A resource security protection method based on data graph, information graph and knowledge graph with definable security of input decision

A knowledge graph and resource security technology, applied in digital data protection, other database retrieval, other database indexing, etc., can solve the problem that data privacy protection has not yet been managed

Active Publication Date: 2019-09-24
HAINAN UNIV
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Resources are collected and used to create value, yet data privacy protections are not yet managed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A resource security protection method based on data graph, information graph and knowledge graph with definable security of input decision
  • A resource security protection method based on data graph, information graph and knowledge graph with definable security of input decision
  • A resource security protection method based on data graph, information graph and knowledge graph with definable security of input decision

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] The security of input decision is a definable resource security protection method based on data graph, information graph and knowledge graph, which is characterized in that the data DIK , Information DIK and Knowledge DIK The resources that exist in the form are organized and stored reasonably according to the storage cost and safety factor, and it is impossible to judge which layer of the resource should be stored on the map only by the resource type. The specific implementation steps are:

[0045] Step 1) corresponds to figure 1 In operation 001, take the value in Z for each element in X in turn to form a combination situation X={X 1i ,X 2j ,X 3k},i,j,k∈{1,2,3};

[0046] Step 2) corresponds to figure 1 In operation 002, for each situation, calculate the cost of transferring resources from the current situation to each situation in IPR (CostMT1) according to formula 1:

[0047] (1)

[0048] Step 3) corresponds to figure 1 In operation 003, take the value i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an input-determined resource security protection method with definable security and on the basis of a data graph, an information graph and a knowledge graph, provides interpretations of resource forms such as data, information and knowledge and conceptual representations of the data graph, the information graph and the knowledge graph, and belongs to the technical crossing field of distributed computing and software engineering. To maintain the security of resources, it cannot be judged in which layer of graph the resources need to be stored only according to resource types. According to the method, through calculations of resource search object type transfer price, resource storage space resource type transfer price and resource search price, the search of different types of the resources and the storage types are distributed reasonably, a resource storage scheme is determined according to the input of a resource owner, and the resource protection service is provided.

Description

technical field [0001] The present invention is a definable resource security protection method based on data map, information map and knowledge map with input-determined security. Resources in the form of data, information and knowledge are determined according to the comparison of resource storage cost and resource mining cost. On which layer of the graph storage architecture should be stored. It is mainly used to maintain the privacy and security of resources such as data, information and knowledge, and belongs to the interdisciplinary field of distributed computing and software engineering technology. Background technique [0002] Big data has been a high-frequency vocabulary in the scientific and technological circles for several years. However, the lack of privacy protection in the era of big data has also become a severe challenge for people. The collection and use of resources generates value, yet the protection of data privacy is not yet managed. Resource maintena...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/62G06F16/901
Inventor 段玉聪邵礼旭
Owner HAINAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products