Check patentability & draft patents in minutes with Patsnap Eureka AI!

An ontology dependency closure set generation method and device based on privacy degree association, equipment and a storage medium

A privacy and ontology technology, applied in the field of information processing, can solve the problems of hierarchical data dependence on structure description, without considering semantic dependence, etc., to avoid the inefficiency of path description and query, and to achieve the effect of high information security

Pending Publication Date: 2022-01-18
ARMY ENG UNIV OF PLA
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, in the actual operation process, the existing data privacy association has the following problems: the hierarchical structure data depends on the structure description, or depends on the value association of the structure description, without considering the semantic dependence

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An ontology dependency closure set generation method and device based on privacy degree association, equipment and a storage medium
  • An ontology dependency closure set generation method and device based on privacy degree association, equipment and a storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0031] Taking school course selection as an example, such as figure 1 As shown, a method for generating ontology-dependent closure sets based on privacy-related associations is provided, including the following steps:

[0032] Step 1. Use the DTD abstract syntax tree structured model to extract the original value dependencies in the XML document data information; specifically: use the DTD abstract syntax tree to describe the XML document, and define value-based XML function dependencies and multi-value dependencies based on the XPath path.

[0033] Such as figure 2 As shown, the functional dependency FD of DTD (Document Type Definition, full name document type definition) can be formalized as:

[0034] A student's student number uniquely identifies a student

[0035] ([school.student.@sno]→school.student)

[0036] A student's student number uniquely identifies a student's name

[0037] ([school.course.student.@sno]→school.course.student.sname)

[0038] The course n...

Embodiment 2

[0114] This embodiment provides a device for generating an ontology-dependent closure set based on privacy degree association, the device comprising:

[0115] Original value dependency acquisition module: use the DTD abstract syntax tree structured model to extract the original value dependency in XML document data information;

[0116] Key and semantic key definition module: define key and semantic key dependently through the original value in XML document data information;

[0117] Ontology dependency reasoning set acquisition module: define semantic dependency and semantic reasoning according to the primary key of the semantic subject in the semantic key, and associate the ontology dependency set formed by the original value dependency set to obtain the ontology dependency reasoning set;

[0118] Ontology dependent closure set acquisition module: take the semantic subject primary key in the semantic key as the equivalence class, divide the ontology dependent inference set a...

Embodiment 3

[0120] This embodiment provides an ontology dependent closure set generation device based on privacy degree association, including a processor and a storage medium;

[0121] The storage medium is used to store instructions;

[0122] The processor is configured to operate according to the instructions to execute the steps of the method according to the embodiment.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an ontology dependency closure set generation method and device based on privacy degree association, equipment and a storage medium. The method comprises the steps that original value dependency in XML document data information is extracted by adopting a DTD abstract syntax tree structured model; an original value in XML document data information depends on a definition key and a semantic key; semantic dependency and semantic reasoning are defined according to a semantic subject main key in the semantic keys, an ontology dependency set formed by the original value dependency set is associated, and an ontology dependency reasoning set is obtained; and a semantic subject major key in the semantic keys is taken as an equivalence class, thus dividing the ontology dependency reasoning set and reducing to obtain an ontology dependency closure set associated with the data privacy degree. The invention is consistent with a traditional relational database standardization first-order theory, an ontology dependency set directly associated with the data privacy degree is achieved, meanwhile, the situation that the higher the weight is, the more valuable data association is the simplest in structural representation is met, and a safe and efficient research basis is provided for privacy protection research such as access control and data mining.

Description

technical field [0001] The invention relates to a method, a device, a device and a storage medium for generating an ontology dependent closure set based on privacy degree association, and belongs to the technical field of information processing. Background technique [0002] Data access privacy protection usually uses attribute encryption, access control, restricted release, differential privacy protection and other means to prevent user privacy from being illegally stolen or reasoned. The first step is to clarify the basic relationship between the structure of the data and the information. [0003] The existing hierarchical structure XML normalization theory can obtain the ideal paradigm close to the relational database BCNF by defining the primary key and foreign key combined with the functional dependence based on the value. The dependency set calculation method similar to the present invention is described in the Chinese invention patent "Incremental calculation method o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06F8/41
CPCG06F21/6227G06F8/436
Inventor 王梅娟黄松李辉郑长友史涯晴王兆丽韩敬利胡津昌
Owner ARMY ENG UNIV OF PLA
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More