Author
Listed:
- Tinghuai Ma
(School of Computer & Software, Nanjing University of Information Science and Technology, Nanjing 210044, China)
- Yuming Su
(School of Computer & Software, Nanjing University of Information Science and Technology, Nanjing 210044, China)
- Huan Rong
(School of Computer & Software, Nanjing University of Information Science and Technology, Nanjing 210044, China)
- Yurong Qian
(College of Information Science and Engineering, Xinjiang University, Urumqi 830008, China)
- Najla Al-Nabhan
(Department Computer Science, King Saud University, Riyadh 11362, Saudi Arabia)
Abstract
With the rapid development of social networks, personal privacy leakage has become more and more serious. A social network is a shared platform. Resources in a social network may be shared by multiple owners. In order to prevent privacy leakage, each owner assigns a corresponding privacy protection strategy. For the same shared contents, integrating the privacy protection strategies of all owners is the key problem for sharing. This paper proposes a rule fusion method of privacy protection for the co-ownership of data shared in social networks. First, the content of the protection is defined according to different privacy requirements. Second, this paper uses predicate logic formulas to abstract the natural language-based description of privacy protection and further provides a logical model of privacy protection rules. Third, this paper gives the definition of privacy protection heterogeneous rules and provides a rule fusion algorithm to ensure no conflict exists among these rules. The experimental results show that the proposed rule-based fusion method of privacy protection strategy performs at a higher level than the privacy protection strategy fusion.
Suggested Citation
Tinghuai Ma & Yuming Su & Huan Rong & Yurong Qian & Najla Al-Nabhan, 2022.
"Rule Fusion of Privacy Protection Strategies for Co-Ownership Data Sharing,"
Mathematics, MDPI, vol. 10(6), pages 1-14, March.
Handle:
RePEc:gam:jmathe:v:10:y:2022:i:6:p:969-:d:773874
Download full text from publisher
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jmathe:v:10:y:2022:i:6:p:969-:d:773874. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
We have no bibliographic references for this item. You can help adding them by using this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .
Please note that corrections may take a couple of weeks to filter through
the various RePEc services.