Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Anti-network tracking privacy protection method and system based on identity behavior confusion

A behavioral and identity technology, applied in the direction of network data retrieval, digital data protection, instruments, etc., can solve the difficulty of taking into account the user's requirements for the openness and security of network services, reduce the acquisition of user historical information, and cannot be applied to real scenarios and other issues to achieve the effect of balancing service loss and privacy protection, preventing in-depth attribute inference attacks, and reducing the average accuracy rate

Active Publication Date: 2022-03-15
INST OF INFORMATION ENG CHINESE ACAD OF SCI
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] For the hiding of user behavior itself, that is, active protection methods include: (1) Actively modify user behavior records, such as modifying the user’s rating of a movie or using local differential privacy technology to add noise to user behavior records; Acquisition of user history information, such as using user-associated information to make recommendations or delete some user behavior records, because user behavior records are stored in the server, once issued, it is difficult to modify, these two methods can only be analyzed theoretically and cannot be applied to real scenarios Medium; (3) Completely anonymous methods, such as using proxy browsers such as Tor Browser to hide personal behavior, will affect the availability of services on the one hand, and on the other hand, these proxies with anonymous functions will be discovered or even banned by some regulatory agencies , it is difficult to take into account the user's requirements for the openness and security of network services

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-network tracking privacy protection method and system based on identity behavior confusion
  • Anti-network tracking privacy protection method and system based on identity behavior confusion
  • Anti-network tracking privacy protection method and system based on identity behavior confusion

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] In order to make the purpose, solution and advantages of the present invention clearer, the present invention will be further described in detail by taking the experiment on the real data set as an example. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0052] Taking the MovieLens 1M dataset as an example, this paper describes the specific implementation steps to reduce the risk of users being attacked by inference of privacy attributes.

[0053] The MovieLens 1M dataset is a dataset of user ratings for movies, including 6,000 user privacy attributes (gender, age, occupation), 4,000 movie attributes (name, category), a total of one million ratings and rating time . In this example, the MovieLens 1M data set is preprocessed, and each user's rating of the movie is arranged in time, and the corresponding movie sequence is used as the sequence of items accessed by th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an anti-network tracking privacy protection method and system based on identity behavior confusion. The method is as follows: 1) construct multiple virtual identities for the user; 2) the behavior splitting module assigns a corresponding virtual identity to each web service operation request sent in the user's real behavior chain; 3) the identity switching module takes the user The identity switches to the currently assigned virtual identity and executes the assigned web service operation request; and the behavior generation module generates a virtual behavior for the current virtual identity; Virtual request completes the behavior chain of the virtual identity; 4) Multiple virtual identities assigned to the user respectively feed back the returned results to the result fusion module for fusion, and then return the fusion results to the client where the user is located. The invention uses multiple identities to access, effectively protecting user privacy information.

Description

technical field [0001] The invention belongs to the field of cyberspace security and privacy protection, and in particular relates to an anti-network tracking privacy protection method and system based on identity behavior confusion. Background technique [0002] With the vigorous development of Internet services, users have more and more online behaviors. Various web services pay more attention to users' online behaviors, thereby providing more accurate recommendations and advertisements. Regardless of whether the user is logged into the website or not, the web service always identifies the user and records the user's behavior. Based on these user identities and behavioral data, web services can build powerful advertising services. Although recommendations or advertisements can bring some convenience to people's online life, they also pose certain threats to users' privacy. First of all, the identity service provider is not completely reliable, and there are many data le...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/62G06F16/9535G06F16/955
CPCG06F21/6263G06F16/9535G06F16/955
Inventor 彭佳李敏张逸飞高能
Owner INST OF INFORMATION ENG CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products