Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A quantitative evaluation method and system for privacy protection in a multi-party data collaboration scenario

A privacy protection and data collaboration technology, applied in the field of network information, can solve problems such as high communication costs, leakage, and privacy attack models incorporated into the framework, and achieve the effect of improving matching capabilities and making full use of them

Active Publication Date: 2021-10-29
ZHEJIANG LAB
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Such frameworks mostly focus on solving a series of engineering problems such as high computational complexity, high communication costs, and integration with existing machine learning and deep learning algorithms, and aim to achieve preliminary proof of concept, but they do not strictly associate various algorithms. The privacy attack model is incorporated into the framework, so it does not have the ability to quantitatively evaluate the complete privacy protection utility and data utility
At present, academia and industry at home and abroad are also trying to build data sharing, interaction and transaction systems based on multi-party data sharing scenarios. Through this type of system, the supply and demand matching between data resource parties and data demand parties can be realized. However, such systems cannot provide privacy protection. Therefore, it is impossible to provide effective privacy disclosure risk warnings to data resource providers, and it is impossible to provide data utility to data users, especially to provide risk warnings on the decline of data utility under privacy protection conditions. Therefore, the Both the data resource provider and the data demander in this type of system lack sufficient auxiliary decision-making basis for data transactions, so the matching effect of the system is limited.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A quantitative evaluation method and system for privacy protection in a multi-party data collaboration scenario
  • A quantitative evaluation method and system for privacy protection in a multi-party data collaboration scenario
  • A quantitative evaluation method and system for privacy protection in a multi-party data collaboration scenario

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0050] An implementation method for providing an assessment of a member inference attack in the data resource provider during the data usage process is as follows:

[0051] Data supplied with data resource providers Training model , Assume that the attacker does not understand with Basic situation, such as Structure and various training super parameters and Distribution, etc., but can only be used in black boxes That is, Provides N-dimensional vector input X, get the feedback M-dimensional vector output Y, where .

[0052] By repeated Send request, attacker can work with Similar large amounts of data samples Feature vector x Predict, it is possible to obtain a high confidence output vector That is, there is a certain dimension value that is significantly higher than other dimensions. . The value is 0.8. like figure 2 As shown, based on this data, the attacker can construct k group training and test data, and training for each set of data to get a shadow model.

[0...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention discloses a privacy protection quantitative evaluation method and system in a multi-party data collaboration scenario. In the method, the data resource provider inputs the data resource into a model for training according to an algorithm and a protection mechanism, and the output satisfies the model index and threshold At the same time, the data resource provider uses attack means to attack the above model, records and quantifies the privacy leakage of the model, and outputs the privacy index; the data resource user and the data resource provider respectively meet their own needs according to the model index and privacy index , to make a decision on whether to carry out data cooperation. The invention improves the effective assessment and information disclosure of privacy risk and data value in the process of data sharing, effectively solves the problem of information asymmetry between the data resource provider and the data use demander, and helps to build a healthier and more sustainable Developed data sharing, interaction and transaction system.

Description

Technical field [0001] The present invention belongs to the field of network information, and in particular to a privacy protection quantization assessment method and system under multi-data collaborative scenarios. Background technique [0002] In the future, digital and intelligent development in the fields of finance, medical, transportation will pay more attention to the joint modeling of cross-institutional data sharing and distributed artificial intelligence algorithms. This type of application involves distributed data collection, transmission, storage, use, and across mechanism data sharing, joint modeling, and system models complicated. Relevant privacy protection algorithms involve comprehensive use of multi-class technologies such as artificial intelligence, data encryption, and network security. In recent years, although research on the application scenario has initially produced a number of solutions, such as the distributed artificial intelligence algorithm framewor...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/62G06F21/57G06N3/04G06N3/08G06N20/00
CPCG06F21/6245G06N3/08G06N20/00G06F21/57G06N3/045
Inventor 那崇宁李红程徐婷婷许浩
Owner ZHEJIANG LAB
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products