Anti-inference attack privacy protection information matching method and device

An information matching and privacy protection technology, applied in the field of information security, can solve problems such as the inability to adapt to the dynamic changes of user needs and the inability to resist inference attacks, so as to reduce the risk of leakage, do not lose matching accuracy, and resist inference attacks.

Pending Publication Date: 2022-02-08
HUAZHONG UNIV OF SCI & TECH
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] Aiming at the defects and improvement needs of the prior art, the present invention provides a privacy-preserving information matching method that is resistant to inference attacks, aiming to solve the problem that the existing privacy information matching method based on randomization technology cannot resist inference attacks and cannot adapt to user Technical Issues with Dynamic Changes in Demand

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-inference attack privacy protection information matching method and device
  • Anti-inference attack privacy protection information matching method and device
  • Anti-inference attack privacy protection information matching method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0065] A privacy-preserving information matching method against inference attacks, such as figure 1 shown, including:

[0066] The demand information and privacy preference are randomized through reasoning error analysis, and the disturbance information set is obtained and sent to the information matching server; each disturbance information point in the disturbance information set is the data point obtained after randomization of the matching scheme that satisfies the demand information ;Demand information includes the basic information needed to obtain the shared service and the user's basic needs for the shared service. For different shared services, there may be different expressions. For example, in the shared vehicle service, the required information may Including the starting point and end point of the itinerary, the time when the ride request is initiated, the longest acceptable walking time from the starting point (drop-off point) to the pick-up point (destination), a...

Embodiment 2

[0088] A privacy-preserving information matching method against inference attacks, such as figure 2 shown, including:

[0089] Broadcast the threshold to each service demand terminal;

[0090] Receive the disturbance information set sent by the service demand terminal; the disturbance information set is obtained by randomizing the demand information and privacy preference of the service demand terminal through reasoning error analysis, and each disturbance information point is the matching scheme that satisfies the demand information. Data points obtained after randomization;

[0091] Match each service provider terminal with each disturbance information point in the disturbance information set to obtain a set of candidate matching objects, and calculate the first satisfaction degree of each candidate matching object; candidate matching objects include disturbance information points and corresponding Matched service provider terminal information, the first degree of satisfa...

Embodiment 3

[0104] A service demand terminal, including a processor and a computer-readable storage medium, where a computer program is stored in the computer-readable storage medium;

[0105] The processor is configured to read the computer program in the computer-readable storage medium, and execute the privacy-preserving information matching method against inference attack provided in Embodiment 1 above.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an anti-reasoning attack privacy protection information matching method and device, and the method comprises the steps: carrying out the randomization of demand information and privacy preference through reasoning error analysis, obtaining a disturbance information set, and transmitting the disturbance information set to an information matching server; receiving a candidate matching object set returned by the information matching server and a first satisfaction degree of each candidate matching object in the candidate matching object set; calculating a second satisfaction degree of each candidate matching object according to the demand information, and correspondingly fusing the second satisfaction degree with the first satisfaction degree into a third satisfaction degree; receiving a threshold value broadcasted by the information matching server, and screening out candidate matching objects of which the third satisfaction degree is greater than or equal to the threshold value; and when the screening result is not 0, randomly selecting a candidate matching object as a final matching object through a differential privacy mechanism, and sending the candidate matching object to an information matching server. According to the method and device, reasoning attack can be resisted by fusing reasoning error analysis and differential privacy and combining personalized privacy requirements of the user, and dynamic change of the requirements of the user can be adapted.

Description

technical field [0001] The invention belongs to the field of information security, and more specifically relates to a method and device for matching privacy-protected information against reasoning attacks. Background technique [0002] In recent years, with the rapid popularization of information services and the rapid development of mobile communication technology, the mobile Internet has promoted the development of many new network service models with its portability and real-time performance, among which sharing services have widely penetrated into people's daily life. . Such services analyze the needs submitted by users, pair two or more types of users that meet the supply and demand relationship, and provide them with shared services. Service providers need to collect users' personal information or needs in order to find suitable sharing objects for users who want to obtain sharing services. However, because the service provider is not completely trustworthy, there is...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/55G06F21/62
CPCG06F21/6245G06F21/55G06F21/6254
Inventor 何媛媛谭新宇邓贤君王法尧
Owner HUAZHONG UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products