Data traffic privacy protection and recovery method and device based on tensor decomposition
A technology of tensor decomposition and privacy protection, which is applied in the field of privacy protection and recovery of data traffic based on tensor decomposition, can solve the difficulty of privacy protection and achieve the effect of maintaining data availability and satisfying privacy protection
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
no. 1 example ;
[0047] refer to figure 1 , an embodiment of the present invention provides a data traffic privacy protection restoration method based on tensor decomposition, which is used for a trusted third-party server, comprising the following steps:
[0048] S101. The third-party server acquires the first and third order tensors sent by the client.
[0049] S102. The third-party server performs CP decomposition on the acquired first and third order tensors to obtain three factor matrices.
[0050] It should be noted that, in the embodiments of this paper, the CP decomposition of the third-order tensor is taken as an example for illustration. However, the embodiment herein is also applicable to the Tucker decomposition scheme, and those skilled in the art can fully apply this scheme to the Tucker decomposition scheme by taking CP decomposition as an example.
[0051] According to the above introduction, in steps S101 and S102 in this embodiment, a third-order tensor can be formed in the...
no. 2 example ;
[0097] refer to Figure 4 , an embodiment of the present invention provides a data flow privacy protection restoration method based on tensor decomposition, the method is used in a trusted third-party server, including the following steps:
[0098] S201. The third-party server acquires multiple information matrices sent by the client.
[0099] Among them, the information matrix is the second-order tensor.
[0100] S202. The third-party server aggregates all the obtained information matrices to obtain the first and third order tensors.
[0101] S203. The third-party server performs CP decomposition on the first and third order tensors to obtain three factor matrices.
[0102] S204. The third-party server performs centralized differential privacy processing of the Gaussian mechanism on the factor matrix including the user's personal privacy.
[0103] S205. The third-party server reconstructs the factor matrix and the remaining factor matrix for differential privacy protecti...
no. 3 example ;
[0119] refer to Figure 6 to Figure 8 ( Figure 8 The middle dark color is the noise part), an embodiment of the present invention provides a data flow privacy protection recovery method based on tensor decomposition, which is used for a third-party server, including the following steps
[0120] S301. The third-party server receives multiple information matrices sent by the client; the information matrix is obtained by the client through localized differential privacy processing under a random response mechanism;
[0121] S302. The third-party server aggregates the information matrix into a third-order tensor;
[0122] S303. The third-party server performs CP decomposition on the third-order tensor to obtain three factor matrices;
[0123] S304. The third-party server reconstructs the three factor matrices to obtain a new third-order tensor.
[0124] This method embodiment is based on the same inventive concept as the first embodiment and the second embodiment, that is, b...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


