Please wait a minute...
Computer & Telecommunication
Current Issue | Archive | Adv Search |
Resource RecommendationAlgorithm Based on K-anonymity for Generalizing User Query Requests
Jiangsu University
Download:   PDF(0KB)
Export: BibTeX | EndNote (RIS)      
Abstract  Existing resource recommendation algorithms make resource recommendation based on user preferences, without consider- ing the subjective reluctance of users to personal privacy or the data mining of interests and hobbies, or the risk of privacy disclosure of third-party servers. To solve the problem of user privacy, this paper puts forward the K-anonymous privacy protection algorithm. After the generalization of sensitive attributes of user query requests, it constructs a logical anonymous query request equivalence class, uses the method of data rotary to enable users in the same equivalence class to randomly forward the received data from other users. Because the privacy attributes that each person wants to protect are different, the weight of its sensitive attribute is different, so this paper proposes the weight summation formula based on the sensitive attribute combined with the sensitive attribute weight value set by the user independently, and recommends the optimal selection scheme for the platform user. The security analysis shows that this method can effectively resist similarity attack, background knowledge attack and capture server attack. Experiments show that this method not only satisfies the correctness of matching results, but also enhances the privacy protection performance in the process of resource recommendation.
Key wordsprivacy protection      resource recommendation      anonymity      sensitivity      generalization     
Published: 13 August 2020

Cite this article:

Peng Li-xun Liu Feng-kai. Resource RecommendationAlgorithm Based on K-anonymity for Generalizing User Query Requests. Computer & Telecommunication, 2020, 1(6): 66-73.

URL:

http://www.computertelecom.com.cn/EN/     OR     http://www.computertelecom.com.cn/EN/Y2020/V1/I6/66

[1] CAI Chang-hao LU Chang-xing HATe SUN Ruo-xi XIN Yu-liang. Research on User Privacy Protection Method in Logistics Industry[J]. 电脑与电信, 2020, 1(12): 75-79.
[2] WANG Shuai ZHANG Gui-jie. AMeasure of Trajectory Similarity Based on a Negative Correlation with Distance[J]. 电脑与电信, 2020, 1(11): 60-64.
[3] ZUO Wen-tao LUO Guo-qiang. Analysis of Data Security and Privacy Protection in the Background of "Artificial Intelligence+"[J]. 电脑与电信, 2019, 1(3): 39-41.
[4] Zhang Shuai, Zhao Yan. Research on Scenario Privacy Protection Design for Mobile Terminal[J]. 电脑与电信, 2017, 1(5): 38-40.
[5] Zhao Junjie. Research on the Protection of Consumers' Privacy in Electronic Commerce[J]. 电脑与电信, 2016, 1(5): 33-35.
[6] Chen Rong. Study on the SSL VPN Network Security Technology[J]. 电脑与电信, 2015, 1(10): 50-51.
Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd