| Literature DB >> 36238673 |
Abstract
An online social network is a platform where people can communicate with friends, share information, speed up business development, and improve teamwork. A large amount of user privacy information existing in real social networks is leaked from person to person, and this issue has hardly been studied. With the rapid expansion of the network, the issue of privacy protection has received increasing attention. So far, many privacy protection methods including differential protection algorithms, encryption algorithms, access control strategies, and anonymization have been researched and applied. Information leakage means that the information shared by the user is disseminated or downloaded by his friends without the user's consent, and the transmission of private information will not be recorded. In order to track and find out the ways and methods of information leakage, this article adopts an unusual method, namely, the probability judgment based on trust. By screening the similarities between users, past information exchanges, and the topology of social networks, a trust model is established to evaluate and estimate the degree of trust between users. According to the rating information privacy of friends' trust, an information dissemination system is established, which can be applied to online social networking platforms to reduce the risk of information leakage, thereby ensuring the security of users' private information. At the same time, this paper expands the transmission system model without user authorization and proposes a fingerprint-based deterministic leak tracking algorithm.Entities:
Mesh:
Year: 2022 PMID: 36238673 PMCID: PMC9553424 DOI: 10.1155/2022/5634385
Source DB: PubMed Journal: Comput Intell Neurosci
Figure 1Social network model.
Similarity calculation method.
| Calculation | Formula | Description |
|---|---|---|
| Simple comparison | S(ui, uj) = 1, if x=y | x and |
| Interval ratio | S(ui, uj) = 1-|x-y|/N | N can be max(|x-y) or manually set |
| Jaccard coefficient | J(ui, uj) = | | A(ui) and A(uj) are the attribute sets of user ui and uj, respectively |
| Cosine similarity | Cos(ui, uj) = | | The vectors V(ui) and V(uj) are the attributes of user ui and uj, respectively |
| Pearson coefficient | P(ui,uj) = | xk and yk represent different attributes of user ui and uj, respectively |
Figure 2Information disclosure model weighted by trust and honor.
Figure 3Initial structure of the social network.
Figure 4Layered network topology diagram.
Summary of paths within three hops.
| Path 1 | Path 2 | Path 3 | Path 4 | |
|---|---|---|---|---|
| Node B | B—D | B—C—D | B—A—C—D | No |
| Node K | K—D | K—F—D | K—I—F—D | K—H—E—D |
| Node P | No | No | No | No |
| Node Q | Q—C—D | Q—C—B—D | No | No |
| Node V | V—u—B—D | V—A—B—D | V—A—C—D | No |
The accuracy and time cost of the algorithm for judging the probability of leakage.
| Node pair | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 |
|---|---|---|---|---|---|---|---|---|---|---|
| Accuracy | 100% | 100% | 100% | 100% | 100% | 100% | 100% | 100% | 100% | 100% |
| Time overhead (ms) | 20,993 | 37,012 | 76,505 | 41,345 | 10,965 | 19,688 | 20,675 | 11,587 | 50,049 | 26,673 |
Figure 5Digital fingerprint scheme system model.
Digital fingerprint index table.
| Hash code (ordered) | Random sequence code | User ID |
|---|---|---|
| 0x2DF3C9EA | 0xAFB68CD7 | 94………………vv |
| 0x2DF3C9EA | OxFB6EE3D7 | Kk………………66 |
| 0x2DF3C9EB | 0xAD68CD7F | Hk………………ki |
| 0xFFE2A97 C | 0xAFB64CD7 | 54………………gr |
| 0xFFE2A97D | OxBF6E8AD7 | Rt………………6g |
Figure 6Information leakage tracking flowchart.
Social network data set attributes.
| Data set | Number of nodes | Number of edges | Do you want to report back? | Number of communities |
|---|---|---|---|---|
| 4,039 | 88,234 | No | 10 | |
| 81,306 | 1,768,149 | Yes | 1,000 | |
| Google+ | 107,614 | 13,673,453 | Yes | 133 |