• 中国计算机学会会刊
  • 中国科技核心期刊
  • 中文核心期刊

J4 ›› 2012, Vol. 34 ›› Issue (11): 50-54.

• 论文 • 上一篇    下一篇

基于社会网络的(α,k)匿名方法

张晓琳,王颖,李玉峰   

  1. (内蒙古科技大学信息工程学院,内蒙古 包头 014010)
  • 收稿日期:2011-09-12 修回日期:2011-11-02 出版日期:2012-11-25 发布日期:2012-11-25
  • 基金资助:

    国家自然基金资助项目(61163015);内蒙古自然科学基金重点项目(20080404Zd21);教育部“春晖计划”基金资助项目(Z2009101024)

A (α, k)Anonymity Method Based on Social Networks

ZHANG Xiaolin,WANG Ying,LI Yufeng   

  1. (School of Information Engineering,Inner Mongolia University of
    Science and Technology,Baotou 014010,China)
  • Received:2011-09-12 Revised:2011-11-02 Online:2012-11-25 Published:2012-11-25

摘要:

随着网络技术的快速发展,大量在线社会网络的建立和使用,越来越多的人参加到社会网络中分享和交流信息,而在这种交互过程中,会产生大量的数据。这些数据中有些是用户个人生活领域中不愿意别人知道的事情,可以认为它们是用户的隐私。社会网络数据发布的隐私保护成为新兴的研究课题。本文提出了应用于社会网络的(α,k)匿名方法,采用基于聚类的方法,对节点的属性及节点之间的关系进行保护。每个聚类中的节点数至少为k个,并且聚类中任一敏感属性值相关的节点的百分比不高于α。理论分析和实验结果表明,基于社会网络的(α,k)匿名方法能在信息损失尽可能小的情况下有效地保护隐私。

关键词: 社会网络, 隐私保护, (&alpha, k)匿名方法

Abstract:

With the rapid development of Internet technology and the establishment and use of online social networks,more and more people attend in social networks to share information.In this interactive process,a large number of data are produced.Some of these data are a perosn’s privacy so that they should not be known by other individuals.The privacy protection of the released data in the social network becomes a emerging research subject.The paper proposed the (α, k)Anonymity method of the social network. It uses the clustering method to protect the node’s attribute and the relationship between nodes. Each cluster have at least k nodes,and in each cluster the percentage of any sensitive attribute value associated with the node is not higher than α.Theoretical analysis and experimental results show that the proposed social network (α, k)Anonymity method can effectively protect the privacy protection in the condition that the information loss is as small as possible.

Key words: social networks;privacy protection;(α, k)anonymity