Computer Science ›› 2019, Vol. 46 ›› Issue (10): 154-160.doi: 10.11896/jsjkx.180901749

• Information Security • Previous Articles     Next Articles

Cluster-based Social Network Privacy Protection Method

ZHOU Yi-hua, ZHANG Bing, YANG Yu-guang, SHI Wei-min   

  1. (Faculty of Information Technology,Beijing University of Technology,Beijing 100124,China)
    (Beijing Key Laboratory of Trusted Computing,Beijing 100124,China)
  • Received:2018-09-16 Revised:2019-04-21 Online:2019-10-15 Published:2019-10-21

Abstract: With the rapid development of social networks,social networks have accumulated a large amount of data,which reflect the social laws to some extent.Aiming at mining effective knowledge under the premise of ensuring privacy,this paper proposed a clustering-based social network privacy protection method.The method has the characteristics of adaptive privacy protection strength,high security and effectiveness of anonymity model.Clustering is conducted based on user information and social relationships.It clusters all nodes in the social network into a super point containing at least k nodes according to the distance between nodes,and then the super points are anonymized.Anonymous super points can effectively prevent various types of privacy attacks taking node attribute privacy and sub-graph structure as background knowledge,so that attackers cannot identify users with a probability greater than 1/k.According to the characteristics of clustering algorithm and social network,the initial node selection algorithm and node spacing calculation method in clustering process are optimized,and by combining the adaptive thinking,the selection method of privacy protection strength is also optimized,which effectively reduces information loss and improves data validity.Experiments were carried out on Matlab platform with different data sets.The results show that the proposed method issuperior to other related methods in terms of information loss and running time,which further proves its effectiveness and security.

Key words: Clustering, Information security, K-anonymity, Privacy protection, Social network

CLC Number: 

