网络与信息安全学报 ›› 2021, Vol. 7 ›› Issue (2): 10-21.doi: 10.11959/j.issn.2096-109x.2021021
蒋忠元, 陈贤宇, 马建峰
修回日期:
2020-08-02
出版日期:
2021-04-15
发布日期:
2021-04-01
作者简介:
蒋忠元(1988- ),男,陕西榆林人,博士,西安电子科技大学副教授,主要研究方向为大数据安全、复杂网络安全研究、复杂网络传输动力学、网络功能虚拟化、城市计算。基金资助:
Zhongyuan JIANG, Xianyu CHEN, Jianfeng MA
Revised:
2020-08-02
Online:
2021-04-15
Published:
2021-04-01
Supported by:
摘要:
社团是社交网络的重要特征,社团检测技术的发展给网络用户带来隐私泄露的危险。如何保护敏感的社团信息不被泄露,保障用户与社团安全已经成为网络安全领域的研究热点。近几年,社团保护技术取得了初步进展,但针对社交网络中的社团隐私或社团安全研究进展综述较少,不利于该研究方向的长远发展。因此,主要针对社团结构隐私方面的研究进展进行综述,对最新的相关研究成果进行系统地归纳、总结、比较,并展望了未来的研究方向。
中图分类号:
蒋忠元, 陈贤宇, 马建峰. 社交网络中的社团隐私研究综述[J]. 网络与信息安全学报, 2021, 7(2): 10-21.
Zhongyuan JIANG, Xianyu CHEN, Jianfeng MA. Survey of community privacy in social network[J]. Chinese Journal of Network and Information Security, 2021, 7(2): 10-21.
表1
相关工作所使用的社交网络数据集Table 1 Social network dataset used in related work"
社交网络 | 节点数目 | 边数目 | 描述 |
kar | 34 | 78 | Zachary Karate's Club |
dol | 62 | 159 | Dolphins association |
mad | 62 | 159 | Madrid Train Bombing |
lesm | 77 | 154 | Co-appearances of characters in Les Miserables |
polb | 105 | 441 | Books about US politics |
words | 112 | 425 | Adjectives/nouns in the novel David Copperfield |
nets | 1 589 | 5 486 | Net Theory co-authors |
erdos | 6 100 | 9 939 | Erdos collaborations |
faceb | 6 387 | 2.17×105 | |
pow | 4 941 | 6 594 | USA Power Grid |
astr | 1.79×104 | 1.97×105 | Astrophysics co-authors |
4sq | 6.39×105 | 3.2×106 | Foursquare |
dblp | 5.405×105 | 1.52×107 | DBLP |
amz | 5.48×105 | 9.25×105 | Amazon metadata |
you | 1×106 | 3×106 | Youtube dataset |
ork | 3×106 | 1.172×108 | Orkut social network |
表2
基于目标社团中隐私保护的相关工作对比Table 2 Comparisons of related work based on privacy protection on target community"
文献 | 操作 | 技术 | 所需网络知识 | 不足之处 |
文献[ | 增边、删边 | 安全性、模块度 | 目标社团节点的边 | 检测单一、反欺骗问题 |
文献[ | 增边、删边 | 新的安全性 | 目标社团节点的边 | 检测单一、真实应用 |
文献[ | 增边、删边 | 模块度 | 目标社团节点的边 | 研究知识不足、有局限性 |
文献[ | 增边 | 模块度 | 节点中心性 | 网络规模小、关注点单一 |
文献[ | 增边、删边 | 模块度、遗传算法 | 目标社团节点的边 | 检测单一、单目标优化 |
[1] | Wikipedia. Complex network[EB]. |
[2] | XUAN Q , ZHANG Z Y , FU C ,et al. social Synchrony on complex networks[J]. IEEE Transactions on Cybernetics, 2018,48(5): 1420-1431. |
[3] | XUAN Q , FANG H , FU C ,et al. Temporal motifs reveal collaboration patterns in online task-oriented networks[J]. Physical Review E, 2015,91(5): 052813. |
[4] | GARCIA J O , ASHOURVAN A , MULDOON S ,et al. Applications of community detection techniques to brain graphs:algorithmic considerations and implications for neural function[J]. Proceedings of the IEEE Institute of Electrical and Electronics Engineers, 2018,106(5): 1-22. |
[5] | CHEN Z , WU J , XIA Y ,et al. Robustness of interdependent power grids and communication networks:a complex network perspective[J]. IEEE Transactions on Circuits & Systems Ⅱ Express Briefs, 2018,65(1): 115-119. |
[6] | SCHIAVO S , REYES J , FAGIOLO G . International trade and financial integration:a weighted network analysis[J]. Quantitative Finance, 2010,10(4): 389-399. |
[7] | FU C , ZHAO M , FAN L ,et al. Link weight prediction using supervised learning methods and its application to yelp layered network[J]. IEEE Transactions on Knowledge & Data Engineering, 2018,30(8): 1507-1518. |
[8] | CLAUSET A , MOORE C , NEWMAN M E . Hierarchical structure and the prediction of missing links in networks[J]. Nature, 2008,453(7191): 98-101. |
