版权所有:内蒙古大学图书馆 技术提供:维普资讯• 智图
内蒙古自治区呼和浩特市赛罕区大学西街235号 邮编: 010021
作者机构:Chongqing University College of Computer Science Chongqing401331 China Chongqing University School of Big Data and Software Engineering Chongqing401331 China Bowling Green State University Computer Science Department United States Electric Power Dispatching and Control Center of Guangdong Power Grid Co. Ltd Guangzhou China University of Electronic Science and Technology of China School of Information and Software Engineering Chengdu611731 China Qilu University of Technology Big Data Institute Jinan250353 China
出 版 物:《IEEE Transactions on Network and Service Management》 (IEEE Trans. Netw. Serv. Manage.)
年 卷 期:2025年
核心收录:
学科分类:0301[法学-法学] 0808[工学-电气工程] 08[工学]
主 题:Differential privacy
摘 要:Online social networks have emerged as a significant data source, but the extensive collection and utilization of personal information have given rise to profound concerns regarding privacy. From a legislative and policy perspective, and in alignment with the concept of privacy as control, users have the right to control their personal privacy information. However, users often encounter challenges in terms of understanding and effectively managing their privacy settings to align with their specific privacy requirements. To address this issue, in this paper, we incorporate the concept of trust and propose a trust-based personalized differential privacy model for online social networks, denoted as TPDP, which relies on a trusted central server to facilitate its operation. Specifically, when a user requests access to another user s personal information, the TPDP mechanism provides a privacy response, where the privacy level is determined based on the direct and indirect trust values among users, calculated automatically by the trusted central server. Furthermore, the proposed TPDP model offers user-to-user personalized differential privacy protection from the perspectives of network structures, trust-related factors, and trust propagation patterns. Finally, we validate the model s feasibility and assess the privacy-utility trade-off, as well as its robustness against attacks, through theoretical analysis and performance evaluation. © 2004-2012 IEEE.