A method for collecting sensitive data

A technology of sensitive data and data sets, applied in the field of information security, can solve the problems of leaking users' personal privacy data, noise without considering attributes, untrusted servers, etc., to meet data availability, improve security, and protect privacy. Effect

Active Publication Date: 2021-06-18
HENGRUITONG FUJIAN INFORMATION TECH CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] On the one hand, in the existing data collection mechanism, users often directly upload personal data to the server, and then the server processes the data, but the server is often untrusted, and the service provider may Leaking the user's personal privacy data; on the other hand, most of the existing data collection methods adopt the method of adding noise to the data, but the added noise does not consider the relationship between attributes, and it is not applicable to multi-dimensional data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for collecting sensitive data
  • A method for collecting sensitive data
  • A method for collecting sensitive data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0020] Please refer to figure 1 , a method for collecting sensitive data, comprising the steps of:

[0021] S0, the server generates a corresponding pseudonym ID for the i-th client i ', where i ranges from 1 to m, and m represents the total number of clients.

[0022] S1. The server judges whether the instruction information sent by the client is a creation instruction, and if so, creates a disturbance group G j , and select the client as the owner client of the disturbance group, otherwise, select the client as a member client, and assign the member client to the corresponding disturbance group, and the The above creation instructions include the public key PK of the group owner client j , where j represents the sequence number of the disturbance group;

[0023] The specific assignment of the member clients to the corresponding disturbance group is as follows:

[0024] The member clients are assigned to corresponding perturbation groups under pseudonyms.

[0025] The i...

Embodiment 2

[0047] Please refer to figure 2 with 3 The difference between this embodiment and Embodiment 1 is that the present invention will further illustrate how the above-mentioned sensitive data collection method of the present invention is realized in combination with specific application scenarios:

[0048] S0, the server generates a corresponding pseudonym ID for the i-th client i ', where i ranges from 1 to m, and m represents the total number of clients.

[0049]S1. The server judges whether the instruction information sent by the client is a creation instruction, and if so, creates a disturbance group G j , and select the client as the owner client of the disturbance group, otherwise, select the client as a member client, and assign the member client to the corresponding disturbance group, and the The above creation instructions include the public key PK of the group owner client j , where j represents the sequence number of the disturbance group;

[0050] The specific as...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The method for collecting sensitive data provided by the present invention is to create a disturbance group or join a disturbance group through the client, and the member client uses the public key PK of the group owner client j Encrypt personal data, and forward the encrypted data to the group owner client through the server in a preset message format, and the group owner client receives user messages sent by all member clients in the disturbance group data, and PK with the public key of the group owner client j Matching private key SK j Decrypt to obtain the decrypted original data set, and disturb the decrypted original data set to obtain the disturbed data set and send it to the server, which can avoid the intervention of third-party servers and improve the security of personal data collection Resilience, while satisfying the availability of data, it can resist the attacks of internal malicious users and untrusted servers, protect the privacy of data, and ensure that the privacy of users is not leaked.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a method for collecting sensitive data. Background technique [0002] In recent years, with the increasing popularity of intelligent terminals with collection functions and wireless communication technologies, various services based on data collection (such as medical data collection or personal asset collection) are developing rapidly, and now they have covered all aspects of people's lives. [0003] In the process of data collection, the data uploaded by users contains sensitive personal information, such as medical expenses, disease information, health status, hobbies, religious beliefs, and home addresses. If users directly upload data containing sensitive attributes without adopting appropriate data protection mechanisms, personal privacy may be leaked; and improper application of collected data may also lead to personal privacy leaks. Moreover, the more accura...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/62G06F21/60
CPCG06F21/602G06F21/6245
Inventor 张美跃范章华程少锋周业俞传情周定云
Owner HENGRUITONG FUJIAN INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products