Differential privacy-based data exception detection method

A technology of differential privacy and detection methods, which is applied in other database retrieval, digital data protection, electronic digital data processing, etc., can solve the problems of privacy information leakage, achieve high robustness, strong adaptability, and improve the recall rate Effect

Active Publication Date: 2019-10-15
GUILIN UNIV OF ELECTRONIC TECH
View PDF3 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] Aiming at the problem that the data anomaly detection process is vulnerable to attacks from background knowledge, resulting in the leakage of private information, the present invention provides a data anomaly detection method based on differential privacy

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Differential privacy-based data exception detection method
  • Differential privacy-based data exception detection method
  • Differential privacy-based data exception detection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] The content of the present invention will be further elaborated below in conjunction with the accompanying drawings and embodiments, but the present invention is not limited thereto.

[0056] refer to figure 1 , a data anomaly detection method based on differential privacy, comprising the following steps:

[0057] S1 processes the data: the real data set in the UCI machine learning database is processed, the real data has been marked with a category label and some attributes are missing, and the category label of the data is removed in order to verify that the method of the present invention can Abnormal data is effectively detected, and at the same time, data objects with missing attributes are removed.

[0058] S2 Initialization parameters k, ε: Set initialization parameters, where k represents the k nearest similar neighbors of the data object, and ε is the privacy protection coefficient of differential privacy.

[0059] S3 gets the distance matrix: if X i , X j ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a differential privacy-based data exception detection method. According to the method, the clustering is conducted firstly and then the exception detection is conducted. The method comprises the following steps of adding random noise to the weight of the edge in a minimum spanning tree generated by a prim algorithm by using a noise mechanism in the differential privacy so as to hide the relevance between data objects. Meanwhile, the method uses a judgment criterion of fusing dissimilarity and inverse similarity number to detect abnormality. By adopting the method, the problem that parameters need to be preset and the abnormal data selection is inaccurate in the traditional top-n method can be solved. The method provided by the invention has higher robustness and stronger adaptability, and experimental analysis of the simulation data set and the real data set shows that the method provided by the invention can effectively ensure the security of private data in anenvironment with non-uniform data distribution, improve the recall ratio of anomaly detection and reduce the misjudgment rate.

Description

technical field [0001] The invention relates to data privacy protection and data anomaly detection, in particular to a data anomaly detection method based on differential privacy protection. Background technique [0002] In the context of the rapid development of the Internet, data sharing has become an inevitable link in today's data mining field, and the leakage of personal privacy data in the sharing has aroused people's concerns. In recent years, the leakage of personal privacy information has emerged one after another. In 2016, it was revealed that Uber employees used user information management channels to spy on historical records and track the whereabouts of celebrities and their predecessors. In August 2018, customer data such as personal identity information and private room opening records of 130 million users of Huazhu's hotels were leaked. On the same day, the courier industry giant SF Express was also exposed that more than 300 million pieces of data were susp...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06F16/906
CPCG06F21/6245G06F16/906
Inventor 首照宇严叶吴峥峥文乙茹赵辉张彤莫建文文辉
Owner GUILIN UNIV OF ELECTRONIC TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products