Security analysis of weighted network anonymity based on singular value decomposition
The security of anonymous method based on singular value decomposition (SVD) in the privacy preserving of weighted social network was analyzed.The reconstruction method in network with integer weights and the inexact reconstruction method in network with arbitrary weighted were proposed.The <inli...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2018-05-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2018074/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841539426851749888 |
---|---|
author | Yong ZENG Lingjie ZHOU Zhongyuan JIANG Zhihong LIU Jianfeng MA |
author_facet | Yong ZENG Lingjie ZHOU Zhongyuan JIANG Zhihong LIU Jianfeng MA |
author_sort | Yong ZENG |
collection | DOAJ |
description | The security of anonymous method based on singular value decomposition (SVD) in the privacy preserving of weighted social network was analyzed.The reconstruction method in network with integer weights and the inexact reconstruction method in network with arbitrary weighted were proposed.The <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML"> <mfrac> <mi>ε</mi> <mi>N</mi> </mfrac> </math></inline-formula> -tolerance was definited to measure its safety.It was also pointed out that the upper bound of ε (the reconfigurable coefficient) obtained in current spectral theories was so conservative that lacks of guidance.The reconfigurable coefficients of random networks,Barabasi-Albert networks,small world networks and real networks were calculated by experiment.Moreover,the reconfigurable coefficients of double perturbation strategies based on SVD were also tested.Experimental results show that weighted social networks have different tolerances on spectrum loss,and there is a close relationship between its tolerance and network parameters. |
format | Article |
id | doaj-art-685cbedd0dfa43cb965397481ebca090 |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2018-05-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-685cbedd0dfa43cb965397481ebca0902025-01-14T07:14:41ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2018-05-0139233359718002Security analysis of weighted network anonymity based on singular value decompositionYong ZENGLingjie ZHOUZhongyuan JIANGZhihong LIUJianfeng MAThe security of anonymous method based on singular value decomposition (SVD) in the privacy preserving of weighted social network was analyzed.The reconstruction method in network with integer weights and the inexact reconstruction method in network with arbitrary weighted were proposed.The <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML"> <mfrac> <mi>ε</mi> <mi>N</mi> </mfrac> </math></inline-formula> -tolerance was definited to measure its safety.It was also pointed out that the upper bound of ε (the reconfigurable coefficient) obtained in current spectral theories was so conservative that lacks of guidance.The reconfigurable coefficients of random networks,Barabasi-Albert networks,small world networks and real networks were calculated by experiment.Moreover,the reconfigurable coefficients of double perturbation strategies based on SVD were also tested.Experimental results show that weighted social networks have different tolerances on spectrum loss,and there is a close relationship between its tolerance and network parameters.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2018074/singular value decompositionweighted social networksprivacy preserving |
spellingShingle | Yong ZENG Lingjie ZHOU Zhongyuan JIANG Zhihong LIU Jianfeng MA Security analysis of weighted network anonymity based on singular value decomposition Tongxin xuebao singular value decomposition weighted social networks privacy preserving |
title | Security analysis of weighted network anonymity based on singular value decomposition |
title_full | Security analysis of weighted network anonymity based on singular value decomposition |
title_fullStr | Security analysis of weighted network anonymity based on singular value decomposition |
title_full_unstemmed | Security analysis of weighted network anonymity based on singular value decomposition |
title_short | Security analysis of weighted network anonymity based on singular value decomposition |
title_sort | security analysis of weighted network anonymity based on singular value decomposition |
topic | singular value decomposition weighted social networks privacy preserving |
url | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2018074/ |
work_keys_str_mv | AT yongzeng securityanalysisofweightednetworkanonymitybasedonsingularvaluedecomposition AT lingjiezhou securityanalysisofweightednetworkanonymitybasedonsingularvaluedecomposition AT zhongyuanjiang securityanalysisofweightednetworkanonymitybasedonsingularvaluedecomposition AT zhihongliu securityanalysisofweightednetworkanonymitybasedonsingularvaluedecomposition AT jianfengma securityanalysisofweightednetworkanonymitybasedonsingularvaluedecomposition |