基于用户项目特征分组的隐私保护算法
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:Privacy protection algorithm based on user project feature grouping
  • 作者:林荣智 ; 苗耀锋
  • 英文作者:LIN Rong-zhi;MIAO Yao-feng;College of Engineering,Xi'an International University;
  • 关键词:推荐系统 ; 隐私数据 ; 项目特征 ; 协同过滤 ; 属性矩阵 ; 社交网络 ; 稀疏矩阵 ; 相似度
  • 英文关键词:recommendation system;;privacy data;;project characteristic;;collaborative filtering;;attribute matrix;;social network;;sparse matrix;;similarity
  • 中文刊名:SYGY
  • 英文刊名:Journal of Shenyang University of Technology
  • 机构:西安外事学院工学院;
  • 出版日期:2018-11-05 20:49
  • 出版单位:沈阳工业大学学报
  • 年:2018
  • 期:v.40;No.202
  • 基金:陕西省科技厅重点研发计划资助项目(2017GY-094);; 陕西省教育厅专项科研计划资助项目(17JK1102)
  • 语种:中文;
  • 页:SYGY201806013
  • 页数:6
  • CN:06
  • ISSN:21-1189/T
  • 分类号:72-77
摘要
针对互联网推荐系统中存在严重的隐私保护问题,在传统推荐系统算法的基础上,引入项目属性相似度的概念,并提出了一种具备保护用户隐私功能的新型推荐系统.系统利用用户的历史评价和推荐系统中项目的属性信息,使用不采集用户个人信息的协同过滤推荐算法,计算出用户对未评价项目的评分预测,形成了一种能够保护个人隐私的推荐算法.结果表明,与其他推荐算法相比,本文算法在推荐准确度和用户隐私保护程度上取得一个较好的平衡,具有较高的实用价值.
        Aiming at the serious privacy protection problem in the recommendation system of internet,the concept of project attribute similarity based on the traditional algorithm of recommender system was introduced,and a newrecommendation system with the function of protecting the privacy of users was proposed. With the historical evaluation of users and the attribute information of projects in the recommendation system,the collaborative filtering algorithm without collecting the personal information of users was adopted in the proposed system,the score forecast of projects without the evaluation of users could be calculated,and the recommendation algorithm which could protect the personal privacy was developed. The results showthat compared with other recommendation algorithms, the proposed recommendation algorithm achieves better balance between the recommendation accuracy and privacy protection degree of users,and has good practical value.
引文
[1]刘晓乐,李博.隐私保护下的组最近邻查询算法研究[J].计算机应用与软件,2016,33(5):302-306.(LIU Xiao-le,LI Bo. Group nearest neighbor query algorithm under privacy protection[J]. Computer Applications and Softw are,2016,33(5):302-306.)
    [2]蒲巧林.基于用户位置隐私保护的室内WLAN指纹定位组网优化算法[D].重庆:重庆邮电大学,2016.(PU Qiao-lin. Network optimization algorithm for indoor WLAN fingerprint location based on user location privacy protection[D]. Chongqing:Chongqing University of Posts and Telecommunications,2016.)
    [3]智淑敏,刘静静.一种用于网络位置隐私保护的动态路由算法[J].电子设计工程,2016,24(15):28-31.(ZHI Shu-min,LIU Jing-jing. A dynamic routing algorithm for netw ork location privacy protection[J].Electronic Design Engineering,2016,24(15):28-31.)
    [4]彭飞,曾学文,邓浩江,等.一种基于群组推荐的用户隐私保护方法[J].计算机应用研究,2015,32(3):869-872.(PENG Fei,ZENG Xue-wen,DENG Hao-jiang,et al.A user privacy protection method based on group recommendation[J]. Computer Application Research,2015,32(3):869-872.)
    [5]孟凡帅.基于HDFS的时空数据共享与查询隐私保护的研究与实现[D].沈阳:东北大学,2014.(MENG Fan-shuai. Research and implementation of HDFS based spatio-temporal data sharing and query privacy protection[D]. Shenyang:Northeastern University,2014.)
    [6]田文利.基于网络编码的节点隐私保护协议研究[J].电子设计工程,2015,23(3):49-50.(TIAN Wen-li. Privacy protection protocol of network based on node encoding[J]. Electronic Design Engineering,2015,23(3):49-50.)
    [7]曹蔚,冯钢,秦爽,等.面向海量机器类通信(mMTC)的无线接入控制[J].重庆邮电大学学报(自然科学版),2017,29(5):569-579.(CAO Wei,FENG Gang,QIN Shuang,et al. Access control for massive machine type communications(mMTC)[J]. Journal of Chongqing University of Posts and Telecommunications(Natural Science Edition),2017,29(5):569-579.)
    [8]程舒通,徐从富,但红卫.高效隐私保护频繁模式挖掘算法研究[J].计算机科学,2015,42(4):194-198.(CHENG Shu-tong,XU Cong-fu,DAN Hong-wei.Efficient privacy preserving frequent pattern mining algorithm[J]. Computer Science,2015,42(4):194-198.)
    [9]张诗梦.集值数据发布中多级敏感模型及隐私保护方法研究[D].桂林:广西师范大学,2015.(ZHANG Shi-meng. Research on multilevel sensitive model and privacy protection in set-valued data publishing[D]. Guilin:Guangxi Normal University,2015.)
    [10]王旭.汉语学习平台中基于BIRCH聚类的用户个人信息分组算法研究[D].长春:吉林大学,2011.(WANG Xu. Research on user personal information grouping algorithm based on BIRCH clustering in Chinese learning platform[D]. Changchun:Jilin University,2011.)
    [11]陈超群.基于透明加密的移动终端数据防泄漏关键技术研究及应用[D].无锡:江南大学,2016.(CHEN Chao-qun. Research and application of key technology for anti leakage of mobile terminal based on transparent encryption[D]. Wuxi:Jiangnan University,2016.)
    [12]康海燕,黄渝轩,陈楚翘.基于视频分析的地理信息隐私保护方法[J].山东大学学报(理学版),2018,53(1):19-29.(KANG Hai-yan,HUANG Yu-xuan,CHEN Chuqiao. The method of privacy protection of geographic information based on video analysis[J]. Journal of Shandong University(Science Edition),2018,53(1):19-29.)
    [13]叶青,谷利泽,郑世慧,等.基于并发签名的网络易货协议[J].沈阳工业大学学报,2013,35(3):333-337.(YE Qing,GU Li-ze,ZHENG Shi-hui,et al. The netw ork barter agreement based on concurrent signature[J]. Journal of Shenyang University of Technology,2013,35(3):333-337.)
    [14]严冬梅,鲁城华.基于用户兴趣度和特征的优化协同过滤推荐[J].计算机应用研究,2012,29(2):497-500.(YAN Dong-mei,LU Cheng-hua. Collaborative filtering recommendation based on optimization of user interest and characteristics[J]. Application Research of Computers,2012,29(2):497-500.)
    [15]贾俊杰,闫国蕾.一种个性化(p,k)匿名隐私保护算法[J].计算机工程,2018(1):176-181.(JIA Jun-jie,YAN Guo-lei. A personalized(p,k)anonymous privacy protection algorithm[J]. Computer Engineering,2018(1):176-181.)
    [16]毕猛,王安迪,徐剑,等.基于离散马尔科夫链的数据库用户异常行为检测[J].沈阳工业大学学报,2018,40(1):70-76.(BI Meng,WANG An-di,XU Jian,et al. Detection of abnormal behavior of database users based on discrete M arkov chain[J]. Journal of Shenyang University of Technology,2018,40(1):70-76.)

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700