{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,8]],"date-time":"2024-08-08T00:07:32Z","timestamp":1723075652171},"reference-count":20,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2021,6,7]],"date-time":"2021-06-07T00:00:00Z","timestamp":1623024000000},"content-version":"vor","delay-in-days":157,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Wireless Communications and Mobile Computing"],"published-print":{"date-parts":[[2021,1]]},"abstract":"As people\u2019s awareness of the issue of privacy leakage continues to increase, and the demand for privacy protection continues to increase, there is an urgent need for some effective methods or means to achieve the purpose of protecting privacy. So far, there have been many achievements in the research of location\u2010based privacy services, and it can effectively protect the location privacy of users. However, there are few research results that require privacy protection, and the privacy protection system needs to be improved. Aiming at the shortcomings of traditional differential privacy protection, this paper designs a differential privacy protection mechanism based on interactive social networks. Under this mechanism, we have proved that it meets the protection conditions of differential privacy and prevents the leakage of private information with the greatest possibility. In this paper, we establish a network evolution game model, in which users only play games with connected users. Then, based on the game model, a dynamic equation is derived to express the trend of the proportion of users adopting privacy protection settings in the network over time, and the impact of the benefit\u2010cost ratio on the evolutionarily stable state is analyzed. A real data set is used to verify the feasibility of the model. Experimental results show that the model can effectively describe the dynamic evolution of social network users\u2019 privacy protection behaviors. This model can help social platforms design effective security services and incentive mechanisms, encourage users to adopt privacy protection settings, and promote the deployment of privacy protection mechanisms in the network.<\/jats:p>","DOI":"10.1155\/2021\/1181129","type":"journal-article","created":{"date-parts":[[2021,6,7]],"date-time":"2021-06-07T21:20:22Z","timestamp":1623100822000},"update-policy":"http:\/\/dx.doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Association Analysis of Private Information in Distributed Social Networks Based on Big Data"],"prefix":"10.1155","volume":"2021","author":[{"ORCID":"http:\/\/orcid.org\/0000-0003-1514-208X","authenticated-orcid":false,"given":"Dongning","family":"Jia","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0001-5011-7897","authenticated-orcid":false,"given":"Bo","family":"Yin","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-7594-3842","authenticated-orcid":false,"given":"Xianqing","family":"Huang","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2021,6,7]]},"reference":[{"key":"e_1_2_9_1_2","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2016.2599873"},{"key":"e_1_2_9_2_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-013-0344-8"},{"key":"e_1_2_9_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2016.2539165"},{"key":"e_1_2_9_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2015.2430819"},{"key":"e_1_2_9_5_2","doi-asserted-by":"publisher","DOI":"10.1145\/2043164.2018481"},{"key":"e_1_2_9_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2017.2776350"},{"key":"e_1_2_9_7_2","doi-asserted-by":"publisher","DOI":"10.1137\/090771806"},{"key":"e_1_2_9_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2443795"},{"key":"e_1_2_9_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2012.120"},{"key":"e_1_2_9_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2453481"},{"key":"e_1_2_9_11_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2017.08.063"},{"key":"e_1_2_9_12_2","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2014.0466"},{"key":"e_1_2_9_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2018.2842221"},{"key":"e_1_2_9_14_2","doi-asserted-by":"publisher","DOI":"10.14778\/2732269.2732274"},{"key":"e_1_2_9_15_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-010-0311-2"},{"key":"e_1_2_9_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2012.97"},{"key":"e_1_2_9_17_2","doi-asserted-by":"publisher","DOI":"10.2200\/S00549ED1V01Y201311SPT008"},{"key":"e_1_2_9_18_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2017.02.008"},{"key":"e_1_2_9_19_2","doi-asserted-by":"publisher","DOI":"10.1145\/2821512"},{"key":"e_1_2_9_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2016.2604383"}],"container-title":["Wireless Communications and Mobile Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2021\/1181129.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2021\/1181129.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2021\/1181129","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T13:53:00Z","timestamp":1723038780000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2021\/1181129"}},"subtitle":[],"editor":[{"given":"Yuanpeng","family":"Zhang","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,1]]},"references-count":20,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,1]]}},"alternative-id":["10.1155\/2021\/1181129"],"URL":"https:\/\/doi.org\/10.1155\/2021\/1181129","archive":["Portico"],"relation":{},"ISSN":["1530-8669","1530-8677"],"issn-type":[{"type":"print","value":"1530-8669"},{"type":"electronic","value":"1530-8677"}],"subject":[],"published":{"date-parts":[[2021,1]]},"assertion":[{"value":"2021-04-29","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-05-21","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-06-07","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}