浏览全部资源
扫码关注微信
1. 西安电子科技大学网络与信息安全学院,陕西 西安 710071
2. 中原工学院计算机学院,河南 郑州 450007
3. 综合业务网理论与关键技术国家重点实验室,陕西 西安 710071
[ "单芳芳(1984-),女,河南郑州人,西安电子科技大学博士生,主要研究方向为网络安全、云计算安全、信息保护。" ]
[ "李晖(1968-),男,河南灵宝人,博士,西安电子科技大学教授、博士生导师,主要研究方向为密码学、无线网络安全、云计算安全、信息论与编码理论。" ]
[ "朱辉(1981-),男,河南周口人,博士,西安电子科技大学教授、博士生导师,主要研究方向为数据安全及隐私保护、虚拟化技术与云计算安全、安全信息系统。" ]
网络出版日期:2018-03,
纸质出版日期:2018-03-25
移动端阅览
单芳芳, 李晖, 朱辉. 基于博弈论的社交网络转发控制机制[J]. 通信学报, 2018,39(3):172-180.
Fangfang SHAN, Hui LI, Hui ZHU. Game theory based forwarding control method for social network[J]. Journal on communications, 2018, 39(3): 172-180.
单芳芳, 李晖, 朱辉. 基于博弈论的社交网络转发控制机制[J]. 通信学报, 2018,39(3):172-180. DOI: 10.11959/j.issn.1000-436x.2018051.
Fangfang SHAN, Hui LI, Hui ZHU. Game theory based forwarding control method for social network[J]. Journal on communications, 2018, 39(3): 172-180. DOI: 10.11959/j.issn.1000-436x.2018051.
随着移动通信和互联网技术的快速发展,社交网络逐渐成为人们开展社交活动的主流方式之一。为了维护并增强人际关系,用户乐于在社交网络中分享个人行为、心情等内容,但对这些内容的转发操作会为发布者带来隐私泄露的风险。为解决社交网络中的转发决策问题,在分析转发双方收益的基础上,提出一种基于博弈论的社交网络转发控制机制,能够有效阻止转发者的非诚信转发行为。在分析转发者与发布者选择不同博弈策略所得收益的基础上,结合转发操作的历史数据,计算转发者进行非诚信转发的概率,并通过与发布者设置的阈值进行比较,给出是否允许转发的最终决定。介绍了基于博弈论的转发控制流程及架构设计,对博弈双方收益进行定义和分析,给出博弈过程,通过实验验证所提机制能够支持发布者给出最佳转发决策,保障发布者的内容安全。
With the rapid development of mobile communication and internet technology
the social network has become one of the mainstream social means used in people’s daily social life.To maintain and strengthen relationships with friends
users may share personal behavior and feelings through social networks.Forwarding these contents may result in privacy leakage.To help publishers make proper data forwarding decision
the benefits of both sides of the forwarding operation were analyzed
and a game theory based forwarding control method for social network was proposed which could effectively prevent dishonest data forwarding operation.By analyzing the benefits of both sides of forwarding operation and considering historical information
the probability of dishonest data forwarding operation was calculated and it was compared with the threshold set by publisher to make the forwarding decision.The procedure and framework of the game theory based forwarding control method was introduced.The benefits of both sides were defined and analyzed.The game play scenario was presented.Some results of experiments are shown to support that the method is effective and it can protect the security of content in social network.
刘建伟 , 李为宇 , 孙钰 . 社交网络安全问题及其解决方案 [J ] . 中国科学技术大学学报 , 2011 , 41 ( 7 ): 565 - 575 .
LIU J W , LI W Y , SUN Y . Security issues and solutions on social networks [J ] . Journal of University of Science &Technology of China , 2011 , 41 ( 7 ): 565 - 575 .
ILIA P , POLAKIS I , ATHANASOPOULOS E , et al . Face/off:preventing privacy leakage from photos in social networks [C ] // ACM Sigsac Conference on Computer and Communications Security (CCS’2015) . 2015 : 781 - 792 .
BILTON N . Twitter implements do not track privacy option [N ] . The New York Times , 2012 - 05 - 26 .
姚瑞欣 , 李晖 , 曹进 . 社交网络中的隐私保护研究综述 [J ] . 网络与信息安全学报 , 2016 , 2 ( 4 ): 33 - 43 .
YAO R X , LI H , CAO J . Overview of privacy preserving in social network [J ] . Chinese Journal of Network and Information Security , 2016 , 2 ( 4 ): 33 - 43 .
