A network shortest path privacy protection method based on anonymity

A shortest path, privacy protection technology, applied in data exchange networks, digital transmission systems, electrical components, etc., can solve problems such as the lack of shortest path protection methods, and achieve the effect of complex network privacy protection

Active Publication Date: 2019-06-04
ANHUI NORMAL UNIV
View PDF5 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] The existing privacy protection only protects a single node and edge in the network graph. At present, people still lack the shortest path protection method between nodes.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A network shortest path privacy protection method based on anonymity
  • A network shortest path privacy protection method based on anonymity
  • A network shortest path privacy protection method based on anonymity

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] Referring to the accompanying drawings, through the description of the embodiments, the specific embodiments of the present invention include the shape, structure, mutual position and connection relationship of each part, the function and working principle of each part, and the manufacturing process of the various components involved. And the method of operation and use, etc., are described in further detail to help those skilled in the art have a more complete, accurate and in-depth understanding of the inventive concepts and technical solutions of the present invention.

[0041] Such as figure 1 As shown, the anonymity-based network shortest path privacy protection method includes the following steps:

[0042] Step 1. Model the complex network in the real world as a weighted undirected graph G=(V, E), where V represents a node set, E represents an edge set, and an adjacency matrix is ​​used to represent the graph G. W is used to represent the edge weight matrix of ve...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network shortest path privacy protection method based on anonymity. The method comprises steps of carrying out formalized modeling on a complex network; defining a virtual node set and a virtual edge set, establishing a distance matrix, and solving the shortest path between the node pairs by applying a dynamic programming idea; And according to the shortest path between the node pairs needing to be protected, classifying the nodes by using coverage counting, and adding interference nodes and interference edges to realize privacy protection of the shortest path. According to the method, anonymization protection of the shortest path between the node pairs is achieved through the method of adding the interference nodes and the interference edges, and therefore malicious attacks of an attacker on the relation path between the node pairs can be effectively defended.

Description

technical field [0001] The invention belongs to the technical field of information security protection for weighted user relationship graphs in complex networks, and in particular relates to searching for the shortest path in the complex network and anonymizing the shortest path. Background technique [0002] Because of its inherent characteristics, the search for the shortest path of the network is actually to find a path with the minimum sum of edge weights from the target source point to the target end point on the basis of the established graphical model. Now, the algorithms that are mainly used to search the shortest path in the network include Dijkstra's algorithm and Floyd's algorithm. [0003] The Dijkstra algorithm is based on a greedy strategy. Each time the node closest to the target source point is selected, the shortest path between the target source point and the node is temporarily determined, and then it is checked whether other nodes can update the shortest ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/721H04L12/733H04L12/24G06F9/455H04L29/06H04L45/122
Inventor 徐平安孙丽萍刘孝庆腾莉罗永龙
Owner ANHUI NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products