Data processing method and device, electronic equipment and readable storage medium

A data processing and processor technology, which is applied in the field of data security and can solve problems such as user information leakage

Pending Publication Date: 2020-04-28
BEIJING TOPSEC NETWORK SECURITY TECH +2
View PDF10 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The purpose of the embodiment of the present application is to provide a data processing method, device, electronic device and readable storage medium, w

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data processing method and device, electronic equipment and readable storage medium
  • Data processing method and device, electronic equipment and readable storage medium
  • Data processing method and device, electronic equipment and readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0066] The following will clearly and completely describe the technical solutions in the embodiments of the present application with reference to the drawings in the embodiments of the present application.

[0067] The embodiment of the present application provides a data processing method, which determines the generalization order for multiple quasi-identification attributes by obtaining the degree of association between the quasi-identifier attribute and the sensitive attribute. Generalization, so that quasi-identifiers related to sensitive attributes can be generalized, and attackers will not easily locate users, avoiding the problem that users' private information is easily leaked.

[0068] In order to facilitate the understanding of the embodiments of the present application, the related concepts involved in the embodiments of the present application are firstly explained below.

[0069] Identifier: It can uniquely determine the identity of a user, such as ID, name and ot...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a data processing method and device, electronic equipment and a readable storage medium, and relates to the technical field of data security. The method comprises the steps of obtaining a user data set corresponding to each user in a plurality of users; determining target data corresponding to each quasi-identifier attribute and sensitive data corresponding to the sensitiveattribute in a user data set corresponding to each user; based on the target data and the sensitive data, determining an association degree between each quasi-identifier attribute and the sensitive attribute; determining a generalization sequence for performing K-anonymity processing on the plurality of quasi-identifier attributes according to the association degree; if the quasi-identifier attribute with the large association degree can be generalized firstly, the quasi-identifier attribute related to the sensitive attribute can be generalized, an attacker cannot easily locate a user, and theproblem that privacy information of the user is easily leaked is avoided.

Description

technical field [0001] The present application relates to the technical field of data security, and in particular, to a data processing method, device, electronic equipment, and readable storage medium. Background technique [0002] K-anonymity is an anonymous privacy protection technology proposed by Samarati and L. Sweeney in 1998 for publishing public databases or microdata. In 2002, L. Sweeney named it the k-anonymity model. Effectively avoid the leakage of private information caused by link attacks and other means. [0003] The K-anonymity algorithm is different from the traditional access control and other goal-based privacy protection technologies. It is a typical microdata release model, in which microdata is defined as a data record expressing and describing individual information, which is the carrier of individual information. Such information includes individual identification information (such as name, ID number, etc.), sensitive information (such as medical hi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/62
CPCG06F21/6254
Inventor 付莉珺
Owner BEIJING TOPSEC NETWORK SECURITY TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products