Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data transaction method for personalized privacy protection requirement of terminal equipment

A privacy protection and transaction method technology, which is applied in the field of data transactions oriented to the personalized privacy protection requirements of terminal equipment, can solve the problems of large privacy risks, difficulty in meeting personalized privacy protection requirements, and high communication costs, so as to improve transaction efficiency, Solve the problem of information asymmetry and maximize the effect of accuracy

Pending Publication Date: 2022-07-15
DONGHUA UNIV
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] However, considering the individual privacy requirements of terminal devices and selfish data transaction issues face many technical challenges
First, data privacy protection and data utility maximization are mutually restrictive, and how to balance the two is a thorny issue; second, most current privacy protection mechanisms are based on centralized differential privacy technology, and such solutions are usually Assuming that there is a credible data collector, this assumption still has a large privacy risk, and the communication cost is high; thirdly, after the credible data collector collects the data, it imposes a privacy protection policy on the entire data set, which can be based on the data Users' needs impose different levels of privacy protection policies, but it is difficult to meet the individual privacy protection requirements required by each data owner; fourth, the privacy requirements required by each terminal device are different, and this is their own private information. Other participants or data trading platforms have no way of knowing

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data transaction method for personalized privacy protection requirement of terminal equipment
  • Data transaction method for personalized privacy protection requirement of terminal equipment
  • Data transaction method for personalized privacy protection requirement of terminal equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] The present invention will be described in detail below with reference to the accompanying drawings and specific embodiments. This embodiment is implemented on the premise of the technical solution of the present invention, and provides a detailed implementation manner and a specific operation process, but the protection scope of the present invention is not limited to the following embodiments.

[0028] like figure 1 Schematic diagram of individualized privacy and autonomous control of data privacy for the data owner shown. In the problem solved by the present invention, there are three types of participants: data owner, data transaction platform and data user. Data users submit data acquisition requirements to the data trading platform; data owners negotiate with the data trading platform on the privacy protection level and personalized incentive mechanism according to their privacy preferences, and increase disturbance to the original data according to the agreed pr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a data transaction method for a personalized privacy protection demand of terminal equipment. A data transaction platform firstly designs a series of contracts according to budget constraints and privacy preference information of a data owner; each data owner selects a contract from a series of contracts according to a target of optimizing own income and signs the contract with the platform; each data owner processes the original data according to a random perturbation mechanism corresponding to the privacy protection level in the signed contract and then submits the original data to the data transaction platform; the data transaction platform pays for each data owner according to the data transaction price in the signed contract after receiving the data acquired from the data owner; and the data transaction platform adopts an aggregation statistical method for the collected data to obtain an aggregation statistical result and returns the aggregation statistical result to the data consumer who puts forward the demand. And more accurate data can be obtained as much as possible under the condition of meeting personalized privacy constraint and selfish constraint, so that effectiveness optimization of transaction data is realized.

Description

technical field [0001] The invention relates to a data transaction technology oriented to edge intelligence, in particular to a data transaction method oriented to the personalized privacy protection requirements of terminal equipment. Background technique [0002] In recent years, with the rapid development of information technologies such as the Internet of Things, cloud computing, and artificial intelligence, the amount of global data has grown exponentially. According to the forecast of the international authoritative organization Statista, the global data generation volume is expected to reach 2142ZB in 2035, with a compound annual growth rate of nearly 30%, and the global data volume will usher in a larger explosion. In addition to this, the number of connected devices continues to grow steadily. A forecast by IDC estimates that by 2025, there will be 41.6 billion IoT devices worldwide and will generate 79.4ZB of data. These IoT devices are distributed in various plac...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06Q20/38
CPCG06F21/6245G06Q20/382
Inventor 冯珍妮俞思佳
Owner DONGHUA UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products