浏览全部资源
扫码关注微信
西安电子科技大学网络与信息安全学院,陕西 西安 710071
[ "曾勇(1978-),男,湖南石门人,博士,西安电子科技大学副教授、硕士生导师,主要研究方向为信息安全、无线传感器网络等。" ]
[ "周灵杰(1993-),女,山东滨州人,西安电子科技大学硕士生,主要研究方向为信息安全、社交网络安全等。" ]
[ "蒋忠元(1988-),男,陕西榆林人,博士,西安电子科技大学副教授、硕士生导师,主要研究方向为复杂网络视角下的网络安全、城市计算等。" ]
[ "刘志宏(1968-),男,湖南常德人,博士,西安电子科技大学副教授、硕士生导师,主要研究方向为密码学、信息安全、网络编码、复杂网络、传感器网络等。" ]
[ "马建峰(1963-),男,陕西西安人,博士,西安电子科技大学教授、博士生导师,主要研究方向为信息安全、密码学与无线网络安全等。" ]
网络出版日期:2018-05,
纸质出版日期:2018-05-25
移动端阅览
曾勇, 周灵杰, 蒋忠元, 等. 基于奇异值分解的含权网络匿名化的安全性分析[J]. 通信学报, 2018,39(5):23-33.
Yong ZENG, Lingjie ZHOU, Zhongyuan JIANG, et al. Security analysis of weighted network anonymity based on singular value decomposition[J]. Journal on communications, 2018, 39(5): 23-33.
曾勇, 周灵杰, 蒋忠元, 等. 基于奇异值分解的含权网络匿名化的安全性分析[J]. 通信学报, 2018,39(5):23-33. DOI: 10.11959/j.issn.1000-436x.2018074.
Yong ZENG, Lingjie ZHOU, Zhongyuan JIANG, et al. Security analysis of weighted network anonymity based on singular value decomposition[J]. Journal on communications, 2018, 39(5): 23-33. DOI: 10.11959/j.issn.1000-436x.2018074.
分析基于奇异值分解(SVD)的匿名方法在加权社交网络隐私保护中的安全性,给出在含整数权重网络中的重构方法和在含任意权重网络中的非精确重构方法,定义
<math xmlns="http://www.w3.org/1998/Math/MathML"> <mfrac> <mi>ε</mi> <mi>N</mi> </mfrac> </math>
-容忍性来衡量其安全性,指出目前谱分析理论得到的ε(可重构系数)上界过于保守因而缺乏指导性。通过实验来测试随机网络、Barabasi-Albert网络、小世界网络以及实际网络的可重构系数,同时测试了基于 SVD 的双重扰动策略的可重构系数。实验结果表明,加权社交网络对谱的丢失具有不同的容忍性,其容忍性与网络参数之间存在密切的关系。
The security of anonymous method based on singular value decomposition (SVD) in the privacy preserving of weighted social network was analyzed.The reconstruction method in network with integer weights and the inexact reconstruction method in network with arbitrary weighted were proposed.The
<math xmlns="http://www.w3.org/1998/Math/MathML"> <mfrac> <mi>ε</mi> <mi>N</mi> </mfrac> </math>
-tolerance was definited to measure its safety.It was also pointed out that the upper bound of ε (the reconfigurable coefficient) obtained in current spectral theories was so conservative that lacks of guidance.The reconfigurable coefficients of random networks
Barabasi-Albert networks
small world networks and real networks were calculated by experiment.Moreover
the reconfigurable coefficients of double perturbation strategies based on SVD were also tested.Experimental results show that weighted social networks have different tolerances on spectrum loss
and there is a close relationship between its tolerance and network parameters.
冯登国 , 张敏 , 李昊 . 大数据安全与隐私保护 [J ] . 计算机学报 , 2014 , 37 ( 1 ): 246 - 258 .
FENG D G , ZHANG M , LI H , et al . Big data security and privacy protection [J ] . Chinese Journal of Computers , 2014 , 37 ( 1 ): 246 - 258 .
WONG R C W , LI J , FU A W C , et al . (α,k)-anonymity:an enhanced k-anonymity model for privacy preserving data publishing [C ] // The 12th ACM SIGKDD international conference on Knowledge discovery and data mining . 2006 : 754 - 759 .
CORMODE G , SRIVASTAVA D , YU T , et al . Anonymizing bipartite graph data using safe groupings [J ] . The VLDB Journal—The International Journal on Very Large Data Bases , 2010 , 19 ( 1 ): 115 - 139 .
