Multi-view clustering and mining oriented personal privacy protection method

A cluster mining and privacy protection technology, applied in the field of information security, can solve problems such as the need to improve the degree of personalization, large information loss, and privacy security issues that have not been involved in cluster mining

Active Publication Date: 2018-02-13
HARBIN ENG UNIV
View PDF12 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] (1) Existing algorithms are almost designed for the needs of data release, and have not been involved in privacy and security issues that may be caused by cluster mining;
[0008] (2) The existing personalized privacy protection algorithm does not comprehensively consider the differences in the privacy awareness of users and the importance of different attributes, the degree of personalization needs to be improved, and the information loss is relatively large

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-view clustering and mining oriented personal privacy protection method
  • Multi-view clustering and mining oriented personal privacy protection method
  • Multi-view clustering and mining oriented personal privacy protection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] For the original data model A=(A 1 ,A 2 ,...,A n ) under a piece of data is expressed as d=(a 1 ,a 2 ,...,a n ), where a i is the attribute of the data, if i exists, (i=1,2,...,n) makes a i If it is sensitive and does not want others to know, then this record d is called a piece of private data, and the quantitative expression of the sensitivity of the data producer to the private data item is called the degree of privacy. Given the original data pattern A=(A 1 ,A 2 ,...,A n ), the corresponding privacy mode is S=(S 1 ,S 2 ,...,S n ), then the privacy data model is defined as sequence pair , and a piece of privacy data under this model is expressed as n recombination d=(d 1 , d 2 ,...,d n ), where d i =i ,s i > is an ordered binary group, a i for attribute A i Corresponding to a raw data value, s i for a i corresponding degree of privacy. another note d j =(a j1 ,a j2 ,...,a jn ) is the original data mode A=(A 1 ,A 2 ,...,A n ) of the jth tup...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a multi-view clustering and mining oriented personal privacy protection method, and belongs to the technical field of information safety. The multi-view clustering and mining oriented personal privacy protection method has the advantages that privacy partial-order topological classification algorithms (PT, privacy topology) are proposed, privacy relations are defined at first for representing sensitivity difference of different privacy data, privacy partial-order sets are constructed for representing the sensitivity difference of the different privacy data, topologicalclassification algorithms are accordingly designed for the privacy data, and privacy line order sets are solved; multi-view clustering is carried out on views of original data, privacy degrees, tuplesensitivity, the privacy line order sets and the like for multiple views of the privacy data; clustering oriented personal anonymity algorithms (PPOC, personal privacy oriented classtering) are proposed, personal protection operation can be carried out on different clusters by variable k-anonymity strategies by the aid of multi-view clustering oriented privacy protection algorithms which can meetpersonal requirements, and personal protection operation with different exertion degrees can be carried out on different tuples in the same clusters by the variable k- anonymity strategies by the aidof the multi-view clustering oriented privacy protection algorithms.

Description

technical field [0001] The invention relates to a personalized privacy protection method for multi-view cluster mining, and relates to the technical field of information security. Background technique [0002] With the development of digital technologies such as the Internet, the Internet of Things, and smart cities, various data collection devices such as sensors and mobile terminals store various information about human clothing, food, housing, and transportation in digital form, thus giving birth to the era of big data. For the first time, data, as a resource, has received great attention from social entities such as governments, enterprises, and academia. [0003] However, in the process of data use, personal privacy information may be leaked. In the process of discovering the potential value of data, how to protect the privacy of individuals, especially how to avoid privacy leakage caused by data mining, is a key issue that data science needs to solve urgently. Privat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/62G06K9/62
CPCG06F21/6254G06F18/23G06F18/24
Inventor 徐东李贤张子迎孟宇龙张朦朦姬少培王岩俊吕骏方一成王杰
Owner HARBIN ENG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products