Protecting method for correlated privacy

A privacy protection and privacy technology, applied in the information field, can solve the complex problems of related privacy protection of user privacy and group privacy protection, and cannot solve the problem of related privacy protection, so as to achieve the effect of protecting privacy rights and facilitating review

Inactive Publication Date: 2014-01-01
BEIJING UNIV OF POSTS & TELECOMM
View PDF0 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] For public information, the protection of association privacy is more complex and challenging than the protection of individual privacy and group privacy
The general methods of encryption and isolation cannot solve the problem of protecting the associated privacy, so a new method or strategy

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Protecting method for correlated privacy
  • Protecting method for correlated privacy
  • Protecting method for correlated privacy

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046]The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0047] In order to illustrate "a method for protecting associated privacy", an example of "associated privacy protection for user B's statistical calculation of user A's storage capacity" is given here. The specific process of this example is as follows Figure 4 shown.

[0048] ●Data use authorization stage: User B submits a data access request to user A through the user data use authorization module, and user A provides data that authorizes use...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a protecting method for correlated privacy. The protecting method is applied to correlated privacy protection in cloud computing systems, and comprises five modules including data use automation, data use log, privacy protection audit, privacy protection regulation and user data access control. By the protecting method, functions such as authorized access of user data, access control, data use log and privacy protection audit can be completed, and the objectives such as authorized access of user privacy, transparency and reliability of access and publication and guaranteed privacy right are achieved.

Description

technical field [0001] The invention relates to a method for protecting associated privacy to protect individual and group privacy in current big data and cloud computing services, and belongs to the field of information technology. Background technique [0002] Search engines, microblogs, community websites and other services are based on user data, but services such as microblogs, community websites, and online disks gather a large amount of personal private data, which we call privacy. Privacy is a kind of personal information that the party does not want others to know or is inconvenient for others to know, personal private affairs that the party does not want others to interfere with or is inconvenient for others to interfere with, and personal domains that the party does not want others to intrude or inconvenient for others to intrude. [0003] In services such as Weibo, community websites, and online disks, users have three types of data: non-public data, shared data,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/62
CPCG06F21/6245G06F2221/2141
Inventor 陆月明陈贤
Owner BEIJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products