基于动态数据挖掘的匿名化隐私保护方法仿真  被引量:4

Simulation of Anonymous Privacy Protection Method Based on Dynamic Data Mining

在线阅读下载全文

作  者:田崇瑞[1] 李兆祥[1] 罗宇新[1] TIAN Chong-rui;LI Zhao-xiang;LUO Yu-xin(East University of Heilongjiang,Harbin,Harbin Heilongjiang 150066,China)

机构地区:[1]黑龙江东方学院

出  处:《计算机仿真》2019年第11期171-174,233,共5页Computer Simulation

基  金:2017年度黑龙江省高等教育教学改革项目(SJGY20170314);中国高等教育学会高等教育科学研究"十三五"教育科学规划课题(16YB035);黑龙江省高等教育教学改革项目(SJGY201703174);2017年度黑龙江省外语教育学术交流基地研究课题(T2017019)

摘  要:针对当前方法匿名化隐私保护效果差,导致出现隐私数据损失度大、数据可用性低的问题,提出基于动态数据挖掘的匿名化隐私保护方法。根据密码方案求解隐私数据的密文,并将其发送给数据挖掘的第三方,利用数据样本集和原始数据等条件构建隐私保护模型,在此基础上,通过数据特征来获取隐私数据的公钥和主密钥,得到隐私保护结构,根据隐私保护结构的根节点计算匿名用户的密钥,来达到系统初始化的目的;从密钥空间中选取一个数来当作密钥链的主密钥,从中得到存储密文,采用当前加密的密钥构成密钥链来存储隐私数据,并分析隐私数据的访问情况,利用拉格朗日系数计算匿名化隐私数据的加密密钥,得到隐私数据的临时密文,最终实现了匿名化隐私的保护。实验结果表明,提出方法在保护匿名化隐私对隐私数据加密时,加密时间较短,且隐私数据的损失度低、数据可用性高,具有较好的隐私保护效果。Currently, the effect of anonymous privacy protection is poor, which leads to large loss rate of privacy data and low availability of data. Therefore, a method of anonymous privacy protection based on dynamic data mining was proposed. According to the cryptographic scheme, the ciphertext of privacy data was solved, and then the ciphertext was sent to the third party of data mining. The data sample set and the original data were used to build the privacy protection model. On this basis, the public key and the primary key of privacy data were obtained through the data characteristics, so as to get the privacy protection structure. According to the root node of privacy protection structure, the key of anonymous user was calculated to achieve the purpose of system initialization. Moreover, a number was chosen from the key space as the main key of key chain, and thus to get the stored ciphertext. In addition, current encrypted keys were used to form the key chain, so as to store the privacy data. Meanwhile, the access situation of privacy data was analyzed. Finally, the Lagrangian coefficient was used to calculate the encryption key of anonymous privacy data and thus to get the temporary ciphertext of privacy data. Thus, the protection of anonymous privacy was achieved. Simulation results show that the proposed method has shorter encryption time, low loss rate of privacy data, higher data availability and better privacy protection effect.

关 键 词:动态数据挖掘 匿名化 隐私 保护 

分 类 号:TP13[自动化与计算机技术—控制理论与控制工程]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象