[9] | KIPF T N , WELLING M . Semi-supervised classification with graph convolutional networks[C]// ICLR. 2016. |
[10] | ZHANG H F , XU F , BAO Z K ,et al. Reconstructing of networks with binary-state dynamics via generalized statistical inference[J]. Circuits & Systems I Regular Papers IEEE Transactions, 2019,66(4): 1608-1619. |
[11] | 王永刚, 蔡飞志, LUA E K ,et al. 一种社交网络虚假信息传播控制方法[J]. 计算机研究与发展, 2012,49(S2): 131-137. |
WANG Y G , CAI F Z , LUA E K ,et al. A diffusion control method of fake information in social networks[J]. Journal of Computer Research and Development, 2012,49(S2): 131-137. | |
[12] | ZHENG J G , PAN L . Least cost rumor community blocking optimization in social networks[C]// 2018 Third International Conference on Security of Smart Cities,Industrial Control System and Communications (SSIC). 2018: 1-5. |
[13] | SPIRIN V , MIRNY L A . Protein complexes and functional modules in molecular networks[J]. Proceedings of the National Academy of Sciences, 2003,100(21): 12123-12128. |
[14] | GOH K I , CUSICK M E , VALLE D ,et al. The human disease network[J]. Proceedings of the National Academy of Sciences, 2007,104(21): 8685-8690. |
[15] | NEWMAN M E . The Structure and function of complex networks[J]. SIAM Review, 2003,45(2): 167-256. |
[16] | GIRVAN M , NEWMAN M E . Community structure in social and biological networks[J]. Proceedings of the National Academy of Sciences of the United States of America, 2002,99(12): 7821-7826. |
[17] | NEWMAN M E , GIRVAN M . Finding and evaluating community structure in networks[J]. Physical Review E, 2004,69(2): 026113. |
[18] | PALLA G , DERENYI I , FARKAS I ,et al. Uncovering the overlapping community structure of complex networks in nature and society[J]. Nature, 2005,435(23): 814-818. |
[19] | RAGHAVAN U N , ALBERT R , KUMARA S . Near linear time algorithm to detect community structures in large-scale networks[J]. Physical Review E, 2007,76(3): 036106. |
[20] | RHEINGOLD H . The virtual community:homesteading on the electric frontier[M]. New York: Harper Perennial, 1993. |
[21] | 姚瑞欣, 李晖, 曹进 . 社交网络中的隐私保护研究综述[J]. 网络与信息安全学报, 2016,2(4): 33-43. |
YAO R X , LI H , CAO J . Overview of privacy preserving in social network[J]. Chinese Journal of Network and Information Security, 2016,2(4): 33-43. | |
[22] | FIONDA V , PIRRO G . Community deception or:how to stop fearing community detection algorithms[J]. IEEE Transactions on Knowledge & Data Engineering, 2018,30(4): 660-673. |
[23] | CHEN X Y , JIANG Z Y , LI H ,et al. Community hiding by link rewiring in social networks[J]. IEEE Transactions on Big Data, 2020. |
[24] | WANIEK M , MICHALAK T , RAHWAN T ,et al. Hiding individuals and communities in a social network[J]. Nature Human Behaviour, 2018,2: 139-147. |
[25] | NAGARAJA S , . The impact of unlinkability on adversarial community detection:effects and countermeasures[C]// Privacy Enhancing Technologies,International Symposium. 2010: 253-272. |
[26] | CHEN J Y , CHEN L H , CHEN Y X ,et al. GA-based q-attack on community detection[J]. IEEE Transactions on Computational Social Systems, 2019,6(3): 491-503. |
[27] | 荣欢 . 社会网络中社团K-匿名研究[D]. 南京:南京信息工程大学, 2016. |
RONG H . The study of community K-anonymization in social network[D]. Nanjing:Nanjing University of Information Science &Technology, 2016. | |
[28] | 陆越 . 基于社团划分的社交网络分级隐私保护算法研究[D]. 上海:上海交通大学, 2018. |
