加權社交網(wǎng)絡中權重序列與最短路徑隱私保護算法研究.pdf_第1頁
已閱讀1頁,還剩59頁未讀, 繼續(xù)免費閱讀

下載本文檔

版權說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權,請進行舉報或認領

文檔簡介

1、學位論文獨創(chuàng)性聲明本人聲明所呈交的論文是本人在導師指導下進行的研究工作及取得的研究成果。據(jù)我所知,除了文中特別加以標注和致謝的地方外,論文中不包含其他人已經(jīng)發(fā)表或撰寫過的研究成果, 也不包含已獲得江西理工大學或其他教育機構的學位或證書而使用過的材料。 與我一同工作的同志對本研究所做的任何貢獻均已在論文中做了明確的說明并表示謝意。申請學位論文與資料若有不實之處,本人承擔一切相關責任。研究生簽名: 時間: 年 月 日學位論文版權使用授權書本

2、人完全了解江西理工大學關于收集、保存、使用學位論文的規(guī)定:即學校有權保存按要求提交的學位論文印刷本和電子版本, 學校有權將學位論文的全部或者部分內(nèi)容編入有關數(shù)據(jù)庫進行檢索, 并采用影印、 縮印或掃描等復制手段保存、 匯編以供查閱和借閱; 學校有權按有關規(guī)定向國家有關部門或者機構送交論文的復印件和電子版。 本人允許本學位論文被查閱和借閱, 同意學校向國家有關部門或機構送交論文的復印件和電子版,并通過網(wǎng)絡向社會公眾提供信息服務。保密的學位論

3、文在解密后適用本授權書。學位論文作者簽名(手寫): 導師簽名(手寫):簽字日期: 年 月 日 簽字日期: 年 月 日AbstractIIAbstractWith the changes of people’s lifestyles and communication methods, the socialnetwork covers a large number of related information such as indivi

4、duals andenterprises on the basis of information technology. Due to the analysis and applicationof various fields in scientific research and data mining of data in social networks willlead to the leakage of a large numbe

5、r of users' privacy. Among them, due to theweight of the weighted network and the leakage of users' privacy caused by theshortest path, it is gradually becoming the focus and difficulty of the research onprivacy

6、protection. The attacker will use the edge weight sequence to identify thenode. At the same time, the existing methods for privacy protection of the shortestpath have great changes to the network structure and cannot gua

7、rantee the validity ofsocial network data. Based on the proposed problem, this paper proposes a moreeffective defense algorithm for the weighted sequence and the attribute attacks of theshortest path in weighted social n

8、etworks. The main contents of this paper are asfollows:1. Weighted privacy protection of existing weighted social networks is mainlybased on the use of Gaussian multiplication and histogram anonymity methods toconstruct

9、the network, lack of research on privacy leakage caused by the weightedsequence of edges, and insufficient consideration of data validity. Based on this, thispaper will use the vector set to combine the distance between

10、the inner diameter of thegroup and the relative distance of the nodes to achieve the privacy protection of theweight sequence. The algorithm can guarantee data validity of the data and resist theweight sequence attack.2.

11、 On the basis of k ? anonymity, privacy protection is established by addingedges or deleting edges to construct k ? shortest path. This method has a greatinfluence on the structure of social networks, and the shortest pa

12、th privacy levelbetween each node pair only is k . It can only be said. Based on this, this articleclassifies all edges in the network into three categories: unvisited edges ? ? NE ,partially accessed edges ? ? PE and mu

13、st-accessed edges ? ? ME , and adjusts the edgesby the weight ratio policy. If no k paths fulfills the requirement of at least k theshortest path, the algorithm returns the current result directly and uses the privacylev

溫馨提示

  • 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
  • 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權益歸上傳用戶所有。
  • 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預覽,若沒有圖紙預覽就沒有圖紙。
  • 4. 未經(jīng)權益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
  • 5. 眾賞文庫僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負責。
  • 6. 下載文件中如有侵權或不適當內(nèi)容,請與我們聯(lián)系,我們立即糾正。
  • 7. 本站不保證下載資源的準確性、安全性和完整性, 同時也不承擔用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。

評論

0/150

提交評論