پديد آورنده :
عبدالله، مليحه
عنوان :
حفظ حريم خصوصي در شبكه هاي اجتماعي با استفاده از گمنام سازي بر اساس خوشه بندي
مقطع تحصيلي :
كارشناسي ارشد
گرايش تحصيلي :
رياضي كاربردي
محل تحصيل :
اصفهان: دانشگاه صنعتي اصفهان، دانشكده علوم رياضي
صفحه شمار :
دوازده،59ص.: مصور
يادداشت :
ص.ع. به فارسي و انگليسي
استاد راهنما :
بهناز عمومي
استاد مشاور :
رامين جوادي
توصيفگر ها :
تعميم سلسله مراتبي- پايه , تعميم يال برون خوشه اي , گمنام سازي داده هاي رابطه اي , گمنام سازي شبكه هاي اجتماعي
استاد داور :
غلامرضا اميدي، محسن جان نثاري
تاريخ ورود اطلاعات :
1395/09/02
چكيده انگليسي :
Preserving the Privacy on Social Networks by Clustering Based Anonymization Malihe Abdelah m abdelah@math iut ac ir September 18 2016 Department of Mathematical Sciences Isfahan University of Technology Isfahan 84156 83111 Iran Supervisor Dr Behnaz Omoomi bomoomi@cc iut ac ir Advisor Dr Ramin Javadi rjavadi@cc iut ac ir 2010 MSC 91C20 05C90 Keywords Social Network Privacy Preserving Anonymous Graph Theory Clustering AbstractIn recent years social networks have made signi cant development and are spreading rapidly A socialnetwork can be modeled as a graph So that the vertices of the graph represent the people in networkand the edges represent the relationships between entities in the social network This modeling becaused to the graph theory has been widely considered in the analysis of social networks Social networks analysis makes collect a lot of data sources including individuals and their relation ships in the network that this information is a valuable resource for researchers in various elds including social psychology sociology statistics geography economics market research and so on On the other hand the publication of these data sources can be a threat to users privacy on a socialnetwork So before the release of data for social network research purposes require that data beanonymous Anonymization is a very important process in order to ensure that the social networkdata publication cause not violate users privacy A social network is modeled as a graph with vertices and edges by considering three aspects Firstaspect is to identifying the privacy information which may be under attack Privacy is modeleddepending on the problem de nition accordingly where di erent privacy preservation methods areused to model Some of them are as vertex existence vertex properties sensitive vertex labels linkrelationship link weight sensitive edge labels graph metrics and so on
استاد راهنما :
بهناز عمومي
استاد مشاور :
رامين جوادي
استاد داور :
غلامرضا اميدي، محسن جان نثاري