Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Anti-network tracking privacy protection method and system based on identity behavior confusion

A technology of privacy protection and behavior, which is applied in the field of anti-network tracking privacy protection based on identity and behavior confusion, can solve the difficulty of taking into account the user's requirements for the openness and security of network services, reduce the acquisition of user historical information, and cannot apply real scene and other issues

Active Publication Date: 2020-03-17
INST OF INFORMATION ENG CHINESE ACAD OF SCI
View PDF11 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] For the hiding of user behavior itself, that is, active protection methods include: (1) Actively modify user behavior records, such as modifying the user’s rating of a movie or using local differential privacy technology to add noise to user behavior records; Acquisition of user history information, such as using user-associated information to make recommendations or delete some user behavior records, because user behavior records are stored in the server, once issued, it is difficult to modify, these two methods can only be analyzed theoretically and cannot be applied to real scenarios Medium; (3) Completely anonymous methods, such as using proxy browsers such as Tor Browser to hide personal behavior, will affect the availability of services on the one hand, and on the other hand, these proxies with anonymous functions will be discovered or even banned by some regulatory agencies , it is difficult to take into account the user's requirements for the openness and security of network services

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-network tracking privacy protection method and system based on identity behavior confusion
  • Anti-network tracking privacy protection method and system based on identity behavior confusion
  • Anti-network tracking privacy protection method and system based on identity behavior confusion

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] In order to make the purpose, solution and advantages of the present invention clearer, the present invention will be further described in detail by taking the experiment on the real data set as an example. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0052] Taking the MovieLens 1M dataset as an example, this paper describes the specific implementation steps to reduce the risk of users being attacked by inference of privacy attributes.

[0053] The MovieLens 1M dataset is a dataset of user ratings for movies, including 6,000 user privacy attributes (gender, age, occupation), 4,000 movie attributes (name, category), a total of one million ratings and rating time . In this example, the MovieLens 1M data set is preprocessed, and each user's rating of the movie is arranged in time, and the corresponding movie sequence is used as the sequence of items accessed by th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an anti-network tracking privacy protection method and system based on identity behavior confusion. The method comprises the following steps: 1) a plurality of virtual identities is constructed for a user; 2) a behavior splitting module sequentially allocates a corresponding virtual identity to each web service operation request sent in the real behavior chain of the user;3) an identity switching module switches the user identity to the currently allocated virtual identity and executes the allocated web service operation request; a behavior generation module generatesa virtual behavior for the current virtual identity; the virtual behavior refers to simulating a behavior which is not executed by a real user and sending a virtual request to the web service to enable a behavior chain of a virtual identity to be complete; and 4) the return results are respectively fed back to a result fusion module for fusion for the plurality of virtual identities allocated to the user, and then the fusion results are returned to the client where the user is located. According to the method and the system, the plurality of identities are used for access, so that the privacyinformation of the user is effectively protected.

Description

technical field [0001] The invention belongs to the field of cyberspace security and privacy protection, and in particular relates to an anti-network tracking privacy protection method and system based on identity behavior confusion. Background technique [0002] With the vigorous development of Internet services, users have more and more online behaviors. Various web services pay more attention to users' online behaviors, thereby providing more accurate recommendations and advertisements. Regardless of whether the user is logged into the website or not, the web service always identifies the user and records the user's behavior. Based on these user identities and behavioral data, web services can build powerful advertising services. Although recommendations or advertisements can bring some convenience to people's online life, they also pose certain threats to users' privacy. First of all, the identity service provider is not completely reliable, and there are many data le...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06F16/9535G06F16/955
CPCG06F21/6263G06F16/9535G06F16/955
Inventor 彭佳李敏张逸飞高能
Owner INST OF INFORMATION ENG CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products