K-prototypes clustering data privacy protection method based on local differential privacy
A differential privacy and data privacy technology, applied in digital data protection, electronic digital data processing, instruments, etc., can solve problems such as amplifying noise
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0049] The present invention will be further described below in conjunction with accompanying drawings and examples.
[0050] Such as figure 1 As shown, a K-prototypes clustering data privacy protection method based on local differential privacy includes the following steps:
[0051] Step 1: The user disturbs the data at the local end;
[0052] Step 1.1: Use local differential privacy technology to perturb user data to generate perturbed data;
[0053] Step 1.2: The user sends the disturbance data generated in step 1.1 to the server, and enters step 2;
[0054] The local terminal is a terminal under the control of the user, which stores the user's data, and these data need to be transmitted to the server for clustering;
[0055] The server is a platform that provides cluster analysis services for performing cluster analysis on the collected user data;
[0056] The type of the user data is dimensional mixed data, including both categorical data and numerical data. The serv...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

