Multi-way tree forest K-anonymity method and system, equipment and readable storage medium

A multi-fork tree and forest technology, applied in the field of information security, can solve the problems of data set information loss, time-consuming, and poor data availability, and achieve the effect of improving efficiency and availability

Pending Publication Date: 2020-09-22
CENT SOUTH UNIV
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

K anonymity will cause information loss caused by anonymization, resulting in poor data availability, and it will take a lot of time for data changes
This type of algorithm has many limitations. First of all, if a certain attribute is selected for generalization, if K-anonymity is not satisfied, it may cause over-generalization of the attribute, resulting in loss of information in the data set.
Secondly, global generalization is generally difficult to meet the availability requirements of anonymized data
In addition, it is impossible to accurately measure whether the best anonymity effect is achieved in each generalization, so as to improve the efficiency of the algorithm as a whole

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-way tree forest K-anonymity method and system, equipment and readable storage medium
  • Multi-way tree forest K-anonymity method and system, equipment and readable storage medium
  • Multi-way tree forest K-anonymity method and system, equipment and readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The implementation mode of the present invention is illustrated by specific specific examples below, and those who are familiar with this technology can easily understand other advantages and effects of the present invention from the contents disclosed in this description. Obviously, the described embodiments are a part of the present invention. , but not all examples. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0036]The embodiment of the present application provides a multi-fork forest K-anonymity method, system, device and readable storage medium, which are suitable for anonymization processing of small and large data sets. That is, part of the data is generalized on the basis of the original data, so that the anonymized data set satisfies the K-anonymity model. Under the condition of ensuring data s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a multi-way tree forest K-anonymity method and system, equipment and a readable storage medium. On the basis of calculation of the recognition rate, the problem of each step of optimal generalization data selection of a greedy algorithm in a local generalization mode is solved, a multi-way tree forest is established to achieve storage and local generalization of generalization data, and the efficiency of the model is improved through multi-thread generalization data selection and K-anonymity parallel calculation judgment. That is to say, part of data is generalized on the basis of original data, so that an anonymous data set meets a K-anonymity model. The authenticity of the data is not influenced under the condition of ensuring the data security.Meanwhile, the model reserves the distribution of the data, improves the availability of the data after data anonymization, and is suitable for anonymization processing of a small data set and a largedata set.

Description

technical field [0001] The embodiment of the present application relates to the technical field of information security, and specifically relates to a multi-fork forest K-anonymity method, system, device and readable storage medium. Background technique [0002] With the acceleration of the pace of digitization in the information age and the popularization and application of big data, technologies such as data mining have brought huge knowledge benefits, making data collection more important. However, due to the immaturity of relevant laws and technologies, When information is shared and applied, privacy is leaked, which brings potential security risks to privacy stakeholders. The security issue in data release has gradually become an urgent problem to be solved. [0003] As one of the data desensitization models proposed earlier, the K-anonymity algorithm has many good properties for data security protection, but it also has shortcomings. K anonymity will cause informatio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62
CPCG06F21/6254
Inventor 罗霄陈先来刘莉安莹李忠民
Owner CENT SOUTH UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products