• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Jiang Huowen, Zeng Guosun, Hu Kekun. A Graph-Clustering Anonymity Method Implemented by Genetic Algorithm for Privacy-Preserving[J]. Journal of Computer Research and Development, 2016, 53(10): 2354-2364. DOI: 10.7544/issn1000-1239.2016.20160435
Citation: Jiang Huowen, Zeng Guosun, Hu Kekun. A Graph-Clustering Anonymity Method Implemented by Genetic Algorithm for Privacy-Preserving[J]. Journal of Computer Research and Development, 2016, 53(10): 2354-2364. DOI: 10.7544/issn1000-1239.2016.20160435

A Graph-Clustering Anonymity Method Implemented by Genetic Algorithm for Privacy-Preserving

More Information
  • Published Date: September 30, 2016
  • Clustering anonymity is a typical kind of privacy preservation scheme for social network data-publishing, which is based on graph-clustering. Graph-clustering is a kind of NP-hard combinatorial optimization problem and it’s appropriate to use search optimization algorithm. While, the existing graph-clustering anonymity methods are lack of heuristic search algorithm. Therefore, in this paper, a graph-clustering anonymity method implemented by genetic algorithm is proposed. Firstly, the population is initialized by pre-dividing the nodes based on greedy clustering strategy. Then the individual fitness function is defined based on the relation fitting theory. Next, the crossover operator of multi-point dislocation and the mutation operator of exchanging gene-bits are designed respectively, according to individual’s coding feature. The model we presented takes the information of both structure and attribute of nodes into consideration, and the global searching of genetic algorithm can guarantee good quality for graph-clustering. Therefore, the method can provide great privacy preservation. Experimental results also demonstrate that our method is effective in improving the clustering quality and reducing the loss of information.
  • Related Articles

    [1]Zhang Qiang, Ye Ayong, Ye Guohua, Deng Huina, Chen Aimin. k-Anonymous Data Privacy Protection Mechanism Based on Optimal Clustering[J]. Journal of Computer Research and Development, 2022, 59(7): 1625-1635. DOI: 10.7544/issn1000-1239.20210117
    [2]Xu Yuming, Zhu Ningbo, Ouyang Aijia, and Li Kenli. A Double-Helix Structure Genetic Algorithm for Task Scheduling on Heterogeneous Computing Systems[J]. Journal of Computer Research and Development, 2014, 51(6): 1240-1252.
    [3]Hu Xinping, He Yuzhi, Ni Weiwei, and Zhang Yong. A Privacy-Preserving Data Publishing Method Based on Genetic Algorithm with Roulette Wheel[J]. Journal of Computer Research and Development, 2012, 49(11): 2432-2439.
    [4]Shen Haihua, Wang Pengyu, Wei Wenli, Guo Qi. A Coverage Directed Test Generation Platform for Microprocessors Using Genetic Approach[J]. Journal of Computer Research and Development, 2009, 46(10): 1612-1625.
    [5]Song Jinling, Liu Guohua, Huang Liming, Zhu Caiyun. Algorithms to Find the Set of Relevant Views and Quasi-Identifiers for K-Anonymity Method[J]. Journal of Computer Research and Development, 2009, 46(1): 77-88.
    [6]Li Qinghua, Yang Shida, and Ruan Youlin. Improving Optimization for Genetic Algorithms Based on Level Set[J]. Journal of Computer Research and Development, 2006, 43(9): 1624-1629.
    [7]Yi Yeqing, Lin Yaping, Lin Mu, Li Xiaolong, Wang Lei. Blind Source Separation Based on Genetic Algorithm[J]. Journal of Computer Research and Development, 2006, 43(2): 244-252.
    [8]Wang Fei, Liu Dayou, Wang Songxin. Research on Incremental Learning of Bayesian Network Structure Based on Genetic Algorithms[J]. Journal of Computer Research and Development, 2005, 42(9): 1461-1466.
    [9]Han Xuedong, Hong Bingrong, and Meng Wei. An Immune Genetic Algorithm Based on Vaccine Autonomous Obtaining and Updating[J]. Journal of Computer Research and Development, 2005, 42(5): 740-745.
    [10]Zhang Min, Lin Chuan, and Ma Shaoping. Dynamic Parameter Learning Approach for Information Retrieval with Genetic Algorithm[J]. Journal of Computer Research and Development, 2005, 42(3).

Catalog

    Article views (1373) PDF downloads (682) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return