LU Y . Hierarchical privacy protection algorithm for social network based on community division[D]. Shanghai:Shanghai Jiao Tong University, 2018. | |
[29] | FORTUNATO S . Community detection in graphs[J]. Physics Reports, 2010,486(3-5): 75-174. |
[30] | 杨博, 刘大有, 金弟 ,等. 复杂网络聚类方法[J]. 软件学报, 2009,20(1): 54-66. |
YANG B , LIU D Y , JIN D ,et al. Complex network clustering algorithms[J]. Journal of Software, 2009,20(1): 54-66. | |
[31] | NEWMAN M E . Modularity and community structure in networks[J]. Proceedings of the National Academy of Sciences of the United States of America, 2006,103(23): 8577-8582. |
[32] | NEWMAN M E . Fast algorithm for detecting community structure in networks[J]. Physical Review E, 2003,69:066133. |
[33] | CLAUSET A , NEWMAN M E , MOORE C . Finding community structure in very large networks[J]. Physical Review E, 2004,70:066111. |
[34] | LI Z P , ZHANG S H , WANG R S ,et al. Quantitative function for community detection[J]. Physical Review E,Statistical Nonlinear & Soft Matter Physics, 2008,77:036109. |
[35] | ROSVALL M , BERGSTROM C T . An information-theoretic framework for resolving community structure in complex networks[J]. Proceedings of the National Academy of Sciences, 2007,104(18): 7327-7331. |
[36] | ROSVALL M , BERGSTROM C T . Maps of random walks on complex networks reveal community structure[J]. Proceedings of the National Academy of Sciences, 2008,105(4): 1118-1123. |
[37] | BLONDEL V D , GUILLAUME J L , LAMBIOTTE R ,et al. Fast unfolding of communities in large networks[J]. Journal of Statistical Mechanics Theory & Experiment, 2008(10): 10008. |
[38] | SHI C , YAN Z , WANG Y ,et al. A genetic algorithm for detection communities in larger-scale complex networks[J]. Advances in Complex Systems, 2010,13(1): 3-17. |
[39] | DONGEN S M . Graph clustering by flow simulation[D]// University of Utrecht,The Netherlands,(CWI), 2000: 238-247. |
[40] | 尹欣红 . 基于连接模式的相关分析及带偏置的随机游走的社团检测方法研究[D]. 兰州:兰州大学, 2019. |
YIN X H . Research on correlation analysis based on link pattern and community detection method with random walk with bias[D]. Lanzhou:Lanzhou University, 2019. | |
[41] | YUAN Y L , SOH D , YANG H ,et al. Learning overlapping community-based networks[J]. IEEE Transactions on Signal and Information Processing over Networks, 2019,5(4): 684-697. |
[42] | YANG J , LESKOVEC J . Overlapping community detection at scale:a nonnegative matrix factorization approach[C]// Proceedings of the Sixth ACM International Conference on Web Search and Data Mining. 2013: 587-596. |
[43] | AHN Y Y , HAN S , KWAK H ,et al. Analysis of topological characteristics of huge online social networking services[C]// International Conference on World Wide Web. ACM, 2007: 835-844. |
[44] | KIM Y , JEONG H . Map equation for link communities[J]. Physical Review E, 2011,84(2): 026110. |
[45] | YE Q , WU B , ZHAO Z ,et al. Detecting link communities in massive networks[C]// International Conference on Advances in Social Networks Analysis & Mining. IEEE Computer Society, 2011: 71-78. |
[46] | LANCICHINETTI A , FORTUNATO S , JANOS K . Detecting the overlapping and hierarchical community structure in complex networks[J]. New Journal of Physics, 2009,11(3): 033015. |
[47] | ANDREA L , FILIPPO R , RAMASCO J J ,et al. Finding statistically significant communities in networks[J]. Plos One, 2011,6(4): 18961. |
