一种基于节点分割的隐私属性(a, k)-匿名算法
An Privacy Attribute (a, k)-Anonymous Algorithm Based on Node Segmentation
DOI: 10.12677/HJDM.2020.102015, PDF,    科研立项经费支持
作者: 邓秀勤*, 张翼飞, 江志华, 谭立辉:广东工业大学应用数学学院,广东 广州
关键词: 隐私属性隐私保护节点分割匿名社交网络Privacy Property Privacy Protection Node Split Anonymous Social Networks
摘要: 伴随着网络技术的发展,各类社交网络所包含的信息也在不断地增大。在数据信息增加的同时也意味着隐私信息泄露的可能性增大。因此在上传和提取用户信息的时候应该考虑到敏感信息的保护,在k-匿名算法的基础上衍生的(a, k)-匿名算法是经典的隐私保护模型,但是随着社交网络的复杂性不断增加,传统的(a, k)-匿名算法不足以满足社交网络中信息隐匿的要求。针对在社交网络中,节点的结构信息和非隐私属性信息等也可能会受到攻击,本文提出一种基于节点分割的(a, k)-匿名算法。该算法对社交网络中带有隐私属性值的节点进行分割,使得节点特征被分割到两个节点里,降低了节点被攻击识别的可能性。实验结果表明,该算法可以有效防御部分攻击造成的隐私属性泄露,同时保证数据保持一定的可用性。
Abstract: With the development of network technology, the information contained in various social net-works is constantly increasing. But the increase in data information also means that the possibility of leakage of private information increases. Therefore, the protection of sensitive information should be considered when uploading and extracting user information. The (a, k)-anonymous al-gorithm derived from the k-anonymity algorithm is a classic privacy protection model, but with the complexity of social networks increasingly, the traditional (a, k)-anonymity algorithm is insuf-ficient to meet the requirements of information hiding in social networks. In social networks, structural information and non-privacy attribute information of nodes may also be attacked, in-creasing the risk of privacy attribute disclosure. A privacy attribute (a, k)-anonymous algorithm based on node segmentation is proposed in this paper. In this algorithm, the nodes with privacy attribute value in the social network are segmented, so that the features of the nodes are divided into two nodes, and the possibility of the nodes being attacked is reduced. Experimental results demonstrate that this algorithm can protect the privacy data from partial attacks and ensure the availability of data.
文章引用:邓秀勤, 张翼飞, 江志华, 谭立辉. 一种基于节点分割的隐私属性(a, k)-匿名算法[J]. 数据挖掘, 2020, 10(2): 143-151. https://doi.org/10.12677/HJDM.2020.102015

参考文献

[1] Ferri, F., Grifoni, P. and Guzzo, T. (2012) New Forms of Social and Professional Digital Relationships: The Case of Facebook. Social Network Analysis and Mining, 2, 121-137. [Google Scholar] [CrossRef
[2] Sweeney, L. (2002) K-Anonymity: A Model for Protecting Privacy. International Journal on Uncertainly, Fuzziness, and Knowledge Based Systems, 10, 557-570. [Google Scholar] [CrossRef
[3] Ford, R., Truta, T.M. and Campan, A. (2009) P-Sensitive K-anonymity for social networks. In: Stahlbock, R., Crone, S.F., Lessmann, S., eds., International Conference on Data Mining, CSREA Press, Las Vegas, 403-409.
[4] 吴宏伟. 社会网络数据发布中的隐私匿名技术研究[D]: [硕士学位论文]. 黑龙江: 哈尔滨工程大学, 2013.
[5] 贾俊杰, 闫国蕾. 一种个性化(p, k)-匿名隐私保护算法[J]. 计算机工程, 2018, 44(1): 176-181.
[6] 姜火文, 占清华, 刘文娟, 马海英. 图数据发布隐私保护的聚类匿名方法[J]. 软件学报, 2017, 28(9): 2323-2333.
[7] Liu, K. and Terzi, E. (2008) Towards Identity Anonymization on Graphs. Proceedings of ACM SIGMOD International Conference on Management of Data (SIGMOD 2008), 2008, 93-106. [Google Scholar] [CrossRef
[8] Casas-Roma, J., Herrera-Joancomartí, J. and Torra, V. (2017) k-Degree Anonymity and Edge Selection: Improving Data Utility in Large Networks. Knowledge and Information Systems, 50, 447-474. [Google Scholar] [CrossRef
[9] Casas-Roma, J., et al. (2019) k-Degree Anonymity on Directed Networks. Knowledge and Information Systems, 61, 1743-1768. [Google Scholar] [CrossRef
[10] Kiabod, M., Dehkordi, M.N. and Barekatain, B. (2019) TSRAM: A Time-Saving k-Degree Anonymization Method in Social Network. Expert System, 125, 378- 396. [Google Scholar] [CrossRef
[11] 金叶, 丁晓波, 龚国强, 吕科. 基于节点分类的k度匿名隐私保护方法[J/OL]. 计算机工程, 1-7. 2020-03-26.[CrossRef
[12] Portela, J., García Villalba, L.J., Silva Tru-jillo, A.G., Sandoval Orozco, A.L. and Kim, T.-H. (2016) Estimation of Anonymous Email Network Characteristics through Statistical Disclosure Attacks. Sensors, 16, 1832-1847. [Google Scholar] [CrossRef] [PubMed]