JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2020, Vol. 55 ›› Issue (3): 9-18.doi: 10.6040/j.issn.1671-9352.2.2019.171

Previous Articles     Next Articles

Social network information recommendation method of supporting privacy protection

Chao ZHANG(),Ying LIANG*(),Hao-shan FANG   

  1. 1. Research Center for Ubiquitous Computing Systems, Institute of Computing Technology, Chinese Academy of Sciences, Beijing 100190, China
    2. School of Artificial Intelligence, University of Chinese Academy of Sciences, Beijing 100049, China
    3. School of Software Engineering, Shandong University, Jinan 250101, Shandong, China
  • Received:2019-09-02 Online:2020-03-20 Published:2020-03-27
  • Contact: Ying LIANG E-mail:zhangchao_ict@163.com;liangy@ict.ac.cn

Abstract:

Aiming at the problem of privacy disclosure caused by information dissemination in social network information recommendation, a kind of social network information recommendation method that supports privacy protection is proposed in combination with information dissemination model. Users′ interests are predicted by friends′ interest, familiarity and interest similarity, and then text matching and recommendation candidate set sorting are carried out. Through personalized privacy preference setting, users are allowed to set restricted access to user list, and privacy protection method is used to calculate the probability of information spreading to blacklist users, and privacy disclosure threshold is set to control the probability of blacklist users accessing privacy blog posts to protect user privacy in information recommendation. Experimental results show that the proposed method can guarantee the recommendation effect and protect user privacy better.

Key words: social network, information recommendation, privacy protection, access control, data mining

CLC Number: 

  • TP309.2

Fig.1

Process of information recommendation"

Fig.2

Schematic diagram of privacy protection in information dissemination"

Fig.3

Experimental evaluation of user interest speculation"

Table 1

Access control filters user information"

用户ID Name
2268576943 WU-飞飞
2517382190 职业投资专业投机
1730536373 貓大夫秋蘭君是夜貓子不是肉包子
1774870125 小菜包儿好好学习
3884247481 庆阳新闻哥

Table 2

Information dissemination filters user information"

博文推荐用户ID 过滤来源 过滤种子用户ID 黑名单用户ID
2230913455 UBL 2339448533 3482866951
1958150662 UBL 2110759370 3178513797
1704544512 BRL 1869084473 1916655407
3499391852 UBL 3922281222 1732887375

Fig.4

Relationship between different privacy disclosure threshold and number of filter seed users"

Fig.5

Information dissemination diagram in recommendation"

Fig.6

Schematic diagram of privacy protection in information dissemination"