CHENG J , FU A W , LIU J . K-isomorphism:privacy preserving network publication against structural attacks [C ] // The 2010 ACM SIGMOD International Conference on Management of Data . 2010 : 459 - 470 .
ABAWAJY J H , NINGGAL M I H , HERAWAN T . Privacy preserving social network data publication [J ] . IEEE Communications Surveys &Tutorials , 2016 , 18 ( 3 ): 1974 - 1997 .
LIU L , WANG J , LIU J , et al . Privacy preserving in social networks against sensitive edge disclosure [R ] . Technical Report Technical Report CMIDA-HiPSCCS 006-08 , 2008 .
DAS S , EĞECIOĞLU Ö , EL ABBADI A . Anonymizing weighted social network graphs [C ] // 2010 IEEE 26th International Conference on Data Engineering (ICDE) . 2010 : 904 - 907 .
LI Y , LI Y , YAN Q , et al . Privacy leakage analysis in online social networks [J ] . Computers & Security , 2015 , 49 : 239 - 254 .
苏洁 , 刘帅 , 罗智勇 , 等 . 基于信息损失量估计的匿名图构造方法 [J ] . 通信学报 , 2016 , 37 ( 6 ): 56 - 64 .
SU J , LIU S , LUO Z Y , et al . Method of constructing an anonymous graph based on information loss estimation [J ] . Journal on Communi-cations , 2016 , 37 ( 6 ): 56 - 64 .
LIU D , WANG H , VAN M P . Spectral perturbation and reconstructability of complex networks [J ] . Physical Review E , 2010 , 81 ( 1 ):016101.
XU S , ZHANG J , HAN D , et al . Singular value decomposition based data distortion strategy for privacy preserving [J ] . Knowledge and Information Systems , 2006 , 10 ( 3 ): 383 - 397 .
WU L , YING X , WU X . Reconstruction from randomized graph via low rank approximation [C ] // The 2010 SIAM International Conference on Data Mining,Society for Industrial and Applied Mathematics . 2010 : 60 - 71 .
PECH R , HAO D , PAN L , et al . Link prediction via matrix completion [J ] . EPL (Europhysics Letters) , 2017 , 117 ( 3 ):38002.
XU X , LIU B , WU J , et al . Link prediction in complex networks via matrix perturbation and decomposition [J ] . Scientific Reports , 2017 , 7 ( 1 ):14724.
SARKAR S , . Spectral (re) construction of urban street networks:generative design using global information from structure [M ] // Design Computing and Cognition'14 . Springer International Publishing , 2015 : 41 - 55 .
张贤达 . 矩阵分析与应用(第2版) [M ] . 北京 : 清华大学出版社 , 2013 .
ZHANG X D . Matrix analysis and applications(second edi-tion) [M ] . Beijing : Tsinghua University PressPress , 2013 .
戴华 . 矩阵论 [M ] . 北京 : 科学出版社 , 2001 .
DAI H . Matrix theo-ry [M ] . Beijing : Science PressPress , 2001 .
HORN R A , JOHNSON C R . 矩阵分析 [M ] . 天津 : 天津大学出版社 , 1989 .
HORN R A,JOHNSON , C R . Matrix analysis [M ] . Tianjin : Tianjin University PressPress , 2001 .
ZHANG X D . Matrix analysis and applications [M ] . Cambridge University Press , 2017 .
ERDŐS P RÉNYI A . On the evolution of random graphs [J ] . Transactions of the American Mathematical Society , 1984 , 286 ( 1 ): 257 - 274 .
BARABÁSI A L , ALBERT R . Emergence of scaling in random networks [J ] . Science , 1999 , 286 ( 5439 ): 509 - 512 .
WATTS D J , STROGATZ S H . Collective dynamics of “small-world”networks [J ] . Nature , 1998 , 393 ( 6684 ): 440 - 442 .
ABUELHAIJA S , PEROZZI B , ALRFOU R . Learning edge representations via low-rank asymmetric projections [C ] // The 2017 ACM Conference on Information and Knowledge Management . 2017 : 1787 - 1796 .
GLEISER P M , DANON L . Community structure in jazz [J ] . Advances in Complex Systems , 2003 , 6 ( 4 ): 565 - 573 .
0
浏览量
1372
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构