计算机科学 ›› 2021, Vol. 48 ›› Issue (9): 9-20.doi: 10.11896/jsjkx.201000011
所属专题: 智能数据治理技术与系统
雷羽潇, 段玉聪
LEI Yu-xiao , DUAN Yu-cong
摘要: 随着虚拟社区在网络用户中的普及,虚拟社区群已经成为一个小型社会,可通过用户浏览所留下的“虚拟痕迹”和发布的用户生成内容提炼出与用户相关的隐私类型资源。根据隐私类型资源自身的特性,可将其分类为数据资源、信息资源和知识资源,三者构成了用户的数据信息知识与智慧图谱(DIKW图谱)。虚拟社区中的隐私类型资源有4个流通过程,即隐私资源的感知、存储、传输和处理;4个过程分别由3个参与方(用户、AI系统和访问者)单独或合作完成,3个参与方所拥有的隐私权包括知情权、参与权、遗忘权和监督权。通过明确3个参与方在4个流通过程中的隐私权范围,结合隐私价值保护,设计了匿名保护机制/风险评估机制和监督机制,用于构建一个虚拟社区隐私保护的AI治理法律框架。
中图分类号:
[1]O'NEILL E,KOSTAKOS V,KINDBERG T,et al.Instrumenting the City:Developing Methods for Observing and Understanding the Digital Cityscape [C]//Lecture Notes in Computer Science.2006,4206:315-322. [2]GIRARDIN F,CALABRESE F,FIORE F D,et al.Digital Footprinting:uncovering tourists with user-generated content[J].IEEE Pervasive Computing,2008,7(4):36-43. [3]HU H,GE Y J,HOU D Y.Using Web Crawler Technology for Geo-Events Analysis:A Case Study of theHuangyan Island Incident[J].Sustainability,2014,6(4):1896-1912. [4]KRUMM J,DAVIES N,NARAYANASWAMI C.User-generated content[J].IEEE Pervasive Computing,2008,7(4):10-11. [5]LEI Y,DUAN Y.Personality Classification and ConversionMethod of Virtual Community Personnel Based on DIKW Graph[J].Chinese Journal of Applied Sciences,2020,38(5):803-824. [6]ULRIKE H.Reviewing person's value of privacy of online social networking[J].Internet Research,2011,21(4):384-407. [7]BOZDA E.Bias in algorithmic filtering and personalization[J].Ethics & Information Technology,2013,15(3):209-227. [8]MITTELSTADT B D,ALLO P,TADDEO M,et al.The ethics of algorithms:mapping the debate[J].Big Data and Society,2016,3(2):1-21. [9]DUAN Y C,ZHAN L G,ZHANG XY,et al.Formalizing DIKW Architecture for Modeling Security and Privacy as Typed Resources[C]//Testbeds and Research Infrastructures for the Development of Networks and Communities.2018:157-168. [10]DUAN Y C,SHAO L X,HU G Z,et al.Specifying architecture of knowledge graph with data graph,information graph,know-ledge graph and wisdom graph[C]//IEEE International Confe-rence on Software Engineering Research.IEEE,2017. [11]SONG Z Y,DUAN Y C,WAN S X,et al.Processing Optimization of Typed Resources with Synchronized Storage and Computation Adaptation in Fog Computing[J].Wireless Communications and Mobile Computing,2018,2018:1-13. [12]GURSES S,ALAMO J M D.Privacy Engineering:Shaping an Emerging Field of Research and Practice[J].IEEE Security & Privacy,2016,14(2):40-46. [13]DUAN Y C,SUN X B,CHE H Y,et al.Modeling Data,Information and Knowledge for Security Protection of Hybrid IoT and Edge Resources[J].IEEE Access,2019,7:99161-99176. [14]DUAN Y C.Existence Computation:Revelation on Entity vs.Relationship for Relationship Defined Everything of Semantics[C]//2019 20th IEEE/ACIS International Conference on Software Engineering,Artificial Intelligence,Networking and Parallel/Distributed Computing (SNPD).2019:139-144. [15]OLSON D L.Data mining in business services[J].Service Business,2007,1(3):181-193. [16]KURGAN L A,MUSILEK P.A survey of Knowledge Discovery and Data Mining process models[J].The Knowledge Enginee-ring Review,2006,21(1):1-24. [17]VISSER W,HINDRIKS K V,JONKER C M.Argumentation-Based Qualitative Preference Modelling with Incomplete and Uncertain Information[J].Group Decision & Negotiation,2012,21(1):99-127. [18]MITTELSTAD B.From Individual to Group Privacy in Big Data Analytics[J].Philosophy & Technology,2017,30(4):475-494. [19]VASSILIADIS P.A Survey of Extract-Transform-Load Technology[J].International Journal of Data Warehousing & Mi-ning,2009,5(3):1-27. [20]HARIRI R H,FREDERICKS E M,BOWERS K M.Uncertainty in big data analytics:survey,opportunities,and challenges[J].Journal of Big Data,2019,6(1):44. [21]HARPER J.Privacy and the Four Categories of InformationTechnology[R].American Enterprise