Data privacy protection and security search method in cloud environment

A data privacy and cloud environment technology, applied in digital data protection, network data retrieval, other database retrieval, etc., can solve problems such as unable to meet the needs of fast and high-precision search, difficult to meet the needs of big data applications, and achieve the effect of preventing leaks

Pending Publication Date: 2022-04-08
INST OF ELECTRONICS & INFORMATION ENG OF UESTC IN GUANGDONG
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

From the perspective of search mode, the traditional search engine technology is a scanning search based on the existence of keywords, which can no longer meet the fast and high-precision search requirements proposed by users when facing big data with 4V characteristics
From the perspec

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data privacy protection and security search method in cloud environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] In order to facilitate the understanding of those skilled in the art, the present invention will be further described below in conjunction with the embodiments and accompanying drawings, and the contents mentioned in the embodiments are not intended to limit the present invention. The present invention will be described in detail below in conjunction with the accompanying drawings.

[0029] Such as figure 1 As shown, a method for data privacy protection and safe search in a cloud environment provided by the present invention includes the following steps: Step 1: Perform multiple rounds of fine-grained anonymization algorithms on the original data after each cloud tenant has been anonymized to obtain a data set , under the condition of satisfying data anonymity, through multiple rounds of cloud tenant collaboration, each round collects the attribute with the largest information gain and refines the data set, uploads the data set to the cloud, and the cloud tenant hands o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of data security, in particular to a data privacy protection and security search method in a cloud environment, which comprises the following steps of: performing multiple rounds of fine anonymous algorithm processing on original data when the data exists, and performing secondary encryption storage on the processed data through a cloud service provider, so that the original data can be prevented from being leaked, and the security of the data is improved. Moreover, an authorized user access system is adopted, the data can be prevented from being stolen, the security of the data is provided, operations such as association and aggregation on original source data attributes can possibly generate potential fusion privacy leakage risks, and most traditional data privacy protection schemes are provided for single-source and static data, so that the security of the data is greatly improved. And inference attacks in the multi-source dynamic fusion data publishing and searching process cannot be resisted, so that data storage and access are safer and more reliable by adopting the method disclosed by the invention.

Description

technical field [0001] The invention relates to the technical field of data security, in particular to a method for data privacy protection and safe search in a cloud environment. Background technique [0002] With the integration and development of the latest technologies such as cloud computing, Internet of Things, and mobile Internet, the amount of data generated by various industries is growing explosively. According to the latest report released by the research institution Gartner (2), the number of network devices in the world will reach 64 in 2016. billion, an increase of 30% from 2015. In 2016, an average of 5.5 million new devices were connected to the network every day. It is estimated that by 2020, the number of network devices is expected to grow to 20.8 billion. The rapid expansion of the ubiquitous network has also produced a large amount of multi-modal data. The market research firm IDC predicts[3] that the global data volume will maintain an annual growth rat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/62G06F21/60G06F16/953
Inventor 张宏莉周志刚叶麟李东余翔湛于海宁方滨兴
Owner INST OF ELECTRONICS & INFORMATION ENG OF UESTC IN GUANGDONG
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products