Information privacy protection method based on data map, information map and knowledge map

A technology of knowledge graph and privacy protection, applied in the intersection of distributed computing and software engineering, it can solve the problem that it is difficult to effectively support data layer, query, abstraction, privacy addition and deletion cannot be carried out effectively, and there is no distinction between typed resources, etc. problems, to achieve the effect of enhancing integrity, eliminating redundancy, and enhancing consistency

Inactive Publication Date: 2018-11-13
HAINAN UNIVERSITY
View PDF6 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Technical problem: The existing demand modeling method does not distinguish typed resources, and various privacy resources are intertwined, it is difficult to effectively support query, abstraction

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information privacy protection method based on data map, information map and knowledge map
  • Information privacy protection method based on data map, information map and knowledge map
  • Information privacy protection method based on data map, information map and knowledge map

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] The specific process of an information privacy protection method based on data graph, information graph and knowledge graph is as follows:

[0049] Step 1) corresponds to figure 1 As shown in 001, according to the needs of users, a framework based on data graphs, information graphs, and knowledge graphs is established;

[0050] Step 2) correspond to figure 1 As shown in 002, according to formula 1, the privacy level L of information privacy resources Privacy Determine the sequence of requirement description analysis;

[0051] Step 3) correspond to figure 1 As shown in 003, combine formula 2 and algorithm 1 to analyze the feasibility of privacy requirement description;

[0052] Step 4) correspond to figure 1 As shown in 004, combine formula 3 and algorithm 2 to analyze the consistency of privacy requirement description;

[0053] Step 5) correspond to figure 1 As shown in 005, combine formula 4 and algorithm 3 to analyze the redundancy of the privacy requirement de...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a typed resource demand modeling and information resource privacy protection method based on a data map, an information map and a knowledge map, and belongs to the field of intersection of distributed calculation and software engineering. The typed resource demand modeling and information resource privacy protection method is mainly used for carrying out feasibility analysis, integrity analysis, consistency analysis and redundancy analysis on a demand of a user and extracting corresponding data stream, information stream, knowledge stream and control stream in each step of analysis to map to the data map, the information map and the knowledge map. Then, on the basis of the demand of the user, information resources are classified into implicit and explicit cases according to existence of the information resources in a search space; and for implicit and explicit information privacy resources, the information privacy resources are converted into other types of privacy resources according to a sequence of influence sizes and all the related typed privacy resources are stored into a security space to carry out protection.

Description

technical field [0001] The invention is an information privacy protection method based on data graph, information graph and knowledge graph. It is mainly used for feasibility analysis, consistency analysis, redundancy analysis and integrity analysis of user needs, and extracts the corresponding data flow, information flow, knowledge flow and control flow mapping to the data graph in each step of analysis , on the information graph and knowledge graph. Then according to the needs of users, information resources are classified into implicit and explicit situations according to their existence in the search space for protection. It belongs to the intersection field of distributed computing and software engineering. Background technique [0002] Knowledge graphs have emerged as a powerful tool for representing knowledge in the form of labeled directed graphs and giving semantics to textual information. Compared with UML classes, the knowledge graph has richer natural semantic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/62G06N5/02
CPCG06F21/6245G06N5/02
Inventor 段玉聪张欣悦宋正阳唐朝胜曹春杰
Owner HAINAN UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products