Trust-Based Missing Link Prediction in Signed Social Networks with Privacy Preservation
With the development of mobile Internet, more and more individuals and institutions tend to express their views on certain things (such as software and music) on social platforms. In some online social network services, users are allowed to label users with similar interests as “trust” to get the in...
Main Authors: | , , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi-Wiley
2020-01-01
|
Series: | Wireless Communications and Mobile Computing |
Online Access: | http://dx.doi.org/10.1155/2020/8849536 |
id |
doaj-e3e190b3ab9b4950875b58e4c1544c08 |
---|---|
record_format |
Article |
spelling |
doaj-e3e190b3ab9b4950875b58e4c1544c082020-11-30T09:11:22ZengHindawi-WileyWireless Communications and Mobile Computing1530-86691530-86772020-01-01202010.1155/2020/88495368849536Trust-Based Missing Link Prediction in Signed Social Networks with Privacy PreservationHuaizhen Kou0Fan Wang1Chao Lv2Zhaoan Dong3Wanli Huang4Hao Wang5Yuwen Liu6School of Computer Science, Qufu Normal University, Rizhao, ChinaSchool of Computer Science, Qufu Normal University, Rizhao, ChinaChina Telecom Smart Home Competence Center, E-Surfing Smart Home Technology Co., Ltd, Nanjing, ChinaSchool of Computer Science, Qufu Normal University, Rizhao, ChinaSchool of Computer Science, Qufu Normal University, Rizhao, ChinaDepartment of Computer Science, Norwegian University of Science and Technology, Trondheim, NorwaySchool of Computer Science, Qufu Normal University, Rizhao, ChinaWith the development of mobile Internet, more and more individuals and institutions tend to express their views on certain things (such as software and music) on social platforms. In some online social network services, users are allowed to label users with similar interests as “trust” to get the information they want and use “distrust” to label users with opposite interests to avoid browsing content they do not want to see. The networks containing such trust relationships and distrust relationships are named signed social networks (SSNs), and some real-world complex systems can be also modeled with signed networks. However, the sparse social relationships seriously hinder the expansion of users’ social circle in social networks. In order to solve this problem, researchers have done a lot of research on link prediction. Although these studies have been proved to be effective in the unsigned social network, the prediction of trust and distrust in SSN has not achieved good results. In addition, the existing link prediction research does not consider the needs of user privacy protection, so most of them do not add privacy protection measures. To solve these problems, we propose a trust-based missing link prediction method (TMLP). First, we use the simhash method to create a hash index for each user. Then, we calculate the Hamming distance between the two users to determine whether they can establish a new social relationship. Finally, we use the fuzzy computing model to determine the type of their new social relationship (e.g., trust or distrust). In the paper, we gradually explain our method through a case study and prove our method’s feasibility.http://dx.doi.org/10.1155/2020/8849536 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Huaizhen Kou Fan Wang Chao Lv Zhaoan Dong Wanli Huang Hao Wang Yuwen Liu |
spellingShingle |
Huaizhen Kou Fan Wang Chao Lv Zhaoan Dong Wanli Huang Hao Wang Yuwen Liu Trust-Based Missing Link Prediction in Signed Social Networks with Privacy Preservation Wireless Communications and Mobile Computing |
author_facet |
Huaizhen Kou Fan Wang Chao Lv Zhaoan Dong Wanli Huang Hao Wang Yuwen Liu |
author_sort |
Huaizhen Kou |
title |
Trust-Based Missing Link Prediction in Signed Social Networks with Privacy Preservation |
title_short |
Trust-Based Missing Link Prediction in Signed Social Networks with Privacy Preservation |
title_full |
Trust-Based Missing Link Prediction in Signed Social Networks with Privacy Preservation |
title_fullStr |
Trust-Based Missing Link Prediction in Signed Social Networks with Privacy Preservation |
title_full_unstemmed |
Trust-Based Missing Link Prediction in Signed Social Networks with Privacy Preservation |
title_sort |
trust-based missing link prediction in signed social networks with privacy preservation |
publisher |
Hindawi-Wiley |
series |
Wireless Communications and Mobile Computing |
issn |
1530-8669 1530-8677 |
publishDate |
2020-01-01 |
description |
With the development of mobile Internet, more and more individuals and institutions tend to express their views on certain things (such as software and music) on social platforms. In some online social network services, users are allowed to label users with similar interests as “trust” to get the information they want and use “distrust” to label users with opposite interests to avoid browsing content they do not want to see. The networks containing such trust relationships and distrust relationships are named signed social networks (SSNs), and some real-world complex systems can be also modeled with signed networks. However, the sparse social relationships seriously hinder the expansion of users’ social circle in social networks. In order to solve this problem, researchers have done a lot of research on link prediction. Although these studies have been proved to be effective in the unsigned social network, the prediction of trust and distrust in SSN has not achieved good results. In addition, the existing link prediction research does not consider the needs of user privacy protection, so most of them do not add privacy protection measures. To solve these problems, we propose a trust-based missing link prediction method (TMLP). First, we use the simhash method to create a hash index for each user. Then, we calculate the Hamming distance between the two users to determine whether they can establish a new social relationship. Finally, we use the fuzzy computing model to determine the type of their new social relationship (e.g., trust or distrust). In the paper, we gradually explain our method through a case study and prove our method’s feasibility. |
url |
http://dx.doi.org/10.1155/2020/8849536 |
work_keys_str_mv |
AT huaizhenkou trustbasedmissinglinkpredictioninsignedsocialnetworkswithprivacypreservation AT fanwang trustbasedmissinglinkpredictioninsignedsocialnetworkswithprivacypreservation AT chaolv trustbasedmissinglinkpredictioninsignedsocialnetworkswithprivacypreservation AT zhaoandong trustbasedmissinglinkpredictioninsignedsocialnetworkswithprivacypreservation AT wanlihuang trustbasedmissinglinkpredictioninsignedsocialnetworkswithprivacypreservation AT haowang trustbasedmissinglinkpredictioninsignedsocialnetworkswithprivacypreservation AT yuwenliu trustbasedmissinglinkpredictioninsignedsocialnetworkswithprivacypreservation |
_version_ |
1715028106745479168 |