  • TP391
[1]LIU X Y,WANG B,YANG X C.Survey on Privacy Preserving Techniques for Publishing Social Network Data[J].Journal of Software,2014,25(3):576-590.
[2]LIU K,TERZI E.Towards identity anonymization on graphs [C]//ACM SIGMOD International Conference on Management of Data.ACM,2008:93-106.
[3]LIU K,DAS K,GRANDISON T,et al.Privacy-Preserving Data Analysis on Graphs and Social Networks[OL].https://www.researchgate.net/publication/290110049_Privacy-Preserving_Data_Analysis_on_Graphs_and_Social_Networks.
[4]CEN T T,HAN J M,WANG J Y,et al.Survey of K-anonymity research on privacy preservation[J].Computer Engineering & Applications,2008,44(4):130-134.(in Chinese)
岑婷婷,韩建民,王基一,等.隐私保护中K-匿名模型的综述[J].计算机工程与应用,2008,44(4):130-134.
[5]WANG Z B,SHEN M Y,ZHAO J.Privay protection technology discussion of social network based on node reconstruction.Computer Engineering and Applications,2017,53(11):131-136.(in Chinese)
王正彬,沈明玉,赵皎.基于节点重构的社交网络的隐私保护技术探讨.计算机工程与应用,2017,53(11):131-136.
[6]XIE Y,ZHENG M.A Differentiated Anonymity Algorithm for Social Network Privacy Preservation[J].Algorithms,2016,9(4):85.
[7]ZHELEVA E,GETOOR L.Preserving the Privacy of Sensitive Relationships in Graph Data[C]//ACM SIGKDD International Conference on Privacy,Security,and Trust in Kdd.Springer-Verlag,2008:153-171.
[8]ZOU L,CHEN L,ÖZSU M T.k-automorphism:a general framework for privacy preserving network publication[M].VLDB Endowment,2009.
[9]GU Y H,LIN J C,GUO D.Clusterin-based bynamic privacy preserving method for social networks.Journal on Communications,2015,36(S1),126-130.(in Chinese)
谷勇浩,林九川,郭达.基于聚类的动态社交网络隐私保护方法.通信学报,2015,36(S1):126-130.
[10]CAMPAN A,TRUTA T M.Data and Structural k-Anonymity in Social Networks[M]//Privacy,Security,and Trust in KDD.Springer Berlin Heidelberg,2008:33-54.
[11]SKARKALA M E,MARAGOUDAKIS M,GRITZALIS S,et al.Privacy Preservation by k-Anonymization of Weighted Social Networks[C]//IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining.IEEE,2012:423-428.
[12]LAN L H ,JU S G,JIN H.Social Networks Data Publication Based on k-anonymity[J].Computer Science,2011,38(11):156-160.(in Chinese)
兰丽辉,鞠时光,金华.社会网络数据的k-匿名发布[J].计算机科学,2011,38(11):156-160.
[13]JIANG H W,ZHAN Q H,LIU W J,et al.Clustering-Anonymity Approach for Privacy Preservation of Graph Data-Publishing[J].Journal of Software,2017,28(9):2323-2333.(in Chinese)
姜火文,占清华,刘文娟,等.图数据发布隐私保护的聚类匿名方法[J].软件学报,2017,28(9):2323-2333.
[14]RONG H,MA T H,TANG M L,et al.A novel subgraph K+-isomorphism method in social network based on graph similarity detection [J].Soft Computing,2018,22(8):2583-2601.
[15]SAMANTHULA B K,LEI C,WEI J,et al.Privacy-Preserving and Efficient Friend Recommendation in Online Social Networks[J].Transactions on Data Privacy,2015,8(2):141-171.
[16]LIU P,BAI Y,WANG L,et al.Partial k-Anonymity for Privacy-Preserving Social Network Data Publishing[J].International Journal of Software Engineering & Knowledge Engineering,2016,27(1):71-90.
[17]YU F H,CHEN M J,YU B L,et al.Privacy preservation based on clustering perturbation algorithm for social network[J].Multimedia Tools & Applications,2018,77(9):1-18.
[18]QIAN J W,LI X Y,ZHANG C H,et al.Social Network De-Anonymization and Privacy Inference with Knowledge GraphMo-del[J].IEEE Transactions on Dependable and Secure Computing,2017,PP(99):1-1.
[1] CHAI Hui-min, ZHANG Yong, FANG Min. Aerial Target Grouping Method Based on Feature Similarity Clustering [J]. Computer Science, 2022, 49(9): 70-75.
[2] LU Chen-yang, DENG Su, MA Wu-bin, WU Ya-hui, ZHOU Hao-hao. Federated Learning Based on Stratified Sampling Optimization for Heterogeneous Clients [J]. Computer Science, 2022, 49(9): 183-193.
[3] WANG Jian, PENG Yu-qi, ZHAO Yu-fei, YANG Jian. Survey of Social Network Public Opinion Information Extraction Based on Deep Learning [J]. Computer Science, 2022, 49(8): 279-293.
[4] YU Shu-hao, ZHOU Hui, YE Chun-yang, WANG Tai-zheng. SDFA:Study on Ship Trajectory Clustering Method Based on Multi-feature Fusion [J]. Computer Science, 2022, 49(6A): 256-260.
[5] MAO Sen-lin, XIA Zhen, GENG Xin-yu, CHEN Jian-hui, JIANG Hong-xia. FCM Algorithm Based on Density Sensitive Distance and Fuzzy Partition [J]. Computer Science, 2022, 49(6A): 285-290.
[6] CHEN Jing-nian. Acceleration of SVM for Multi-class Classification [J]. Computer Science, 2022, 49(6A): 297-300.
[7] Ran WANG, Jiang-tian NIE, Yang ZHANG, Kun ZHU. Clustering-based Demand Response for Intelligent Energy Management in 6G-enabled Smart Grids [J]. Computer Science, 2022, 49(6): 44-54.
[8] WEI Peng, MA Yu-liang, YUAN Ye, WU An-biao. Study on Temporal Influence Maximization Driven by User Behavior [J]. Computer Science, 2022, 49(6): 119-126.
[9] CHEN Jia-zhou, ZHAO Yi-bo, XU Yang-hui, MA Ji, JIN Ling-feng, QIN Xu-jia. Small Object Detection in 3D Urban Scenes [J]. Computer Science, 2022, 49(6): 238-244.
[10] XING Yun-bing, LONG Guang-yu, HU Chun-yu, HU Li-sha. Human Activity Recognition Method Based on Class Increment SVM [J]. Computer Science, 2022, 49(5): 78-83.
[11] ZHU Zhe-qing, GENG Hai-jun, QIAN Yu-hua. Line-Segment Clustering Algorithm for Chemical Structure [J]. Computer Science, 2022, 49(5): 113-119.
[12] YU Ai-xin, FENG Xiu-fang, SUN Jing-yu. Social Trust Recommendation Algorithm Combining Item Similarity [J]. Computer Science, 2022, 49(5): 144-151.
[13] ZHANG Yu-jiao, HUANG Rui, ZHANG Fu-quan, SUI Dong, ZHANG Hu. Study on Affinity Propagation Clustering Algorithm Based on Bacterial Flora Optimization [J]. Computer Science, 2022, 49(5): 165-169.
[14] WANG Mei-shan, YAO Lan, GAO Fu-xiang, XU Jun-can. Study on Differential Privacy Protection for Medical Set-Valued Data [J]. Computer Science, 2022, 49(4): 362-368.
[15] CHANG Ya-wen, YANG Bo, GAO Yue-lin, HUANG Jing-yun. Modeling and Analysis of WeChat Official Account Information Dissemination Based on SEIR [J]. Computer Science, 2022, 49(4): 56-66.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!