A Scheme of Privacy Protection based on Genetic Algorithm for Behavior Pattern of Social Media Users

被引:0
|
作者
Wu, Shuang [1 ]
Zeng, Jianping [1 ]
Zhang, Zewen [1 ]
机构
[1] Fudan Univ, Sch Comp Sci, Shanghai 200433, Peoples R China
关键词
Behavior pattern; k-anonymity; Privacy protection; Genetic algorithm;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In the context of big data, user data have been released on the Internet on a large scale. Although these data always adopt anonymous ID, the corresponding user's real identification and other private information are still exposed to possible violations by attackers with certain background knowledge. In order to protect user's privacy, Samarita and Sweeny proposed k-anonymity model, which has been widely used in privacy protection. This model is mainly used in point-anonymization at this stage, and there is no good way for line-anonymization. This paper describes a method of anonymization based on genetic algorithm to protect the privacy of user's behavior pattern in stock BBS, which is a development of line-anonymization. Experimental results show that, the method described in this paper performs well in protecting privacy using k-anonymity model and has a controllable information loss.
引用
收藏
页码:40 / 44
页数:5
相关论文
共 50 条
  • [31] Toward Metadata Removal to Preserve Privacy of Social Media Users
    Tayeb, Shahab
    Week, Abigail
    Yee, Joshua
    Carrera, Mayra
    Edwards, Kuira
    Murray-Garcia, Vicki
    Marchello, Meghann
    Zhan, Justin
    Pirouz, Matin
    2018 IEEE 8TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2018, : 287 - 293
  • [32] A VANET privacy protection scheme based on fair blind signature and secret sharing algorithm
    Wang, Xiaoliang
    Li, Shuifan
    Zhao, Shujing
    Xia, Zhihua
    AUTOMATIKA, 2017, 58 (03) : 287 - 294
  • [33] Influencing Factors of Social Media Users’Intentions to Disclose Privacy
    Xueli L.
    Linghe H.
    Jiaxing C.
    Data Analysis and Knowledge Discovery, 2022, 6 (04) : 97 - 107
  • [34] Social Media Users' Privacy Against Malicious Data Miners
    Reza, Khondker Jahid
    Islam, Md Zahidul
    Estivill-Castro, Vladimir
    2017 12TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND KNOWLEDGE ENGINEERING (IEEE ISKE), 2017,
  • [35] #MyPrivacy: How Users Think About Social Media Privacy
    Quinn, Kelly
    Epstein, Dmitry
    SMSOCIETY'18: PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE ON SOCIAL MEDIA AND SOCIETY, 2018, : 360 - 364
  • [36] SGX-based Users Matching with Privacy Protection
    Luo, Junwei
    Yang, Xuechao
    Yi, Xun
    PROCEEDINGS OF THE AUSTRALASIAN COMPUTER SCIENCE WEEK MULTICONFERENCE (ACSW 2020), 2020,
  • [37] PRIVACY PROTECTION FOR USERS OF LOCATION-BASED SERVICES
    Shin, Kang G.
    Ju, Xiaoen
    Chen, Zhigang
    Hu, Xin
    IEEE WIRELESS COMMUNICATIONS, 2012, 19 (01) : 30 - 39
  • [38] A clustering-based differential privacy protection algorithm for weighted social networks
    Zhang L.
    Ge L.
    Mathematical Biosciences and Engineering, 2024, 21 (03) : 3755 - 3773
  • [39] Location Entropy-Based Privacy Protection Algorithm for Social Internet of Vehicles
    Xing, Ling
    Huang, Yuanhao
    Gao, Jianping
    Jia, Xiaofan
    Wu, Honghai
    Ma, Huahong
    WIRELESS PERSONAL COMMUNICATIONS, 2023, 130 (04) : 3009 - 3025
  • [40] Location Entropy-Based Privacy Protection Algorithm for Social Internet of Vehicles
    Ling Xing
    Yuanhao Huang
    Jianping Gao
    Xiaofan Jia
    Honghai Wu
    Huahong Ma
    Wireless Personal Communications, 2023, 130 : 3009 - 3025