Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Privacy information protection method based on K-means clustering

A privacy information, K-means technology, applied in the field of information security, can solve the problems of endangering personal security, not revealing additional information, loss of users' personal property, etc.

Active Publication Date: 2019-09-13
JINAN UNIVERSITY
View PDF6 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the K-means clustering scheme in social participatory sensing, there are some security and privacy issues in the outsourcing calculation between multi-users and communities: (1) How to protect the personal privacy of users; (2) How to prevent the K-means clustering process from Disclose any additional information; (3) How to ensure that the final analysis results are only known to participating users, and the characteristic information (clustering center) of the community is not known to participating users
Once the health information of the user information is leaked, it may cause the loss of the user's personal property or even endanger personal safety

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privacy information protection method based on K-means clustering
  • Privacy information protection method based on K-means clustering
  • Privacy information protection method based on K-means clustering

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0078] In this embodiment, it is assumed that the two cloud servers in the community do not collude, and at the same time, the two-way additive homomorphic proxy re-encryption algorithm is used to realize the clustering of ciphertexts with different public keys, and the clustering results under the same public key are converted into different The clustering results under the public key are returned to the client, while protecting the privacy of the client's private data and community information (clustering center).

[0079] Such as figure 1 As shown, this embodiment provides a privacy information protection method based on K-means clustering, and the specific steps are as follows:

[0080] S0: key pair generation steps:

[0081] First, the cloud server CSP calls the Gengroup function in ElGamal encryption to generate the public parameter PP=(p, G 1 , g), G 1 is the multiplicative group of prime p, where g is the multiplicative group G 1 Generator, and send the generated p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a privacy information protection method based on K-means clustering, and the method comprises the steps: carrying out the data encryption of a plurality of clients CUi, obtaining an encrypted ciphertext, and uploading the encrypted ciphertext to a cloud server; the client CUi, the cloud server CSP and the auxiliary cloud server ACSP performing data interaction calculation to obtain a re-encryption key; the cloud server receiving the encrypted ciphertext, re-encrypting the encrypted ciphertext to obtain a re-encrypted ciphertext of the same public key, and converting there-encrypted ciphertext into a Pillier encrypted ciphertext; the cloud server side obtaining the encrypted ciphertext of the Paillier and then calculating clustering; and the cloud server firstly converting the ciphertext of the clustering result into the ciphertext re-encrypted by the bidirectional addition homomorphic agent, then converting the ciphertext into the ciphertext under the public key of the client, and finally returning the ciphertext of the clustering result to the client for decryption. According to the method, the ciphertext of different public keys is clustered, the clustering result under the same public key is converted into the clustering result under different public keys to be returned to the client, and meanwhile, the private data of the client and the privacy of the clustering center are protected.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a method for protecting private information based on K-means clustering. Background technique [0002] Smart mobile devices are embedded with various sensors that record data according to people's different needs. The widespread use of smart mobile devices and the wide coverage of wireless networks promote the development of participatory sensing, an application of wireless sensor networks. Social participatory sensing addresses the limitations of participatory sensing by utilizing online social networks as infrastructure. In social participatory sensing systems, multiple users use smart devices to collect a large amount of sensing data, which can be shared and analyzed through social networks. By combining all the data in the (virtual) community and using the K-means clustering algorithm to analyze the user perception data, participating users can obtain the analy...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/30H04L9/08H04L9/00G06K9/62
CPCH04L9/30H04L9/0861H04L9/008G06F18/23213
Inventor 赖俊祚戴杰玲王传胜李燕玲孙萌
Owner JINAN UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products