Cloud platform privacy protection method based on frequent item retrieval

A privacy protection and frequent item technology, applied in the field of cloud security, it can solve problems such as failure to consider sensitive attribute associations, loss of data utility, and inability to prevent speculation, so as to reduce the risk of data leakage, improve utility, and ensure data security.

Inactive Publication Date: 2014-10-29
WUHAN UNIV OF TECH
View PDF4 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Most of the existing privacy protections are aimed at protecting sensitive information, without considering the association between sensitive attributes and specific e

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud platform privacy protection method based on frequent item retrieval

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0025] The present invention will be further described in detail below with reference to the drawings and specific embodiments.

[0026] Such as figure 1 , The invention is based on the frequent item retrieval cloud platform differential privacy protection method, including the following steps:

[0027] Step S100, extract the frequent itemsets of the data according to the association rule algorithm, the specific steps are:

[0028] Step S101: According to the set of items in the data, the size of the data set, etc., and the needs of the user who uses the data, a relatively reasonable minimum support is set as a comparison standard for the support. Perform component analysis on the original item set, sort the items with low frequency, and use the remaining items as the first candidate set.

[0029] Step S102: On the hadoop cloud platform, use MapReduce technology to process the original data set and divide it into a sequence of key-value pairs. On other nodes, use MapReduce to proces...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a cloud platform privacy protection method based on frequent item retrieval. The cloud platform privacy protection method comprises the steps of extracting a frequent item set of data according to an association rule algorithm; establishing a frequent item model library by performing parallel retrieval on multiple key words; sorting retrieval results by means of a parallel distributed sorting algorithm to find sensitive records; performing difference privacy protection on the sensitive records on a cloud platform through a clustering algorithm. According to conditions of frequent items of the data, the sensitive records revealing user information are retrieved, and difference privacy protection is performed on the sensitive records in a targeted mode. Therefore, relevant sensitive information cannot be speculated according to known non-sensitive information. By means of the cloud platform privacy protection method based on frequent item retrieval, the sensitive records are protected only, other information contents are not affected, therefore, data leakage risk is reduced while effectiveness of published data is increased, and safety of the data on the cloud platform is ensured.

Description

technical field [0001] The invention relates to the field of cloud security, in particular to a privacy protection method for a cloud platform based on frequent item retrieval. Background technique [0002] The privacy protection method is a data protection method proposed along with the data application and determined by the actual application. It was first used in the field of statistics. Generally, the protection of data privacy at the lower application level is achieved by introducing statistical models and probability models. For higher-level data applications, the privacy protection technology for data mining is mainly used to protect the privacy of applications according to the characteristics of different data mining operations. The privacy protection methods that can be used in various applications are generally implemented by data release technology based on privacy protection. [0003] At present, in the face of big data, the data privacy protection methods on t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/60G06F17/30
CPCG06F16/2465G06F21/6245
Inventor 钟珞杨光李琳唐琨皓
Owner WUHAN UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products