1 GOLDBERG D , NICHOLS D , OKI B M , et al. Using collaborative filtering to weave an information tapestry[J]. Communications of the ACM, 1992, 35 (12): 61- 70.
doi: 10.1145/138859.138867
2 KAUTZ H , SELMAN B , SHAH M . Referral Web: combining social networks and collaborative filtering[J]. Communications of the ACM, 1997, 40 (3): 63- 65.
doi: 10.1145/245108.245123
3 XU C H . A novel recommendation method based on social network using matrix factorization technique[J]. Information Processing & Management, 2018, 54 (3): 463- 474.
4 SAMARATI P, SWEENEY L. Generalizing data to provide anonymity when disclosing information (abstract)[C]//Proceedings of the Seventeenth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems-PODS ′98, June 1-4, 1998. New York: ACM Press, 1998: 188.
5 CASINO F, DOMINGO-FERRER J, PATSAKIS C, et al. Privacy preserving collaborative filtering with k-anonymity through microaggregation[C]//2013 IEEE 10th International Conference on e-Business Engineering, September 11-13, 2013. Coventry: IEEE, 2013: 490-497.
6 WEI R X , TIAN H , SHEN H . Improving k -anonymity based privacy preservation for collaborative filtering[J]. Computers and Electrical Engineering, 2018, 67: 509- 519.
doi: 10.1016/j.compeleceng.2018.02.017
7 DWORK C . Differential privacy[M]. Berlin: Springer, 2006: 1- 12.
8 SHIN H , KIM S , SHIN J , et al. Privacy enhanced matrix factorization for recommendation with local differential privacy[J]. IEEE Transactions on Knowledge and Data Engineering, 2018, 30 (9): 1770- 1782.
doi: 10.1109/TKDE.2018.2805356
9 WANG P , YANG J , ZHANG J P . A strategy toward collaborative filter recommended location service for privacy protection[J]. Sensors, 2018, 18 (5): 1522.
doi: 10.3390/s18051522
10 VIEJO A , CASTELL À-ROCA J . Using social networks to distort users' profiles generated by web search engines[J]. Computer Networks, 2010, 54 (9): 1343- 1357.
doi: 10.1016/j.comnet.2009.11.003
11 BADSHA S, YI X, KHALIL I, et al. Privacy preserving user-based recommender system[C]//2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS). Atlanta: IEEE, 2017: 1074-1083.
12 BADSHA S , YI X , KHALIL I . A practical privacy-preserving recommender system[J]. Data Science and Engineering, 2016, 1 (3): 161- 177.
doi: 10.1007/s41019-016-0020-2
13 高枫, 何泾沙. 基于信任和信息流模型的隐私保护方法[J]. 山东大学学报(理学版), 2011, 46 (5): 39- 43.
GAO Feng , HE Jingsha . A privacy protection method based on a trust and information flow model[J]. Journal of Shandong University(Natural Science), 2011, 46 (5): 39- 43.
14 MCPHERSON M , SMITH-LOVIN L , COOK J M . Birds of a feather: homophily in social networks[J]. Annual Review of Sociology, 2001, 27 (1): 415- 444.
doi: 10.1146/annurev.soc.27.1.415
15 梁芷铭. 基于新浪微博的网络信息生命周期实证研究[J]. 新闻界, 2014, (3): 60- 64.
LIANG Zhiming . Empirical research on network information life cycle based on Sina Weibo[J]. Journalism, 2014, (3): 60- 64.
16 PAGE L, BRIN S, MOTWANI R, et al. The PageRank citation ranking: bringing order to the web[R].[S.l.]: [s.n.], Stanford InfoLab, 1999.
17 高昂.支持隐私保护的社交网络信息传播方法研究[D].北京:中国科学院大学, 2019.
GAO Ang. Research on social network information dissemination methods that support privacy protection [D]. Beijing: University of Chinese Academy of Sciences, 2019.
[1] Xiao-jie XIE,Ying LIANG,Xiang-xiang DONG. Sensitive attribute iterative inference method for social network users [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2019, 54(3): 10-17, 27.
[2] Tian-tian CHANG,Xing-shu CHEN,Yong-gang LUO,Xiao LAN. Security domain-based data isolation protection framework for Hive [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2019, 54(3): 1-9.
[3] KANG Hai-yan, HUANG Yu-xuan, CHEN Chu-qiao. Enhancing privacy for geographic information based on video analysis [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(1): 19-29.
[4] SUI Yun-xian, LIU Yong. Mining algorithm of E-burt structural hole based on two-step neighbor [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(9): 59-68.
[5] ZHANG Zhong-jun, ZHANG Wen-juan, YU Lai-hang, LI Run-chuan. A community division method based on network distance and content similarity in micro-blog social network [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(7): 97-103.
[6] BI Xiao-di, LIANG Ying, SHI Hong-zhou, TIAN Hui. Aparameterized location privacy protection method based on two-level Anonymity [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(5): 75-84.
[7] KANG Hai-yan, MA Yue-lei. Survey on application of data mining via differential privacy [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(3): 16-23.
[8] DENG Xiao-fang, ZHONG Yuan-sheng, L(¨overU)Lin-yuan, WANG Ming-wen, XIONG Nai-xue. Mass diffusion on coupled social networks [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(3): 51-59.
[9] YANG Zhen, SI Shu-yong, LI Chao-yang. Information recommendation based on users interest model [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(1): 15-22.
[10] LIU Xin, XU Qiu-liang, ZHANG Bo. Cooperative group signature scheme with controllable linkability [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(9): 18-35.
[11] ZHU Sheng, ZHOU Bin, ZHU Xiang. EIP: discovering influential bloggers by user similarity and topic timeliness [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(9): 113-120.
[12] LI Yu-xi, WANG Kai-xuan, LIN Mu-qing, ZHOU Fu-cai. A P2P network privacy protection system based on anonymous broadcast encryption scheme [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(9): 84-91.
[13] . A system of monitoring and protecting Android privacy leakage [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(9): 59-67.
[14] GUO Hua-long, REN Xue-fang, ZHANG Ling. Relationships between dynamic data mining and P-augmented matrix [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(8): 105-110.
[15] TANG Qian, YANG Fei, HUANG Qi, LIN Guo-yuan. Security transfer model of access control information based on TCB subsets [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(7): 98-106.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] MENG Xiang-bo1, ZHANG Li-dong1, DU Zi-ping2. Investment and reinsurance strategy for insurers under #br# mean-variance criterion with jumps#br#[J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2014, 49(05): 36 -40 .
[2] HAN Ya-fei, YI Wen-hui, WANG Wen-bo, WANG Yan-ping, WANG Hua-tian*. Soil bacteria diversity in continuous cropping poplar plantation#br# by high throughput sequencing[J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2014, 49(05): 1 -6 .
[3] MA Yuan-yuan, MENG Hui-li, XU Jiu-cheng, ZHU Ma. Normal distribution of lattice close-degree based on granular computing[J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2014, 49(08): 107 -110 .
[4] SUN Xiao-ting1, JIN Lan2*. Application of DOSY in oligosaccharide mixture analysis[J]. J4, 2013, 48(1): 43 -45 .
[5] TIAN You-gong, LIU Zhuan-ling. Extremal distributions for 5-convex stochastic orderings with arbitrary discrete support and applications in actuarial sciences[J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2014, 49(07): 57 -62 .
[6] SONG Yu-dan, WANG Shi-tong*. Minimum within-class variance SVM with absent features[J]. J4, 2010, 45(7): 102 -107 .
[7] GAO Zheng-hui, LUO Li-ping. Philos-type oscillation criteria for third-order nonlinear functional differential equations with distributed delays and damped terms[J]. J4, 2013, 48(4): 85 -90 .
[8] LI Zhi-rong . Computational formulae of generalized m-th-order Bell numbers and generalized m-order orderd Bell numbers[J]. J4, 2007, 42(2): 59 -63 .
[9] WU Dai-yong, ZHANG Hai. Stability and bifurcation analysis for a single population discrete model with Allee effect and delay[J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2014, 49(07): 88 -94 .
[10] HU Ming-Di, SHE Yan-Hong, WANG Min. Topological properties of  three-valued   logic  metric space[J]. J4, 2010, 45(6): 86 -90 .