Journal of Frontiers of Computer Science and Technology ›› 2021, Vol. 15 ›› Issue (2): 233-248.DOI: 10.3778/j.issn.1673-9418.2004007

• Science Researches • Previous Articles     Next Articles

Social Network Information Diffusion Method with Support of Privacy Protection

GAO Ang, LIANG Ying, XIE Xiaojie, WANG Zisen, LI Jintao   

  1. 1. Institute of Computing Technology, Chinese Academy of Sciences, Beijing 100190, China
    2. School of Computer Science and Technology, University of Chinese Academy of Sciences, Beijing 100049, China
    3. Beijing Key Laboratory of Mobile Computing and New Devices, Beijing 100190, China
  • Online:2021-02-01 Published:2021-02-01



  1. 1. 中国科学院 计算技术研究所,北京 100190
    2. 中国科学院大学 计算机科学与技术学院,北京 100049
    3. 移动计算与新型终端北京市重点实验室,北京 100190


Current relevant researches on influence propagation of social networks focus on how to use a small size seed set to produce the highest impact in social networks, and they often regard forwarding as the only way of information diffusion, ignoring other ways of information diffusion. For example, users can disseminate information by publishing a message with similar content to the message they see. This way of diffusion (referred to as mentioning) is difficult to track, and it is easy to cause the risk of privacy disclosure. Aiming at the causes of privacy leakage in social networks, this paper defines a social network information diffusion model supporting mentioning relationship, and presents a social network information diffusion algorithm LocalGreedy, which can ensure messages sent by users are not leaked to the specified, maximize the influence of the propagation and balance the contradiction between privacy protection and message propagation. This paper proposes an incremental strategy to construct a seed set while reducing time complexity caused by enumeration. After that, giving the calculating method on local influence subgraph, the influence generated by seed set propagation can be quickly estimated. When estimating the influence, a calculation method for deriving the upper limit of privacy leakage probability is proposed to ensure the privacy protection constraint limit and avoid time complexity caused by the Monte Carlo simulation. The crawled Sina Weibo dataset is used to carry out experimental verification and example analysis. The experimental results show that the proposed method is effective.

Key words: information diffusion model, diffusion network inference, influence maximization, privacy protection, social networks



关键词: 信息传播模型, 传播网络推断, 影响力最大化, 隐私保护, 社交网络