Dynamic social privacy protection based on graph mode partition in complex social network

Personal Technologies - Tập 23 - Trang 511-519 - 2019
Gu Qiuyang1, Ni Qilian1, Meng Xiangzhao2, Yang Zhijiao1
1Faculty of Business, University of Nottingham Ningbo China, Ningbo, China
2School of Law, Shanghai Academy of Social Sciences, Shanghai, China

Tóm tắt

Differential privacy protection model provides strict and quantitative risk representation for privacy disclosure, which greatly ensures the availability of data. However, most existing methods do not consider the semantic context, so they are vulnerable to attacks based on semantic information. Therefore, dynamic social privacy protection based on graph pattern partitioning is designed to satisfy differential privacy protection. Firstly, the structure of social network is represented as a graph model, and the original graph is classified into several sub-graphs according to the characteristics of nodes. Then, the dense area of each sub-graph is divided by quad-tree method, and the noise of differential privacy protection is added to the leaf nodes of the tree, and the graph publishing is generated by sub-graph reconstruction. Finally, the feasibility and practicability of the model are verified by statistical analysis, such as degree distribution, shortest path, and clustering coefficient. The simulation results show the validity and applicability of the privacy protection method proposed in this paper.

Tài liệu tham khảo

Yin C, Xi J, Sun R et al (2017) Location privacy protection based on differential privacy strategy for big data in industrial internet-of-things. IEEE Trans Ind Informatics:1 Kong F, Hao Z, Zhang B (2017) Improved differential current protection scheme for CSC-HVDC transmission lines. IET Gener Transm Distrib 11(4):978–986 Rinott Y, O’Keefe CM, Shlomo N, Skinner C (2018) Confidentiality and differential privacy in the dissemination of frequency tables. Stat Sci 33(3):358–385 Chakraborty B, Verma S, Singh KP (2018) Staircase based differential privacy with branching mechanism for location privacy preservation in wireless sensor networks. Comput Secur :S016740481830227X Jun W, Rongbo Z, Shubo L et al (2018) Node location privacy protection based on differentially private grids in industrial wireless sensor networks. Sensors 18(2):410 To H, Ghinita G, Fan L et al (2017) Differentially private location protection for worker datasets in spatial crowdsourcing. IEEE Trans Mob Comput 16(4):934–949 George SP, Ashok S (2018) Adaptive differential protection for transformers in grid-connected wind farms. Int Trans Electr Energy Syst 28:e2594 Zheng J, Wen M, Chen Y, Shao X (2018) A novel differential protection scheme for HVDC transmission lines. Int J Electr Power Energy Syst 94:171–178 Zequ Y, Peng C, Jiming C (2017) Differential-privacy preserving optimal power flow in smart grid. IET Gener Transm Distrib 11(15):3853–3861 Wang S, Huang L, Nie Y et al (2019) Local differential private data aggregation for discrete distribution estimation. IEEE Trans Parallel Distrib Syst (99):1–1 Dong X, Gong Y, Ma J et al (2018) Protecting operation-time privacy of primary users in downlink cognitive two-tier networks. IEEE Trans Veh Technol (99):1–1 Proserpio D, Goldberg S, Mcsherry F (2014) Calibrating data to sensitivity in private data analysis: a platform for differentially private analysis of weighted datasets. Proceedings of the VLDB Endowment 7(8):637–648 Hay M, Rastogi V, Miklau G, Suciu D (2010) Boosting the accuracy of differentially private histograms through consistency. Proceedings of the VLDB Endowment 3(1–2):1021–1032 Nissim K, Raskhodnikova S, Smith A (2007) Smooth sensitivity and sampling in private data analysis. Proceedings of the 39th Annual ACM Symposium on Theory of Computing, San Diego, California, USA, June 11–13, 2007. 75–84. https://doi.org/10.1145/1250790.1250803 Karwa V, Raskhodnikova S, Smith A, Yaroslavtsev G (2014) Private analysis of graph structure. ACM Trans Database Syst 39(3):1–33 Wang Y, Wu X, Zhu J, Xiang Y (2013) On learning cluster coefficient of private networks. Soc Netw Anal Min 3(4):925–938 Chen R, Fung BCM, Yu PS, Desai BC (2014) Correlated network data publication via differential privacy. VLDB J 23(4):653–676 Xia K-j, Yin H-s, Zhang Y-d (2019) Deep semantic segmentation of kidney and space-occupying lesion area based on SCNN and ResNet models combined with SIFT-flow algorithm. J Med Syst 43:2 Gao H, Huang W, Yang X, Duan Y, Yin Y (2018) Towards service selection for workflow reconfiguration: an Interface-based computing. Future generation. Comput Syst (FGCS) 87:298–311 Gao H, Mao S, Huang W, Yang X (2018) Applying probabilistic model checking to financial production risk evaluation and control: a case study of Alibaba’s Yu’e Bao. IEEE Trans Comput Soc Syst 5(3):785–795 Gao H, Duan Y, Miao H, Yin Y (2017) An approach to data consistency checking for the dynamic replacement of service process. IEEE Access 5(1):11700–11711 Gao H, Chu D, Duan Y (2017) The Probabilistic model checking based service selection method for business process modeling. J Softw Eng Knowl Eng 27(6):897–923 Xia KJ, Yin HS, Wang JQ (2018) A novel improved deep convolutional neural network model for medical image fusion. Clust Comput 3:1–13 Sala A, Zhao X, Wilson C, et al (2011) [ACM Press the 2011 ACM SIGCOMM conference - Berlin, Germany (2011.11.02-2011.11.04)] Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference - IMC \”11 - Sharing graphs using differentially private graph models,81 Lin C, Wang P, Song H, Zhou Y, Liu Q, Wu G (2016) A differential privacy protection scheme for sensitive big data in body sensor networks. Ann Telecommun 71(9):465–475 Ou L, Qin Z, Liu Y, et al (2016) Multi-user location correlation protection with differential privacy. 2016 IEEE 22nd International Conference on Parallel and Distributed Systems (ICPADS). IEEE Song C, Ge T (2014) Aroma: a new data protection method with differential privacy and accurate query answering. ACM Qian P, Xi C, Min X, Jiang Y, Kuan-Hao S, Wang S, Muzic RF Jr (2018) SSC-EKE: semi-supervised classification with extensive knowledge exploitation. Inf Sci 422:51–76 Qian P, Sun S, Jiang Y, Su K-H, Ni T, Wang S, Muzic RF Jr (2016) Cross-domain, soft-partition clustering with diversity measure and knowledge reference. Pattern Recogn 50:155–177 Qian P, Zhou J, Jiang Y, Liang F, Zhao K, Wang S, Su K-H, Muzic RF Jr (2018) Multi-view maximum entropy clustering by jointly leveraging inter-view collaborations and intra-view-weighted attributes. IEEE Access 6:28594–28610 Hong W, Lina GE, Suqing W et al (2018) Improvement of differential privacy protection algorithm based on OPTICS clustering. J Comput Appl