计算机科学 ›› 2021, Vol. 48 ›› Issue (9): 9-20.doi: 10.11896/jsjkx.201000011
雷羽潇, 段玉聪
LEI Yu-xiao , DUAN Yu-cong
摘要: 随着虚拟社区在网络用户中的普及,虚拟社区群已经成为一个小型社会,可通过用户浏览所留下的“虚拟痕迹”和发布的用户生成内容提炼出与用户相关的隐私类型资源。根据隐私类型资源自身的特性,可将其分类为数据资源、信息资源和知识资源,三者构成了用户的数据信息知识与智慧图谱(DIKW图谱)。虚拟社区中的隐私类型资源有4个流通过程,即隐私资源的感知、存储、传输和处理;4个过程分别由3个参与方(用户、AI系统和访问者)单独或合作完成,3个参与方所拥有的隐私权包括知情权、参与权、遗忘权和监督权。通过明确3个参与方在4个流通过程中的隐私权范围,结合隐私价值保护,设计了匿名保护机制/风险评估机制和监督机制,用于构建一个虚拟社区隐私保护的AI治理法律框架。
中图分类号:
[1]O'NEILL E,KOSTAKOS V,KINDBERG T,et al.Instrumenting the City:Developing Methods for Observing and Understanding the Digital Cityscape [C]//Lecture Notes in Computer Science.2006,4206:315-322. [2]GIRARDIN F,CALABRESE F,FIORE F D,et al.Digital Footprinting:uncovering tourists with user-generated content[J].IEEE Pervasive Computing,2008,7(4):36-43. [3]HU H,GE Y J,HOU D Y.Using Web Crawler Technology for Geo-Events Analysis:A Case Study of theHuangyan Island Incident[J].Sustainability,2014,6(4):1896-1912. [4]KRUMM J,DAVIES N,NARAYANASWAMI C.User-generated content[J].IEEE Pervasive Computing,2008,7(4):10-11. [5]LEI Y,DUAN Y.Personality Classification and ConversionMethod of Virtual Community Personnel Based on DIKW Graph[J].Chinese Journal of Applied Sciences,2020,38(5):803-824. [6]ULRIKE H.Reviewing person's value of privacy of online social networking[J].Internet Research,2011,21(4):384-407. [7]BOZDA E.Bias in algorithmic filtering and personalization[J].Ethics & Information Technology,2013,15(3):209-227. [8]MITTELSTADT B D,ALLO P,TADDEO M,et al.The ethics of algorithms:mapping the debate[J].Big Data and Society,2016,3(2):1-21. [9]DUAN Y C,ZHAN L G,ZHANG XY,et al.Formalizing DIKW Architecture for Modeling Security and Privacy as Typed Resources[C]//Testbeds and Research Infrastructures for the Development of Networks and Communities.2018:157-168. [10]DUAN Y C,SHAO L X,HU G Z,et al.Specifying architecture of knowledge graph with data graph,information graph,know-ledge graph and wisdom graph[C]//IEEE International Confe-rence on Software Engineering Research.IEEE,2017. [11]SONG Z Y,DUAN Y C,WAN S X,et al.Processing Optimization of Typed Resources with Synchronized Storage and Computation Adaptation in Fog Computing[J].Wireless Communications and Mobile Computing,2018,2018:1-13. [12]GURSES S,ALAMO J M D.Privacy Engineering:Shaping an Emerging Field of Research and Practice[J].IEEE Security & Privacy,2016,14(2):40-46. [13]DUAN Y C,SUN X B,CHE H Y,et al.Modeling Data,Information and Knowledge for Security Protection of Hybrid IoT and Edge Resources[J].IEEE Access,2019,7:99161-99176. [14]DUAN Y C.Existence Computation:Revelation on Entity vs.Relationship for Relationship Defined Everything of Semantics[C]//2019 20th IEEE/ACIS International Conference on Software Engineering,Artificial Intelligence,Networking and Parallel/Distributed Computing (SNPD).2019:139-144. [15]OLSON D L.Data mining in business services[J].Service Business,2007,1(3):181-193. [16]KURGAN L