Please wait a minute...
 
主管单位:广东省科学技术厅
主办单位:广东省科技合作研究促进中心
编辑出版:《电脑与电信》编辑部
ISSN 1008-6609 CN 44-1606/TN
邮发代号:46-95
国内发行:广东省报刊发行局
《电脑与电信》唯一官方网站。
电脑与电信
  应用技术与研究 本期目录 | 过刊浏览 | 高级检索 |
基于个性化k匿名隐私保护的资源推荐算法
江苏大学 计算机科学与通信工程学院
Resource RecommendationAlgorithm Based on K-anonymity for Generalizing User Query Requests
Jiangsu University
全文: PDF(0 KB)  
输出: BibTeX | EndNote (RIS)      
服务
把本文推荐给朋友
加入引用管理器
E-mail Alert
RSS
作者相关文章
彭丽寻 刘丰恺
Abstract:Existing resource recommendation algorithms make resource recommendation based on user preferences, without consider- ing the subjective reluctance of users to personal privacy or the data mining of interests and hobbies, or the risk of privacy disclosure of third-party servers. To solve the problem of user privacy, this paper puts forward the K-anonymous privacy protection algorithm. After the generalization of sensitive attributes of user query requests, it constructs a logical anonymous query request equivalence class, uses the method of data rotary to enable users in the same equivalence class to randomly forward the received data from other users. Because the privacy attributes that each person wants to protect are different, the weight of its sensitive attribute is different, so this paper proposes the weight summation formula based on the sensitive attribute combined with the sensitive attribute weight value set by the user independently, and recommends the optimal selection scheme for the platform user. The security analysis shows that this method can effectively resist similarity attack, background knowledge attack and capture server attack. Experiments show that this method not only satisfies the correctness of matching results, but also enhances the privacy protection performance in the process of resource recommendation.
Key wordsprivacy protection    resource recommendation    anonymity    sensitivity    generalization
年卷期日期: 2020-06-10      出版日期: 2020-08-13
引用本文:   
彭丽寻 刘丰恺. 基于个性化k匿名隐私保护的资源推荐算法[J]. 电脑与电信, .
Peng Li-xun Liu Feng-kai. Resource RecommendationAlgorithm Based on K-anonymity for Generalizing User Query Requests. Computer & Telecommunication, 2020, 1(6): 66-73.
链接本文:  
http://www.computertelecom.com.cn/CN/  或          http://www.computertelecom.com.cn/CN/Y2020/V1/I6/66
No related articles found!
No Suggested Reading articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
  Copyright © 电脑与电信 All Rights Reserved.
地址:广州市连新路171号广东国际科技中心 邮编:510033
本系统由北京玛格泰克科技发展有限公司设计开发 技术支持:support@magtech.com.cn
粤ICP备05080322号-4