 1 This is a flowchart of a method for privacy protection in a social network provided by an ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a social network privacy protection method. The method comprises the following steps: receiving an input original social network graph; Performing community division on each node in the original social network graph by utilizing a preset label propagation algorithm to obtain each community sub-graph; And reconstructing each community sub-graph by using a sub-graph reconstruction algorithm to complete K-degree anonymization of each community sub-graph so as to realize privacy protection of the original social network graph. According to the technical scheme provided by the invention, the stability of the algorithm is enhanced; the community division effect is improved; the influence of tag selection randomness on tag propagation efficiency and results is reduced; andon the premise of protecting the stability of the social network grid structure, the graph structure is modified to the minimum extent to realize k-degree anonymity, so that the published social network data has relatively good availability. Meanwhile, the invention also provides a system and equipment for protecting the social network privacy and a computer readable storage medium, which have the above beneficial effects.

Description

Technical field [0001] This application relates to the field of privacy protection, and in particular to a method, system, device, and computer-readable storage medium for privacy protection in social networks. Background technique [0002] Social networks belong to the research category of complex networks, focusing on social individuals and their interactions and connections, and are usually modeled as graph data to achieve privacy protection. Attackers often use the background knowledge about the target individual (such as the degree of nodes, identification attributes, connection relationships between nodes, neighborhoods and embedded subgraphs, etc.) to infer individual privacy information. The two types of important private information (node ​​attribute data and connection relationship data) contained in social networks are vulnerable to structural attacks such as node degree attacks and link attacks. [0003] The privacy protection of relational data is a research hotspot t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/62G06Q50/00
Inventor 欧毓毅袁静
Owner GUANGDONG UNIV OF TECH