A Scheme of Privacy Protection based on Genetic Algorithm for Behavior Pattern of Social Media Users

被引:0
|
作者
Wu, Shuang [1 ]
Zeng, Jianping [1 ]
Zhang, Zewen [1 ]
机构
[1] Fudan Univ, Sch Comp Sci, Shanghai 200433, Peoples R China
关键词
Behavior pattern; k-anonymity; Privacy protection; Genetic algorithm;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In the context of big data, user data have been released on the Internet on a large scale. Although these data always adopt anonymous ID, the corresponding user's real identification and other private information are still exposed to possible violations by attackers with certain background knowledge. In order to protect user's privacy, Samarita and Sweeny proposed k-anonymity model, which has been widely used in privacy protection. This model is mainly used in point-anonymization at this stage, and there is no good way for line-anonymization. This paper describes a method of anonymization based on genetic algorithm to protect the privacy of user's behavior pattern in stock BBS, which is a development of line-anonymization. Experimental results show that, the method described in this paper performs well in protecting privacy using k-anonymity model and has a controllable information loss.
引用
收藏
页码:40 / 44
页数:5
相关论文
共 50 条
  • [1] USERS PRIVACY EXPOSURE PROTECTION ON SOCIAL MEDIA
    Liu, Yan
    Liu, Hia-Ming
    Chen, Rung-Ching
    Wang, Shu-Yi
    PROCEEDINGS OF 2017 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS (ICMLC), VOL 2, 2017, : 575 - 580
  • [2] Users' Privacy Protection Scheme in Location Based Services
    Lin, Tu-Liang
    Wang, Pin-Jie
    ICEMT 2018: PROCEEDINGS OF THE 2018 2ND INTERNATIONAL CONFERENCE ON EDUCATION AND MULTIMEDIA TECHNOLOGY, 2018, : 107 - 111
  • [3] Understanding social media users' privacy-protection behaviors
    Baker-Eveleth, Lori
    Stone, Robert
    Eveleth, Daniel
    INFORMATION AND COMPUTER SECURITY, 2022, 30 (03) : 324 - 345
  • [4] PRIVACY PROTECTION FOR SOCIAL MEDIA BASED ON A HIERARCHICAL SECRET IMAGE SHARING SCHEME
    Beugnon, Sebastien
    Puteaux, Pauline
    Puech, William
    2019 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING (ICIP), 2019, : 679 - 683
  • [5] Determining the Role of Social Identity Attributes to the Protection of Users' Privacy in Social Media
    Vgena, Katerina
    Kitsiou, Angeliki
    Kalloniatis, Christos
    Gritzalis, Stefanos
    FUTURE INTERNET, 2022, 14 (09):
  • [6] Influence of Privacy Fatigue of Social Media Users on Their Privacy Protection Disengagement Behaviour-A PSM based Analysis
    Zhang, Xiaojuan
    Tian, Xinluan
    Han, Yuxin
    JOURNAL OF INTEGRATED DESIGN & PROCESS SCIENCE, 2021, 25 (01) : 78 - 92
  • [7] Privacy-related factors on social media users' privacy protection behaviors: an APFO model perspective
    Yu, Xiaofeng
    Sun, Jiaqian
    Zhang, Xiaoxue
    ONLINE INFORMATION REVIEW, 2025,
  • [8] Users' Privacy Protection Algorithm and Architecture Based on CAE Integration Platform
    Wang, Jiening
    Lin, Yaping
    Liu, Yonghe
    2ND INTERNATIONAL CONFERENCE ON SIMULATION AND MODELING METHODOLOGIES, TECHNOLOGIES AND APPLICATIONS (SMTA 2015), 2015, : 250 - 256
  • [9] A Novel Scheme on Service Recommendation for Mobile Users Based on Location Privacy Protection
    Piao, Chunhui
    Dong, Suqin
    Cui, Liang
    2013 IEEE 10TH INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING (ICEBE), 2013, : 300 - 305
  • [10] Privacy Awareness and Social Media: Personal Data Protection among Facebook** and Instagram** Users
    Peter, Dede Ibiere
    Ndinojuo, Ben-Collin Emeka
    GALACTICA MEDIA-JOURNAL OF MEDIA STUDIES - GALAKTIKA MEDIA-ZHURNAL MEDIA ISSLEDOVANIJ, 2024, 6 (03): : 168 - 198