Research on network information leakage prevention method based on k-symmetric anonymous algorithm

IF 5 3区 计算机科学 Q1 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE
Zaoxian Zheng, Hao Liu, Na Lin, Shanni Li, Dawei Wang
{"title":"Research on network information leakage prevention method based on k-symmetric anonymous algorithm","authors":"Zaoxian Zheng,&nbsp;Hao Liu,&nbsp;Na Lin,&nbsp;Shanni Li,&nbsp;Dawei Wang","doi":"10.1016/j.eij.2025.100636","DOIUrl":null,"url":null,"abstract":"<div><div>In order to prevent the leakage of privacy information in published network data and improve the security of network information, a network information leakage prevention method based on K-symmetric anonymity algorithm is proposed. The relationship between individuals in the network is analyzed, and the network information graph is constructed based on graph theory to intuitively reflect the relationship between nodes in the network. The detailed query method is used to judge whether each node in the network information graph has a corresponding self-conserved equivalent node, and the simple symmetric processing is carried out to ensure that each node has a self-conserved equivalent node. Use the K-symmetric anonymous processing method to copy all nodes that have been treated with simple symmetry so that each set of equivalence classes contains more than two nodes. With the addition of network nodes, the network topology changes significantly, which reduces the probability of the attacker identifying network nodes. The improved K-symmetric anonymous algorithm only performs symmetric processing on the nodes with moderately minimal processing results. While reducing the system overhead, the network topology also presents irregular changes, making it difficult for attackers to discover the topology of the original graph, and increasing the difficulty of network information cracking. The experimental results show that this method can effectively prevent network information leakage, and has good information availability and confidentiality. By constructing a network information graph and analyzing the relationship between individuals in the network based on graph theory, the effective protection of network information is realized. It improves the security of network information and reduces the risk of disclosure of private information.</div></div>","PeriodicalId":56010,"journal":{"name":"Egyptian Informatics Journal","volume":"30 ","pages":"Article 100636"},"PeriodicalIF":5.0000,"publicationDate":"2025-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Egyptian Informatics Journal","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1110866525000295","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE","Score":null,"Total":0}
引用次数: 0

Abstract

In order to prevent the leakage of privacy information in published network data and improve the security of network information, a network information leakage prevention method based on K-symmetric anonymity algorithm is proposed. The relationship between individuals in the network is analyzed, and the network information graph is constructed based on graph theory to intuitively reflect the relationship between nodes in the network. The detailed query method is used to judge whether each node in the network information graph has a corresponding self-conserved equivalent node, and the simple symmetric processing is carried out to ensure that each node has a self-conserved equivalent node. Use the K-symmetric anonymous processing method to copy all nodes that have been treated with simple symmetry so that each set of equivalence classes contains more than two nodes. With the addition of network nodes, the network topology changes significantly, which reduces the probability of the attacker identifying network nodes. The improved K-symmetric anonymous algorithm only performs symmetric processing on the nodes with moderately minimal processing results. While reducing the system overhead, the network topology also presents irregular changes, making it difficult for attackers to discover the topology of the original graph, and increasing the difficulty of network information cracking. The experimental results show that this method can effectively prevent network information leakage, and has good information availability and confidentiality. By constructing a network information graph and analyzing the relationship between individuals in the network based on graph theory, the effective protection of network information is realized. It improves the security of network information and reduces the risk of disclosure of private information.
基于k对称匿名算法的网络信息泄漏预防方法研究
为了防止已发布网络数据中隐私信息的泄露,提高网络信息的安全性,提出了一种基于k对称匿名算法的网络信息泄漏预防方法。分析网络中个体之间的关系,基于图论构建网络信息图,直观地反映网络中节点之间的关系。采用详细查询方法判断网络信息图中每个节点是否有对应的自保守等效节点,并进行简单对称处理,确保每个节点都有自保守等效节点。使用k对称匿名处理方法复制所有经过简单对称处理的节点,以便每个等价类集包含两个以上的节点。随着网络节点的增加,网络拓扑结构发生显著变化,降低了攻击者识别网络节点的概率。改进的k对称匿名算法仅对节点进行对称处理,处理结果适度最小。在降低系统开销的同时,网络拓扑也呈现出不规则的变化,使得攻击者难以发现原始图的拓扑结构,增加了网络信息破解的难度。实验结果表明,该方法能有效防止网络信息泄露,具有良好的信息可用性和保密性。通过构建网络信息图,并基于图论分析网络中个体之间的关系,实现了对网络信息的有效保护。它提高了网络信息的安全性,降低了私人信息泄露的风险。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
Egyptian Informatics Journal
Egyptian Informatics Journal Decision Sciences-Management Science and Operations Research
CiteScore
11.10
自引率
1.90%
发文量
59
审稿时长
110 days
期刊介绍: The Egyptian Informatics Journal is published by the Faculty of Computers and Artificial Intelligence, Cairo University. This Journal provides a forum for the state-of-the-art research and development in the fields of computing, including computer sciences, information technologies, information systems, operations research and decision support. Innovative and not-previously-published work in subjects covered by the Journal is encouraged to be submitted, whether from academic, research or commercial sources.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信