PDF (3.2 MB)
Collect
Submit Manuscript
Show Outline
Outline
Abstract
Keywords
References
Show full outline
Hide outline
Publishing Language: Chinese

Social network information leakage node probability prediction based on the EDLATrust algorithm

Weiyi ZHUXueqin ZHANG()Chunhua GU
School of Information Science and Engineering, East China University of Science and Technology, Shanghai 200237, China
Show Author Information

Abstract

Message forwarding is widely used in social network information systems. However, private information can be leaked without authorization from the information publisher. Privacy information leakage nodes need to be identified to eliminate such security risks. An estimator based distributed learning automata for trust inference (EDLATrust) is developed in this study to infer the trust level between non-directly connected nodes by reducing the number of convergence steps. The EDLATrust algorithm is combined with the XGBoost algorithm to identify privacy leakage in social network by using linear and group information transmission propagation models with three information dissemination characteristics. The algorithm predicts potential links in the information transmission chain and assists predicting information leakage points to improve the information dissemination security in social networks. Tests show that the model can effectively predict information leakage points in the information transmission chain for three real social network data sets to protect user privacy.

CLC number: TP393 Document code: A Article ID: 1000-0054(2022)02-0355-12

References

[1]

KIM Y A. An enhanced trust propagation approach with expertise and homophily-based trust networks[J]. Knowledge-Based Systems, 2015, 82: 20-28.

[2]

KIM Y A, SONG H S. Strategies for predicting local trust based on trust propagation in social networks[J]. Knowledge-Based Systems, 2011, 24(8): 1360-1371.

[3]

SHEKARPOUR S, KATEBI S D. Modeling and evaluation of trust with an extension in semantic web[J]. Journal of Web Semantics, 2010, 8(1): 26-36.

[4]

FERNÁNDEZ E. Learning automata-based CPU non-intensive calculation of dedicated and shared protected paths in bandwidth-guaranteed networks[J]. Computer Communications, 2017, 103: 130-140.

[5]

MORADABADI B, MEYBODI M R. Link prediction in weighted social networks using learning automata[J]. Engineering Applications of Artificial Intelligence, 2018, 70: 16-24.

[6]

GHAVIPOUR M, MEYBODI M R. Trust propagation algorithm based on learning automata for inferring local trust in online social networks[J]. Knowledge-Based Systems, 2018, 143: 307-316.

[7]

DAUD N N, HAMID S H A, SAADOON M, et al. Applications of link prediction in social networks: A review[J]. Journal of Network and Computer Applications, 2020, 166: 102716.

[8]

LIBEN-NOWELL D, KLEINBERG J. The link-prediction problem for social networks[J]. Journal of the American Society for Information Science and Technology, 2007, 58(7): 1019-1031.

[9]

LIU Y Y, ZHAO C L, WANG X J, et al. The degree-related clustering coefficient and its application to link prediction[J]. Physica A: Statistical Mechanics and Its Applications, 2016, 454: 24-33.

[10]

MUNIZ C P, GOLDSCHMIDT R, CHOREN R. Combining contextual, temporal and topological information for unsupervised link prediction in social networks[J]. Knowledge-Based Systems, 2018, 156: 129-137.

[11]

FU C B, ZHAO M H, FAN L, et al. Link weight prediction using supervised learning methods and its application to yelp layered network[J]. IEEE Transactions on Knowledge & Data Engineering, 2018, 30(8): 1507-1518.

[12]
CHEN T, GUESTRIN C. XGBoost: A scalable tree boosting system[C]// The 22nd ACM SIGKDD International Conference. New York, USA, 2016: 785-794.
[13]

UREN~A R, KOU G, DONG Y C, et al. A review on trust propagation and opinion dynamics in social networks and group decision making frameworks[J]. Information Sciences, 2019, 478: 461-475.

[14]

REZVANIAN A, RAHMATI M, MEYBODI M R. Sampling from complex networks using distributed learning automata[J]. Physica A: Statistical Mechanics and Its Applications, 2014, 396: 224-234.

[15]

GE H, JIANG W, LI S H, et al. A novel estimator based learning automata algorithm[J]. Applied Intelligence, 2015, 42(2): 262-275.

[16]

BASTAMI E, MAHABADI A, TAGHIZADEH E. A gravitation-based link prediction approach in social networks[J]. Swarm and Evolutionary Computation, 2019, 44: 176-186.

[17]
KIANINEJAD M, KABIRI P. A strategy for trust propagation along the more trusted paths[C]// 2018 3rd Conference on Swarm Intelligence and Evolutionary Computation. Bam, Iran, 2018: 1-6.
[18]

JIANG W J, WU J, LI F, et al. Trust evaluation in online social networks using generalized network flow[J]. IEEE Transactions on Computers, 2016, 65(3): 952-963.

Journal of Tsinghua University (Science and Technology)
Pages 355-366
Cite this article:
ZHU W, ZHANG X, GU C. Social network information leakage node probability prediction based on the EDLATrust algorithm. Journal of Tsinghua University (Science and Technology), 2022, 62(2): 355-366. https://doi.org/10.16511/j.cnki.qhdxxb.2021.22.018
Metrics & Citations  
Article History
Copyright
Return