Unlock instant, AI-driven research and patent intelligence for your innovation.

System for protecting user privacy in social network and optimal path matching method

A social network and user privacy technology, applied in the field of user privacy protection systems and optimal path matching, it can solve the problem that the definition of weight information is not accurate enough, cannot guarantee the practicability accuracy and efficiency of large social networks, and does not consider vertices. interaction issues

Active Publication Date: 2020-08-11
GUILIN UNIV OF ELECTRONIC TECH
View PDF5 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the existing path query schemes firstly define the weight information between vertices is not accurate enough, do not consider the interaction between vertices, and cannot clearly express the purpose of path query; secondly, the query speed is positively correlated with the number of vertices, which cannot guarantee the accuracy of large social networks. The practicality of the query or the need to make a trade-off between accuracy and efficiency

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System for protecting user privacy in social network and optimal path matching method
  • System for protecting user privacy in social network and optimal path matching method
  • System for protecting user privacy in social network and optimal path matching method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0126] The present invention provides an optimal path matching method for protecting user privacy in a social network, comprising the following steps:

[0127] Step 1: System parameter generation.

[0128] Step 1.1: The trusted center (TA) selects the security parameter κ, and calculates the master public key of the ElGamal encryption algorithm (mpk=g msk ,g,p) and master key Where p is a large prime number and satisfies |p|=κ, g is A generator of . Choose a random number R, where |R|<|p| / 3.

[0129] Step 1.2: TA selects a pair of keys (sk 1 ,sk 2 ),in make sk 1 +sk 2 = msk mod(p-1).

[0130] Step 1.3: TA randomly selects n user key vectors

[0131] Step 1.4: TA publishes parameters (mpk, g, p, R).

[0132] The entity registration process involves Figure 4 .

[0133] Step 2: Entity registration.

[0134] Step 2.1: User USER i (i=1,2,...,n) registration.

[0135] Step 2.1.1: User USER i (i=1,2,...,n) Send a registration request.

[0136] Step 2.1.2: TA r...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a system for protecting user privacy in a social network and an optimal path matching method. The method comprises the steps that a trusted center generates system parametersand a secret key and sends the system parameters to a server and a user; the user registers; the server registers; the user constructs vertex information and weight information and sends ciphertext information generated in the process of constructing the vertex information and the weight information to the server; the server is used for constructing a social graph according to the vertex information and the weight information; a query user in the users uploads a start-end point identifier to the server; the server generates a path sequence and a weight sequence according to the social graph and the start-end point identifier; the server sends the weight sequence to a query user, so that the query user determines a ciphertext position; and the query user determines an optimal path from thepath sequence in an unintentional transmission mode according to the ciphertext position. The method can ensure that the privacy of the user is not leaked during path query, and is high in query speedand accurate and efficient in processing.

Description

technical field [0001] The invention relates to the technical field of social networks, in particular to a system for protecting user privacy in a social network and an optimal path matching method. Background technique [0002] In order to realize various intelligent services, such as recommendation services, sharing services, and query services, online social networks need to use users' personal attribute information for information correlation query and matching to obtain optimal recommendations in social networks. However, these user attribute information contains the personal privacy of many users, such as sensitive information such as user age, gender, work unit, and place of residence. Malicious attackers can obtain and analyze these data and use them for illegal operations through monitoring and other means. Therefore, how to protect the privacy of users in social networks is an important topic. [0003] In social networks, all users upload their private informatio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/08H04L9/00G06Q50/00G06F21/62G06F21/60G06F16/953
CPCH04L63/0428G06Q50/01G06F21/6245G06F21/602H04L9/0863H04L9/008G06F16/953
Inventor 张明武陈誉丁勇
Owner GUILIN UNIV OF ELECTRONIC TECH