A,MUSILEK P.A survey of Knowledge Discovery and Data Mining process models[J].The Knowledge Enginee-ring Review,2006,21(1):1-24. [17]VISSER W,HINDRIKS K V,JONKER C M.Argumentation-Based Qualitative Preference Modelling with Incomplete and Uncertain Information[J].Group Decision & Negotiation,2012,21(1):99-127. [18]MITTELSTAD B.From Individual to Group Privacy in Big Data Analytics[J].Philosophy & Technology,2017,30(4):475-494. [19]VASSILIADIS P.A Survey of Extract-Transform-Load Technology[J].International Journal of Data Warehousing & Mi-ning,2009,5(3):1-27. [20]HARIRI R H,FREDERICKS E M,BOWERS K M.Uncertainty in big data analytics:survey,opportunities,and challenges[J].Journal of Big Data,2019,6(1):44. [21]HARPER J.Privacy and the Four Categories of InformationTechnology[R].American Enterprise Institute Report,2020. [22]EKSTRAND M D,JOSHAGHANI R,MEHRPOUYAN H.Privacy for All:Ensuring Fair and Equitable Privacy Protections[C]//Proceedings of the 1st Conference on Fairness,Accountability and Transparency.2018:35-47. [23]HOFFMAN S,PODGURSKI A.Balancing Privacy,Autonomy,and Scientific Needs In Electronic Health Records Research[J].SMU law review:a publication of Southern Methodist University School of Law,2012,65(1):85-144. [24]SOLOVE D J.The Future of Reputation:Gossip,Rumor,and Privacy on the Internet[M]//Yale University Press,2007. [25]GORMAN D.Rights in Collision: The Individual Right of Privacy and the Public Right To Know[J].Asahi Law Review Asahi University School of Law,1978,35(2):249-257. [26]MANTELERO A.The EU Proposal for a General Data Protection Regulation and the roots of the right to be forgotten[J].Computer Law & Security Review,2013,29(3),229-235. [27]WALLACE K A.Anonymity[J].Ethics and Information Technology,1999,1(1):21-31. |
[1] | 王辉, 朱国宇, 申自浩, 刘琨, 刘沛骞. 基于用户偏好和位置分布的假位置生成方法[J]. 计算机科学, 2021, 48(7): 164-171. |
[2] | 季琰, 戴华, 姜莹莹, 杨庚, 易训. 面向混合云的可并行多关键词Top-k密文检索技术[J]. 计算机科学, 2021, 48(5): 320-327. |
[3] | 郭蕊, 芦天亮, 杜彦辉. WSN中基于目标决策的源位置隐私保护方案[J]. 计算机科学, 2021, 48(5): 334-340. |
[4] | 彭春春, 陈燕俐, 荀艳梅. 支持本地化差分隐私保护的k-modes聚类方法[J]. 计算机科学, 2021, 48(2): 105-113. |
[5] | 郭上铜, 王瑞锦, 张凤荔. 区块链技术原理与应用综述[J]. 计算机科学, 2021, 48(2): 271-281. |
[6] | 余雪勇, 陈涛. 边缘计算场景中基于虚拟映射的隐私保护卸载算法[J]. 计算机科学, 2021, 48(1): 65-71. |
[7] | 李彦, 申德荣, 聂铁铮, 寇月. 面向加密云数据的多关键字语义搜索方法[J]. 计算机科学, 2020, 47(9): 318-323. |
[8] | 郭蕊, 芦天亮, 杜彦辉, 周杨, 潘孝勤, 刘晓晨. 基于改进蚁群算法的WSN源位置隐私保护[J]. 计算机科学, 2020, 47(7): 307-313. |
[9] | 王辉, 刘玉祥, 曹顺湘, 周明明. 融入区块链技术的医疗数据存储机制[J]. 计算机科学, 2020, 47(4): 285-291. |
[10] | 许重建,李险峰. 区块链交易数据隐私保护方法[J]. 计算机科学, 2020, 47(3): 281-286. |
[11] | 赵楠,章国安. VANET中基于无证书环签密的可认证隐私保护方案[J]. 计算机科学, 2020, 47(3): 312-319. |
[12] | 李艳斌, 刘瑜, 李木舟, 吴韧韬, 王鹏达. MASCOT协议的参与方自适应变体[J]. 计算机科学, 2020, 47(11A): 380-387. |
[13] | 蔡威, 白光伟, 沈航, 成昭炜, 张慧丽. 移动群智感知中基于强化学习的双赢博弈[J]. 计算机科学, 2020, 47(10): 41-47. |
[14] | 李兰, 杨晨, 王安福. 差分隐私模型中隐私参数ε的选取研究[J]. 计算机科学, 2019, 46(8): 201-205. |
[15] | 吕志泉, 李昊, 张宗福, 张敏. 基于主题模型的社交网络匿名用户重识别[J]. 计算机科学, 2019, 46(6): 143-147. |
|