GATES C E.Access control requirements for Web 2 , . 0 security and privacy [C ] // IEEE Symposium Security and Privacy (SP’07) . 2007 : 249 - 256 .
CARMINATI B , FERRARI E . Enforcing relationships privacy through collaborative access control in web-based social networks [C ] // IEEE International Conference on Collaborative Computing:Networking,Applications and Worksharing(COLLABORATECOM’09) . 2009 : 1 - 9 .
CARMINATI B , FERRARI E , HEATHERLY R , et al . A semantic Web based framework for social network access control [C ] // ACM Symposium on Access Control MODELS and Technologies(SACMAT’09) . 2009 : 177 - 186 .
FONG P W L , ANWAR M , ZHAO Z . A privacy preservation model for facebook-style social network systems [C ] // European Symposium on Research in Computer Security(ESORICS’09) . 2009 : 303 - 320 .
FONG P W L , . Relationship-based access control:protection model and policy language [C ] // ACM Conference on Data and Application Security and Privacy(CODASPY’11) . 2011 : 191 - 202 .
FONG P W L , SIAHAAN I . Relationship-based access control policies and their policy languages [C ] // ACM Symposium on Access Control MODELS and Technologies(SACMAT’11) . 2011 : 51 - 60 .
BRUNS G , FONG P W L , SIAHAAN I , et al . Relationship-based access control:its expression and enforcement through hybrid logic [C ] // ACM Conference on Data and Application Security and Privacy(CODASPY’12) . 2012 : 117 - 124 .
PARK J , SANDHU R , CHENG Y . A user-activity-centric framework for access control in online social networks [J ] . IEEE Internet Computing , 2011 , 15 ( 5 ): 62 - 65 .
CHENG Y , PARK J , SANDHU R . A user-to-user relationship-based access control model for online social networks [C ] // ACM Conference on Data and Applications Security and Privacy(CODASPY’12) . 2012 : 8 - 24 .
YUAN C , PARK J , SANDHU R . Relationship-based access control for online social networks:beyond user-to-user relationships [C ] // International Conference on Privacy,Security,Risk and Trust (PASSAT’12) . 2012 : 646 - 655 .
PANG J , ZHANG Y . Cryptographic protocols for enforcing relationship-based access control policies [C ] // IEEE Computer Software and Applications Conference(COMPSAC’15) . 2015 : 484 - 493 .
SHUAI H , ZHU W T . Masque:access control for interactive sharing of encrypted data in social networks [C ] // International Conference on Network and System Security(NSS’12) . 2012 : 503 - 515 .
WELLMAN B , BERKOWITZ S D . Social structures:a network approach [J ] . American Political Science Association , 1988 , 83 ( 4 ).
田立勤 , 林闯 . 可信网络中一种基于行为信任预测的博弈控制机制 [J ] . 计算机学报 , 2007 , 30 ( 11 ): 1930 - 1938 .
TIAN L Q , LIN C . A kind of game-theoretic control mechanism of user behavior trust based on prediction in trustworthy network [J ] . Chinese Journal of Computers , 2007 , 30 ( 11 ): 1930 - 1938 .
YU J , WANG Y , LI J , et al . Analysis of competitive information dissemination in social network based on evolutionary game model [C ] // Cloud and Green Computing(CGC’12) . 2012 : 748 - 753 .
张胜兵 , 蔡皖东 , 李勇军 . 一种基于博弈论的社交网络访问控制方法 [J ] . 西北工业大学学报 , 2011 , 29 ( 4 ): 652 - 657 .
ZHANG S B , CAI W D , LI Y J . A game-theory based access control method suitable for social network [J ] . Journal of Northwestern Polytechnical University , 2011 , 29 ( 4 ): 652 - 657 .
ZHU P , WEI G , VASILAKOS A V , et al . Knowledge sharing in social network using game theory [M ] . Springer Berlin Heidelberg , 2012 .
张伊璇 , 何泾沙 , 赵斌 , 等 . 一个基于博弈理论的隐私保护模型 [J ] . 计算机学报 , 2016 , 39 ( 3 ): 615 - 627 .
ZHANG Y X , HE J S , ZHAO B , et al . A privacy protection model base on game theory [J ] . Chinese Journal of Computers , 2016 , 39 ( 3 ): 615 - 627 .
0
浏览量
1455
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构