[48] | PADROL S A , PERARNAU L G , PFEIFLE J ,et al. Overlapping community search for social networks[C]// IEEE International Conference on Data Engineering. 2010: 992-995. |
[49] | LEE C , REID F , MCDAID A ,et al. Detecting highly overlapping community structure by greedy clique expansion[J]. arXiv:1002.1827, 2010. |
[50] | DU N , WANG B , WU B . Detecting highly overlapping community structure by greedy clique expansion[C]// Proceedings of the 17th ACM Conference on Information and Knowledge Management. 2008: 1371-1372. |
[51] | ZHANG H , QIU B , GILES C L ,et al. An LDA-based community structure discovery approach for large-scale social networks[C]// IEEE International Conference on Intelligence & Security Informatics. 2007: 200-207. |
[52] | PSORAKIS I , ROBERTS S , EBDEN M ,et al. Overlapping community detection using Bayesian non-negative matrix factorization[J]. Physical Review E, 2011,83(6): 066114. |
[53] | NEPUSZ T , PETROCZI A , NEGYESSY L ,et al. Fuzzy communities and the concept of bridgeness in complex networks[J]. Physical Review E, 2008,77(1): 016107. |
[54] | NEWMAN M E , LEICHT E A . Mixture models and exploratory analysis in networks[J]. Proceedings of the National Academy of ences of the United States of America, 2007,104(23): 9564-9569. |
[55] | AIROLDI E M , BLEI D M , FIENBERG S E ,et al. Mixed membership stochastic blockmodels[J]. Journal of Machine Learning Research, 2008,9(3): 33-40. |
[56] | ABRAHAO B , SOUNDARAJAN S , HOPCROFT J ,et al. A separability framework for analyzing community structure[J]. ACM Transactions on Knowledge Discovery from Data, 2014,8(1): 101-129. |
[57] | JIANG Z Y , LI J , MA J F . Similarity-based and sybil attack defended community detection for social networks[J]. IEEE Transactions on Circuits and Systems Ⅱ:Express Briefs, 2020. |
[58] | 李欢, 莫欣岳 . 复杂网络重叠社团检测算法研究综述[J]. 传感器与微系统, 2017,36(1): 1-4. |
LI H , MO X Y . Research review on detection algorithm of overlapping community in complex network[J]. Transducer and Microsystem Technologies, 2017,36(1): 1-4. | |
[59] | 于乐 . 社会网络中社团发现及网络演化分析[D]. 北京:北京邮电大学, 2014. |
YU L . Research on community detection and evolution analysis in social network[D]. Beijing:Beijing University of Posts and Telecommunications, 2014. | |
[60] | LU K , TERZI E . Towards identity anonymization on graphs[C]// Proceedings of the 2008 ACM SIGMOD,International Conference on Management of Data ACM. 2008: 93-106. |
[1] | 时文旗, 罗向阳, 郭家山. 基于加权最小二乘的社交网络用户定位方法[J]. 网络与信息安全学报, 2022, 8(3): 41-52. |
[2] | 谢绒娜, 范晓楠, 袁琳, 郭子晨, 朱家玉, 史国振. 在线社交网络中延伸访问控制机制研究[J]. 网络与信息安全学报, 2021, 7(5): 123-131. |
[3] | 张鑫,羌卫中,吴月明,邹德清,金海. 基于卷积神经网络恶意安卓应用行为模式挖掘[J]. 网络与信息安全学报, 2020, 6(6): 35-44. |
[4] | 王培,贾焰,李爱平,蒋千越. 基于DeepLink的社交网络去匿名方法[J]. 网络与信息安全学报, 2020, 6(4): 104-108. |
[5] | 曲强,于洪涛,黄瑞阳. 基于注意力机制的社交垃圾文本检测方法[J]. 网络与信息安全学报, 2020, 6(1): 54-61. |
[6] | 曲强, 于洪涛, 黄瑞阳. 社交网络异常用户检测技术研究进展[J]. 网络与信息安全学报, 2018, 4(3): 13-23. |
[7] | 陈天柱,郭云川,牛犇,李凤华. 面向社交网络的访问控制模型和策略研究进展[J]. 网络与信息安全学报, 2016, 2(8): 1-9. |
[8] | 何建琼,田有亮,周凯. 可证明安全的社交网络隐私保护方案[J]. 网络与信息安全学报, 2016, 2(8): 62-67. |
[9] | 姚瑞欣,李晖,曹进. 社交网络中的隐私保护研究综述[J]. 网络与信息安全学报, 2016, 2(4): 33-43. |
[10] | 朱建明,高博. 社交金融的信息安全风险分析与防范[J]. 网络与信息安全学报, 2016, 2(3): 46-51. |
[11] | 闫峥,吴宸梓,冯伟,王子龙. 可信普适社交网络研究综述和展望[J]. 网络与信息安全学报, 2016, 2(2): 30-40. |
[12] | 田亚平,杨力,王小琴,乔雅峰. 基于节点亲密度挖掘的谣言抑制算法[J]. 网络与信息安全学报, 2016, 2(11): 61-69. |
[13] | 许志凯,张宏莉,史建焘,田志宏. 面向移动社交网络的位置隐私保护方法[J]. 网络与信息安全学报, 2015, 1(1): 50-57. |
阅读次数 | ||||||
全文 |
|
|||||
摘要 |
|
|||||
|