Privacy data hierarchical protection method

A technology for hierarchical protection and privacy data, applied in the field of information security, can solve problems such as not taking into account the degree of privacy sensitivity, and achieve the effect of achieving privacy and guaranteeing the realization

Active Publication Date: 2019-07-16
NANJING UNIV OF POSTS & TELECOMM
View PDF9 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] These models are very applicable, simple and convenient under certain conditions, and can also provide good privacy protection performance, but they treat all private data equally, and do not consider the issue of privacy sensitivity

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privacy data hierarchical protection method
  • Privacy data hierarchical protection method
  • Privacy data hierarchical protection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The technical solutions of the present invention will be further described below with reference to the accompanying drawings. In the following embodiments, only medical data is used as an example to describe the technical solution. Those skilled in the art can understand that the described technical solution can be applied to other privacy-sensitive data by appropriate conversion or modification.

[0024] The medical nursing system is faced with the problem of how to provide good nursing services without excessively infringing on patients' privacy. At the same time, it is also necessary to take into account the protection of patients' privacy and prevent the leakage of patients' private data to the outside world. The above problems put forward specific requirements on the quality of life of patients. On the one hand, patients, as users, receive services from the nursing system to improve their health-related quality of life (HRQoL, Health-Related Quality of Life), and on...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a privacy data hierarchical protection method. Most of existing models are similar to all private data, the problem of privacy sensitivity degree is not considered, the privacydegree is regarded as a measure in the privacy protection process, the sensitivity level of the privacy data is calculated, and the occurrence frequency of the data with the high sensitivity degree islimited to a low value, so that higher-degree protection is provided for the privacy data with the high sensitivity degree. Furthermore, starting from the perspective of the user, the income which can be obtained by the user is directly calculated after the privacy is protected in a grading manner, and the grading protection result of the privacy is associated with the service quality and privacyloss of the user, so that the user can obtain satisfactory service from the system, and meanwhile, the data privacy of the user is guaranteed.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a hierarchical protection method for private data. Background technique [0002] At present, the research on data privacy protection mainly includes the research of privacy protection function module, data anonymization release, differential privacy protection method, application of encryption algorithm and so on. [0003] Privacy protection can be roughly divided into two categories: The grammar protection and the semantic protection. Anonymization technology is one of grammar privacy protection technologies. Anonymization technology has been well applied in many fields. K-anonymity is a kind of data mining algorithm. Since attackers usually identify private information such as user identity by attacking semi-identity attribute groups, the basic requirement of k-anonymization technology is that any group of data in all data are indistinguishable from ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62
CPCG06F21/6254G06F2221/2107
Inventor 郭永安达庆佶王安之刘晓庆朱洪波杨龙祥
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products