Privacy protection association rule mining method based on sparse data set

A privacy protection, sparse data technology, applied in the computer field, can solve problems such as privacy leakage, and achieve the effect of reducing the risk of privacy leakage, high security, and improving computing efficiency

Active Publication Date: 2021-06-15
XIDIAN UNIV
View PDF6 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The purpose of the present invention is to address the shortcomings of the above-mentioned prior art, and propose a more secure and efficient mining method for privacy-preserving association rules based on sparse data sets, which is used to solve the problems of introducing additional computing overhead and privacy leakage in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privacy protection association rule mining method based on sparse data set
  • Privacy protection association rule mining method based on sparse data set
  • Privacy protection association rule mining method based on sparse data set

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] The present invention will be further described below in conjunction with the accompanying drawings.

[0049] Refer to attached figure 1 , a kind of privacy-preserving association rule mining method based on the sparse data set that the present invention proposes, comprises the following steps:

[0050] Step 1, system initialization:

[0051] (1.1) The key generation center generates system parameters, integer N and strong private key SK according to the distributed double trapdoor cipher DT-PKC; first, the key generation center generates two large prime numbers p and q, and satisfies in, and Be respectively the binary bit length of prime number p and q; Then according to prime number p and q, calculate integer N=p×q; SK=lcm(p-1,q-1) / 2, wherein, lcm(p-1,q -1) is the least common multiple of p-1 and q-1.

[0052] (1.2) The key generation center provides each data owner DO with system parameters i Generate an owner key pair Generate a miner key pair (pk M ,sk ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a privacy protection association rule mining method based on a sparse data set, and mainly solves the problems that an existing mining method needs to introduce additional calculation overhead and privacy leakage. The scheme comprises the following steps: 1) initializing a system; 2) enabling the data owner to encrypt the uploaded data; 3) enabling a data miner to encrypt, upload and query; 4) performing double-cloud calculation on an inner product ciphertext set of query and transaction, and calculating a support degree ciphertext of query; 5) comparing the support degree with a support degree threshold value by the double-cloud security; (6) enabling the data miner to decrypt the mining result, judge whether the mining result is a frequent item set or not, solve a non-empty proper subset of the frequent item set, and querying, encrypting and uploading the non-empty proper subset and the query; 7) comparing the confidence coefficient with a confidence coefficient threshold value by the double-cloud security; and 8) enabling the data miner to decrypt the mining result and judge whether the mining result belongs to the strong association rule. According to the invention, the risk of privacy disclosure is reduced, and higher privacy protection requirements can be met; and meanwhile, the mining calculation efficiency is effectively improved.

Description

technical field [0001] The invention belongs to the field of computer technology, and further relates to information security technology, specifically a method for mining association rules for privacy protection based on sparse data sets, which can be used in scenarios with sparse transaction data sets such as shopping basket analysis in shopping malls, without leaking user privacy. On the premise of realizing cloud outsourcing association rule mining. Background technique [0002] With the rapid development of network technology, the Internet has penetrated into all aspects of people's lives. With the popularity of online services, user data has grown at an unprecedented rate, and the information contained in this huge data set has commercial value that cannot be ignored. In the process of converting data into value, data mining technology plays a pivotal role as an intermediate link. Data mining is the process of extracting potentially valuable information and knowledge f...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/62G06F16/2458H04L9/00
CPCG06F21/602G06F21/6245G06F16/2465H04L9/008Y02D30/50
Inventor 王保仓闵玉玮段普张本宇胡予濮
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products