Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Big-data-oriented privacy information release exposure chain discovery method

A technology for privacy information and discovery methods, which can be used in digital data protection, electronic digital data processing, other database retrieval, etc., and can solve problems such as difficult privacy data protection.

Active Publication Date: 2017-04-19
四川省明厚天信息技术股份有限公司
View PDF3 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since the traditional information security technology cannot be realized in the multi-party computing process, that is, the user's private data must be in plain text during the computing process, it is difficult to protect the private data in interactive and shared computing using traditional information security technology.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Big-data-oriented privacy information release exposure chain discovery method
  • Big-data-oriented privacy information release exposure chain discovery method
  • Big-data-oriented privacy information release exposure chain discovery method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0070] The present invention will be described in further detail below in conjunction with the accompanying drawings.

[0071] Image 6 It is a method flowchart of an embodiment of the present invention. like Image 6 As shown, an embodiment method of the present invention uses ontology mapping as a theoretical basis, uses ontology tree mapping for privacy data similarity measurement, and assumes that there is a context-level semantic relationship between the user privacy requirement ontology tree and the service privacy description ontology tree consistency. If the corresponding level of a node sq in the requirement ontology tree is i in the description ontology tree, then its subclass node or its attributes must be in the i+αth level of the description ontology tree.

[0072] figure 2 It is a schematic diagram of the hierarchical correspondence in the ontology tree of an embodiment of the present invention. like figure 2 As shown, the left is the requirement ontology...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a big-data-oriented privacy information release exposure chain discovery method which is based on the theory of ontology mapping. The method comprises the following steps: (1) measuring and calculating the definition similarity simd, attribute similarity simT and structure similarity sims of privacy data; (2) measuring and calculating the exposure cost of the privacy data through an exposure vector of the privacy data; (3) acquiring the characteristic attribute of a privacy data information exposure chain through measurement and calculation of the definition similarity and exposure cost of the privacy data; and (4) discovering a privacy exposure chain in data released by a user according to the characteristic of the exposure chain, thus protecting the safety in the process of user privacy data information release. Most of the existing privacy protection technologies use a way of encryption or anonymity. However, privacy data must be plaintext when participating in cloud computing. The method is a privacy data release method in the computing process, and can effectively prevent user's privacy data from being leaked in the process of multi-party service computing.

Description

technical field [0001] The invention belongs to the technical field of privacy data security protection for big data users, and relates to a discovery method for big data-oriented privacy exposure chains, in particular to a discovery method for big data-oriented private information publishing exposure chains. Background technique [0002] Big data refers to a collection of data that cannot be captured, managed, and processed by conventional software tools within an acceptable time frame, and has the characteristics of large quantity, variety, and real-time changes. According to statistics, an average of 2 million users use Google search per second, Facebook users share more than 4 billion information every day, and Twitter handles more than 340 million tweets every day; and the annual data volume is growing exponentially, of which 3 / 4 are contributed by individuals as they create or move digital files, e.g. a typical American office worker contributes 1.8 million MB of data...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08G06F17/30G06F21/60G06F21/62
CPCG06F16/90G06F21/602G06F21/6245H04L63/0428H04L67/10
Inventor 柯昌博肖甫
Owner 四川省明厚天信息技术股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products