Dynamic social privacy protection based on graph mode partition in complex social network
Tóm tắt
Differential privacy protection model provides strict and quantitative risk representation for privacy disclosure, which greatly ensures the availability of data. However, most existing methods do not consider the semantic context, so they are vulnerable to attacks based on semantic information. Therefore, dynamic social privacy protection based on graph pattern partitioning is designed to satisfy differential privacy protection. Firstly, the structure of social network is represented as a graph model, and the original graph is classified into several sub-graphs according to the characteristics of nodes. Then, the dense area of each sub-graph is divided by quad-tree method, and the noise of differential privacy protection is added to the leaf nodes of the tree, and the graph publishing is generated by sub-graph reconstruction. Finally, the feasibility and practicability of the model are verified by statistical analysis, such as degree distribution, shortest path, and clustering coefficient. The simulation results show the validity and applicability of the privacy protection method proposed in this paper.
Tài liệu tham khảo
Yin C, Xi J, Sun R et al (2017) Location privacy protection based on differential privacy strategy for big data in industrial internet-of-things. IEEE Trans Ind Informatics:1
Kong F, Hao Z, Zhang B (2017) Improved differential current protection scheme for CSC-HVDC transmission lines. IET Gener Transm Distrib 11(4):978–986
Rinott Y, O’Keefe CM, Shlomo N, Skinner C (2018) Confidentiality and differential privacy in the dissemination of frequency tables. Stat Sci 33(3):358–385
Chakraborty B, Verma S, Singh KP (2018) Staircase based differential privacy with branching mechanism for location privacy preservation in wireless sensor networks. Comput Secur :S016740481830227X
Jun W, Rongbo Z, Shubo L et al (2018) Node location privacy protection based on differentially private grids in industrial wireless sensor networks. Sensors 18(2):410
To H, Ghinita G, Fan L et al (2017) Differentially private location protection for worker datasets in spatial crowdsourcing. IEEE Trans Mob Comput 16(4):934–949
George SP, Ashok S (2018) Adaptive differential protection for transformers in grid-connected wind farms. Int Trans Electr Energy Syst 28:e2594
Zheng J, Wen M, Chen Y, Shao X (2018) A novel differential protection scheme for HVDC transmission lines. Int J Electr Power Energy Syst 94:171–178
Zequ Y, Peng C, Jiming C (2017) Differential-privacy preserving optimal power flow in smart grid. IET Gener Transm Distrib 11(15):3853–3861
Wang S, Huang L, Nie Y et al (2019) Local differential private data aggregation for discrete distribution estimation. IEEE Trans Parallel Distrib Syst (99):1–1
Dong X, Gong Y, Ma J et al (2018) Protecting operation-time privacy of primary users in downlink cognitive two-tier networks. IEEE Trans Veh Technol (99):1–1
Proserpio D, Goldberg S, Mcsherry F (2014) Calibrating data to sensitivity in private data analysis: a platform for differentially private analysis of weighted datasets. Proceedings of the VLDB Endowment 7(8):637–648
Hay M, Rastogi V, Miklau G, Suciu D (2010) Boosting the accuracy of differentially private histograms through consistency. Proceedings of the VLDB Endowment 3(1–2):1021–1032
Nissim K, Raskhodnikova S, Smith A (2007) Smooth sensitivity and sampling in private data analysis. Proceedings of the 39th Annual ACM Symposium on Theory of Computing, San Diego, California, USA, June 11–13, 2007. 75–84. https://doi.org/10.1145/1250790.1250803
Karwa V, Raskhodnikova S, Smith A, Yaroslavtsev G (2014) Private analysis of graph structure. ACM Trans Database Syst 39(3):1–33
Wang Y, Wu X, Zhu J, Xiang Y (2013) On learning cluster coefficient of private networks. Soc Netw Anal Min 3(4):925–938
Chen R, Fung BCM, Yu PS, Desai BC (2014) Correlated network data publication via differential privacy. VLDB J 23(4):653–676
Xia K-j, Yin H-s, Zhang Y-d (2019) Deep semantic segmentation of kidney and space-occupying lesion area based on SCNN and ResNet models combined with SIFT-flow algorithm. J Med Syst 43:2
Gao H, Huang W, Yang X, Duan Y, Yin Y (2018) Towards service selection for workflow reconfiguration: an Interface-based computing. Future generation. Comput Syst (FGCS) 87:298–311
Gao H, Mao S, Huang W, Yang X (2018) Applying probabilistic model checking to financial production risk evaluation and control: a case study of Alibaba’s Yu’e Bao. IEEE Trans Comput Soc Syst 5(3):785–795
Gao H, Duan Y, Miao H, Yin Y (2017) An approach to data consistency checking for the dynamic replacement of service process. IEEE Access 5(1):11700–11711
Gao H, Chu D, Duan Y (2017) The Probabilistic model checking based service selection method for business process modeling. J Softw Eng Knowl Eng 27(6):897–923
Xia KJ, Yin HS, Wang JQ (2018) A novel improved deep convolutional neural network model for medical image fusion. Clust Comput 3:1–13
Sala A, Zhao X, Wilson C, et al (2011) [ACM Press the 2011 ACM SIGCOMM conference - Berlin, Germany (2011.11.02-2011.11.04)] Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference - IMC \”11 - Sharing graphs using differentially private graph models,81
Lin C, Wang P, Song H, Zhou Y, Liu Q, Wu G (2016) A differential privacy protection scheme for sensitive big data in body sensor networks. Ann Telecommun 71(9):465–475
Ou L, Qin Z, Liu Y, et al (2016) Multi-user location correlation protection with differential privacy. 2016 IEEE 22nd International Conference on Parallel and Distributed Systems (ICPADS). IEEE
Song C, Ge T (2014) Aroma: a new data protection method with differential privacy and accurate query answering. ACM
Qian P, Xi C, Min X, Jiang Y, Kuan-Hao S, Wang S, Muzic RF Jr (2018) SSC-EKE: semi-supervised classification with extensive knowledge exploitation. Inf Sci 422:51–76
Qian P, Sun S, Jiang Y, Su K-H, Ni T, Wang S, Muzic RF Jr (2016) Cross-domain, soft-partition clustering with diversity measure and knowledge reference. Pattern Recogn 50:155–177
Qian P, Zhou J, Jiang Y, Liang F, Zhao K, Wang S, Su K-H, Muzic RF Jr (2018) Multi-view maximum entropy clustering by jointly leveraging inter-view collaborations and intra-view-weighted attributes. IEEE Access 6:28594–28610
Hong W, Lina GE, Suqing W et al (2018) Improvement of differential privacy protection algorithm based on OPTICS clustering. J Comput Appl