Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Typification resource oriented information privacy protection method under IoT (Internet of things) environment

A privacy protection and resource technology, applied in the intersection of distributed computing and software engineering technology, can solve problems such as storage and computing costs

Inactive Publication Date: 2018-09-04
HAINAN UNIVERSITY
View PDF3 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

From the perspective of resource security, when protecting user privacy resources, some of the resources are important and all of them are encrypted, which consumes a lot of storage and computing costs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Typification resource oriented information privacy protection method under IoT (Internet of things) environment
  • Typification resource oriented information privacy protection method under IoT (Internet of things) environment
  • Typification resource oriented information privacy protection method under IoT (Internet of things) environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021]The present invention is an information privacy protection method for typed resources in an IoT environment, which is characterized in that in the provided information privacy protection method, user information privacy resources are distinguished as information in the form of links, information in the form of aggregation, and information in the form of links The characteristic is that there is a complete path, including the information characterized by no branch path and the information characterized by branch path. For the privacy protection of user information in the form of links and aggregation, the fusion solution has the following steps:

[0022] Step 1) corresponds to figure 1 In 001, according to the existing typed privacy resources, construct a data map, information map and knowledge map processing framework, and store the link form information and the aggregate form information in the information map in one-dimensional arrays;

[0023] Step 2) corresponds to ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a typification resource oriented information privacy protection method under an IoT (Internet of things) environment, and belongs to the field of distribution calculation and software engineering science technology. The method is characterized in that typification resources are divided, user privacy resources are divided into data privacy, information privacy and knowledgeprivacy, and an information privacy protection method specific for users is put forward by aiming at the information privacy on the basis of a data atlas, an information atlas and a knowledge atlas framework. The method is characterized in that the information privacy resoruces of a user is divided into link form information and aggregation form information, then, information privacy protection isindependently carried out, and node information is converted into data or knowledge. The method is characterized in that the link form information comprises information with a branched path and without a branched path, and the aggregation form information comprises aggregation with an equal degree and aggregation with an unequal degree. The method is characterized in that the user inputs an amount of driven hidden nodes, and an information exposure degree is evaluated by a privacy degree.

Description

technical field [0001] The invention is an information privacy protection method in an IoT environment oriented to typed resources, and belongs to the interdisciplinary field of distributed computing and software engineering technology. Background technique [0002] There are many ways to protect personal privacy on the Internet. For example, email can be encrypted (via S / MIME or PGP), and anonymous proxies or anonymous networks (like I2P and Tor) can be used to prevent ISPs from knowing which sites to visit and who to communicate with. Mobile devices are increasingly convenient for location tracking in privacy and location-based services. This creates user privacy concerns. The user's location and preferences constitute personal information. Their improper use violates the privacy of users. With the vigorous development of Internet of Things technology, the scale of privacy resources is rapidly expanding. Many challenges have been exposed in the storage, processing, an...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62
CPCG06F21/6245
Inventor 段玉聪宋正阳
Owner HAINAN UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products