Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Social network graph acquisition method and system and electronic equipment

A technology of social network and acquisition method, applied in the fields of systems and electronic devices, and acquisition method of social network graph, can solve the problem that attackers cannot analyze and identify target objects, social network graphs have low privacy, and are easy to destroy the structural attributes of social network graphs. and other issues to achieve the effect of maintaining structural properties, improving privacy and security, and improving usability

Pending Publication Date: 2021-08-10
BEIJING INST OF RADIO MEASUREMENT
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, there are a variety of technologies used to protect privacy in social networks, such as k-anonymity technology, perturbation algorithm, link perturbation, differential privacy, etc., but there are defects. For example, in 1998, Samarati and Sweeney proposed k-anonymity technology, The main idea is that, for the quasi-identifier attribute value of each tuple in the published data table, there are at least k-1 tuples with the same quasi-identifier attribute value, k is a positive integer greater than 1, such that The attacker cannot identify the target object through multi-table link analysis
Although this method can protect the links in the network, it is easy to destroy the structural properties of the social network graph, which is difficult to use in practical applications, and the privacy of the social network graph after disturbance is low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Social network graph acquisition method and system and electronic equipment
  • Social network graph acquisition method and system and electronic equipment
  • Social network graph acquisition method and system and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] Such as figure 1 As shown, a method for obtaining a social network graph in an embodiment of the present invention includes the following steps:

[0048] S1. Construct an undirected graph according to the social network data of multiple preset users, wherein the nodes in the undirected graph represent the preset users, and the edges between any two nodes in the undirected graph represent the There is a social relationship between the two preset users corresponding to the two nodes;

[0049] S2. Perform community division on the undirected graph to obtain multiple subgraphs, and generate an adjacency matrix for each subgraph;

[0050] S3. Calculate the projection matrix of the adjacency matrix of each subgraph according to the adjacency matrix of each subgraph and the first preset Gaussian matrix corresponding to each subgraph;

[0051] S4. Using the second preset Gaussian matrix corresponding to each sub-image to perturb each projection matrix to obtain a perturbed proj...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of security, and provides a social network graph acquisition method and system and electronic equipment, which are used for performing community division on an undirected graph corresponding to a plurality of preset users to obtain a plurality of sub-graphs, and adding Gaussian noise to each sub-graph for disturbance, so that the problem of privacy exposure in a social network graph is solved. Therefore, for an attacker, even if all information of the social network graph and related background knowledge of the original social network are obtained, the social network graph cannot be attacked; according to the technical scheme, the privacy and security of the social network graph are improved, the structural attributes of the social network graph are kept, and the availability of the social network graph is improved.

Description

technical field [0001] The present invention relates to the field of security technology, in particular to a method, system and electronic equipment for acquiring a social network graph. Background technique [0002] Nowadays, social network data is growing exponentially, and social network data is used in existing technologies such as information science, information dissemination, marketing, and emotional flow. However, from the user's point of view, social network data contains sensitive information of the user, which can be understood as private information. When a social network graph is generated and published based on social network data, an attacker can attack the social network graph. These sensitive information, that is, private information, can be mined out to cause adverse effects. Therefore, before the social network graph is released, how to process it so that the user's privacy can be effectively protected has become an important topic in this research field....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06Q50/00G06F16/901G06F21/62
CPCG06Q50/01G06F16/9024G06F21/6245
Inventor 郭耀
Owner BEIJING INST OF RADIO MEASUREMENT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products