Font Size: a A A

Research On The Information Flow Control Model Based On Neighbor Node Intimacy For Online Social Networks

Posted on:2017-10-04Degree:MasterType:Thesis
Country:ChinaCandidate:F FanFull Text:PDF
GTID:2348330509954396Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of Web2.0 network technology, online social network has become a popular platform for people to exchange information, provides more ways for people's communication. Social networking users can share information with friends anytime and anywhere, The huge amounts of data of users released brings us huge commercial value. Meanwhile, the privacy information disclosure problem followed. In view of this, some researchers have proposed access control method based on the close friends intimacy, in order to limit the scope of the user can access information. However, However, the method measure the neighbor node intimacy through the interaction behavior and numbers between friends, the lack of sensitivity to privacy information reasonable consideration. Therefore, the current online social network information flow transmission privacy protection mechanism based on neighbor node intimacy is just in its infancy, there are still quite a lot of shortcomings.Focus on the privacy information flow which is hard to control the scope of delivery problems in online social network, this paper proposes a flow of access control model based on neighbor node intimacy. Main work includes several aspects:1) We have introduce the relational database data privacy protection mechanism and key techniques of online social network privacy protection of related research, analyzing advantages and disadvantages of all kinds of privacy protection mechanism. Detailed interpretation of the existing access control model based on close friends intimacy and analyzed its shortcomings;2) We propose intimate degree model based on the resources sensitivity which friends can access. By considering the accumulation of resources quantity in online social networks for the influence of sensitivity information, users grant friends access difference resources sensitivity reflected by different degree of close relationship between users, according to the social networking between users in common friends can affect the sensitivity of the link relations, this paper build the intimate degree model determined by resource sensitivity, resource quantity, common friends between users;3) Using the calculation results of intimate degree model, reference to the multilevel security level ideas, for multilevel security hierarchy of social network users, Set up the flow of information access control model based on neighbor node intimacy, used to limit the scope of privacy information flow passes the user nodes scope. Social network managers through setting reasonable scope of intimacy for convey information, implements the privacy information flow transfer can be controlled within the scope;4) According to the current existing intimate degree model based on the resources sensitivity and the proposed model of information flow control based on neighbor node intimacy, set up realistic online social network simulation scenario. For traditional access control policy and information flow access control mechanism based on neighbor nodes intimacy are compared and analyzed. The experimental results show that information flow access control model based on neighbor node intimacy can be better to limit the flow of information transfer to user node number in social network, achieving the purpose of protecting the privacy information flow;A kind of information flow control model based on neighbor node intimacy for online social networks proposed in this paper. by using multilevel security level at the same time, implemented different sensitivity information flow transmission range control well in a social network, thus provide privacy protection mechanism for social network transmission of information flow.
Keywords/Search Tags:Social Networking, Privacy Protection, Resources Sensitivity, Neighbor Node Intimacy, Security Level, Information Flow Control
PDF Full Text Request
Related items