Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A Privacy-Preserving Workflow Publishing Method Maintaining Critical Path Availability

A critical path and privacy protection technology, applied in the fields of digital data protection, instruments, computing, etc., can solve the problems of not taking into account path hiding, critical path leakage, and difficulty in guaranteeing the leakage probability of critical paths in the release map, so as to avoid adding false information. , the effect of preventing privacy attacks

Active Publication Date: 2022-07-15
JIANGSU FRONTIER ELECTRIC TECH +1
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] (1) While ensuring that there are at least k candidate paths with the same length, the concealment of the true length of the path is not taken into account. If the attacker knows that a special node is located on the critical path, there is still a risk of critical path leakage;
[0005] (2) When the number of paths between target nodes is lower than the anonymity strength k, the weight perturbation method that maintains the graph structure is difficult to ensure that the leakage probability of the key path in the release graph does not exceed 1 / k

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Privacy-Preserving Workflow Publishing Method Maintaining Critical Path Availability
  • A Privacy-Preserving Workflow Publishing Method Maintaining Critical Path Availability
  • A Privacy-Preserving Workflow Publishing Method Maintaining Critical Path Availability

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0049] Example 1: see figure 1 , a privacy protection lineage workflow sharing and publishing method, comprising the following steps:

[0050] Step (1) Given the original workflow WF, the target module pair set H is divided into three categories based on the degree of participation of directed edges in the critical path, zero access edge (NVE), full access edge (AVE) and partial access access edge (PVE);

[0051] Step (2) Anonymize the critical paths between the target module pairs, perturb the edge weights on the Top-k paths, so that the path weights satisfy the ε-error equivalence after the perturbation; if there are less than k paths between the module pairs, Unable to achieve ε-error equivalence between Top-k paths, continue to step (3);

[0052] Step (3) When there are less than k paths between target modules in H, the workflow does not satisfy the (k, ε)-critical path anonymity after step (2) is performed, and the path splitting method is used to find that the target ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a privacy protection workflow publishing method for maintaining the availability of critical paths, comprising the following steps: dividing zero-time access edges, full-time access edges and partial access edges in the workflow based on the critical paths between pairs of target modules; introducing Workflow (k, ε)-critical path anonymous privacy protection model, anonymizes the critical path between target module pairs, perturbs the edge weights on the Top-k path, realizes (k, ε)-critical path anonymity while maintaining lineage The structure of the workflow graph remains unchanged; in order to solve the problem of anonymity strength loss caused by the number of paths between target modules is lower than the k value, path splitting is performed based on module decomposition, and the composite modules on the anonymous path are found and split to achieve path splitting, so that the workflow can be split. The release graph strictly satisfies (k,ε)‑critical path anonymity. While preventing critical path based privacy attacks, it also takes into account the maintenance of critical path topology availability.

Description

technical field [0001] The invention relates to a data privacy protection publishing method, which is object-oriented and is a lineage workflow, and realizes the anonymity protection of key paths in the workflow. Background technique [0002] With the deepening of data sharing applications, there is an increasingly urgent need to share and publish lineage workflows that describe the principles of data generation and evolution. The lineage workflow is usually represented in the form of a directed acyclic graph (DAG, Directed acyclic graph). The execution cost and transmission cost of . By analyzing the critical path of the workflow and the functional modules on the path, the shortest time required to complete the entire workflow can be measured, thereby controlling the time and cost. one. The shared release of the lineage workflow leads to the disclosure of the privacy of the workflow structure including the critical path structure, and then the attacker learns the key act...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/62
CPCG06F21/6254
Inventor 祝永晋倪巍伟闫冬李昆明
Owner JIANGSU FRONTIER ELECTRIC TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products