[1]高枫,何泾沙,马书南.数据共享应用中的隐私保护方法[J].东南大学学报(自然科学版),2011,41(2):233-236.[doi:10.3969/j.issn.1001-0505.2011.02.004]
 Gao Feng,He Jingsha,Ma Shunan.Privacy preserving in data sharing applications[J].Journal of Southeast University (Natural Science Edition),2011,41(2):233-236.[doi:10.3969/j.issn.1001-0505.2011.02.004]
点击复制

数据共享应用中的隐私保护方法()
分享到:

《东南大学学报(自然科学版)》[ISSN:1001-0505/CN:32-1178/N]

卷:
41
期数:
2011年第2期
页码:
233-236
栏目:
计算机科学与工程
出版日期:
2011-03-20

文章信息/Info

Title:
Privacy preserving in data sharing applications
作者:
高枫1何泾沙2马书南1
(1北京工业大学计算机学院,北京 100124)
(2北京工业大学软件学院, 北京 100124)
Author(s):
Gao Feng1He Jingsha2Ma Shunan1
(1 College of Computer Science and Technology, Beijing University of Technology, Beijing 100124, China)
(2School of Software Engineering, Beijing University of Technology, Beijing 100124, China)
关键词:
隐私保护信任替换数据共享
Keywords:
privacy preserving trust substitution data sharing
分类号:
TP393.08
DOI:
10.3969/j.issn.1001-0505.2011.02.004
摘要:
为解决数据共享应用中的隐私保护问题和提高数据共享的可用性,提出一种以用户为中心的隐私保护模型.在该模型中,用户可以通过关键字和特征的选取对隐私信息进行自主设置,并采用基于信任的方法来确定共享数据对象可获得的隐私量.当共享数据中包含的隐私量超过共享对象可获得的范围后,通过替换的方法来保护用户隐私.仿真实验表明,对比基于访问控制的隐私保护法,该模型在数据共享应用中能够有效保护隐私并保证较高的数据共享可用性.
Abstract:
To solve the problem of privacy preservation while maintaining a high degree of data sharing in applications, a user-centric privacy preservation model is proposed. In the model, users are allowed to set their privacy through selecting key words and special characteristics and a trust based method is used to determine how much privacy entropy that the data sharing entities can get. If the privacy entropy is out of the range that the data sharing entities can afford, a substitution method is used to help preserve privacy. Simulation results show that the method proposed can protect privacy more effectively than methods based on access control while offering a higher degree of data sharing.

参考文献/References:

[1] di Crescenzo G,Lipton R J.Social network privacy via evolving access control [C]//2009 Wireless Algorithms,Systems,and Applications.Boston,MA,USA:2009:551-560.
[2] Lu Y,Weichao W,Bhargava B,et al.Trust-based privacy preservation for peer-to-peer data sharing [J].IEEE Transactions on Systems,Man &Cybernetics Part A (Systems &Humans),2006,36(3):498-502.
[3] Lara G,Arnaiz L,lvarez F,et al.Protected seamless content delivery in P2P wireless and wired networks-seamless content delivery in the future mobile internet [J].IEEE Wireless Communications,2009,16(15):50-57.
[4] Iguchi M,Goto S.Privacy-conscious P2P data sharing scheme with bogus profile distribution [J].Web Intelligence and Agent Systems,2009,7(2):209-222.
[5] Jawad M,Serrano-Alvarado P,Valduriez P.Protecting data privacy in structured P2P networks [C]//International Conference on Data Management in Grid and Peer-to-Peer Systems.Linz,Austria,2009:85-98.
[6] Dong-Hee S.The effects of trust,security and privacy in social networking:a security-based approach to understand the pattern of adoption [J].Interacting with Computers,2010,22(5):428-438.
[7] Chi Z,Jinyuan S,Xiaoyan Z,et al.Privacy and security for online social networks:challenges and opportunities [J].IEEE Network,2010,24(4):13-18.
[8] Leucio A C,Refik M,Thorsten S.Sefebook:a privacy-preserving online social network leveraging on real-life trust [J].IEEE Communications Magazine,2009,47(12):94-101.
[9] Hui W.Privacy-preserving data sharing in cloud computing [J].Journal of Computer Science and Technology,2010,25(3):404-414.
[10] Gao F,He J,Peng S,et al.An approach for privacy protection based on ontology [C]//2nd International Conference on Networks Security,Wireless Communications and Trusted Computing.Wuhan,China,2010:397-400.
[11] Gao F,He J,Peng S,et al.A quantify metric for privacy protection based on information theory [C]//3rd International Symposium on Intelligent Information Technology and Security Informatics.Jinggangshan,China,2010:216-220.

相似文献/References:

[1]刘腾腾,倪巍伟,崇志宏,等.多维数值敏感属性隐私保护数据发布方法[J].东南大学学报(自然科学版),2010,40(4):699.[doi:10.3969/j.issn.1001-0505.2010.04.007]
 Liu Tengteng,Ni Weiwei,Chong Zhihong,et al.Privacy-preserving data publishing methods for multiple numerical sensitive attributes[J].Journal of Southeast University (Natural Science Edition),2010,40(2):699.[doi:10.3969/j.issn.1001-0505.2010.04.007]

备注/Memo

备注/Memo:
作者简介:高枫(1984—),女,博士生;何泾沙(联系人),男,博士,教授,博士生导师,jhe@bjut.edu.cn.
基金项目:北京市教委科研资助项目( KM201010005027).
引文格式: 高枫,何泾沙,马书南.数据共享应用中的隐私保护方法[J].东南大学学报:自然科学版,2011,41(2):233-236.[doi:10.3969/j.issn.1001-0505.2011.02.004]
更新日期/Last Update: 2011-03-20