Institute Report,2020. [22]EKSTRAND M D,JOSHAGHANI R,MEHRPOUYAN H.Privacy for All:Ensuring Fair and Equitable Privacy Protections[C]//Proceedings of the 1st Conference on Fairness,Accountability and Transparency.2018:35-47. [23]HOFFMAN S,PODGURSKI A.Balancing Privacy,Autonomy,and Scientific Needs In Electronic Health Records Research[J].SMU law review:a publication of Southern Methodist University School of Law,2012,65(1):85-144. [24]SOLOVE D J.The Future of Reputation:Gossip,Rumor,and Privacy on the Internet[M]//Yale University Press,2007. [25]GORMAN D.Rights in Collision: The Individual Right of Privacy and the Public Right To Know[J].Asahi Law Review Asahi University School of Law,1978,35(2):249-257. [26]MANTELERO A.The EU Proposal for a General Data Protection Regulation and the roots of the right to be forgotten[J].Computer Law & Security Review,2013,29(3),229-235. [27]WALLACE K A.Anonymity[J].Ethics and Information Technology,1999,1(1):21-31. |
[1] | 鲁晨阳, 邓苏, 马武彬, 吴亚辉, 周浩浩. 基于分层抽样优化的面向异构客户端的联邦学习 Federated Learning Based on Stratified Sampling Optimization for Heterogeneous Clients 计算机科学, 2022, 49(9): 183-193. https://doi.org/10.11896/jsjkx.220500263 |
[2] | 汤凌韬, 王迪, 张鲁飞, 刘盛云. 基于安全多方计算和差分隐私的联邦学习方案 Federated Learning Scheme Based on Secure Multi-party Computation and Differential Privacy 计算机科学, 2022, 49(9): 297-305. https://doi.org/10.11896/jsjkx.210800108 |
[3] | 吕由, 吴文渊. 隐私保护线性回归方案与应用 Privacy-preserving Linear Regression Scheme and Its Application 计算机科学, 2022, 49(9): 318-325. https://doi.org/10.11896/jsjkx.220300190 |
[4] | 王健. 基于隐私保护的反向传播神经网络学习算法 Back-propagation Neural Network Learning Algorithm Based on Privacy Preserving 计算机科学, 2022, 49(6A): 575-580. https://doi.org/10.11896/jsjkx.211100155 |
[5] | 李利, 何欣, 韩志杰. 群智感知的隐私保护研究综述 Review of Privacy-preserving Mechanisms in Crowdsensing 计算机科学, 2022, 49(5): 303-310. https://doi.org/10.11896/jsjkx.210400077 |
[6] | 王美珊, 姚兰, 高福祥, 徐军灿. 面向医疗集值数据的差分隐私保护技术研究 Study on Differential Privacy Protection for Medical Set-Valued Data 计算机科学, 2022, 49(4): 362-368. https://doi.org/10.11896/jsjkx.210300032 |
[7] | 吕由, 吴文渊. 基于同态加密的线性系统求解方案 Linear System Solving Scheme Based on Homomorphic Encryption 计算机科学, 2022, 49(3): 338-345. https://doi.org/10.11896/jsjkx.201200124 |
[8] | 孔钰婷, 谭富祥, 赵鑫, 张正航, 白璐, 钱育蓉. 基于差分隐私的K-means算法优化研究综述 Review of K-means Algorithm Optimization Based on Differential Privacy 计算机科学, 2022, 49(2): 162-173. https://doi.org/10.11896/jsjkx.201200008 |
[9] | 金华, 朱靖宇, 王昌达. 视频隐私保护技术综述 Review on Video Privacy Protection 计算机科学, 2022, 49(1): 306-313. https://doi.org/10.11896/jsjkx.201200047 |
[10] | 王辉, 朱国宇, 申自浩, 刘琨, 刘沛骞. 基于用户偏好和位置分布的假位置生成方法 Dummy Location Generation Method Based on User Preference and Location Distribution 计算机科学, 2021, 48(7): 164-171. https://doi.org/10.11896/jsjkx.200800069 |
[11] | 季琰, 戴华, 姜莹莹, 杨庚, 易训. 面向混合云的可并行多关键词Top-k密文检索技术 Parallel Multi-keyword Top-k Search Scheme over Encrypted Data in Hybrid Clouds 计算机科学, 2021, 48(5): 320-327. https://doi.org/10.11896/jsjkx.200300160 |
[12] | 郭蕊, 芦天亮, 杜彦辉. WSN中基于目标决策的源位置隐私保护方案 Source-location Privacy Protection Scheme Based on Target Decision in WSN 计算机科学, 2021, 48(5): 334-340. https://doi.org/10.11896/jsjkx.200400099 |
[13] | 郭上铜, 王瑞锦, 张凤荔. 区块链技术原理与应用综述 Summary of Principle and Application of Blockchain 计算机科学, 2021, 48(2): 271-281. https://doi.org/10.11896/jsjkx.200800021 |
[14] | 彭春春, 陈燕俐, 荀艳梅. 支持本地化差分隐私保护的k-modes聚类方法 k-modes Clustering Guaranteeing Local Differential Privacy 计算机科学, 2021, 48(2): 105-113. https://doi.org/10.11896/jsjkx.200700172 |
[15] | 王瑞锦, 唐榆程, 裴锡凯, 郭上铜, 张凤荔. 基于轻量级同态加密和零知识证明的区块链隐私保护方案 Block-chain Privacy Protection Scheme Based on Lightweight Homomorphic Encryption and Zero-knowledge Proof 计算机科学, 2021, 48(11A): 547-551. https://doi.org/10.11896/jsjkx.201200138 |
|