CN104794406A - Private data protecting method based on data camouflage model - Google Patents
Private data protecting method based on data camouflage model Download PDFInfo
- Publication number
- CN104794406A CN104794406A CN201510119589.1A CN201510119589A CN104794406A CN 104794406 A CN104794406 A CN 104794406A CN 201510119589 A CN201510119589 A CN 201510119589A CN 104794406 A CN104794406 A CN 104794406A
- Authority
- CN
- China
- Prior art keywords
- data
- feature
- private data
- storage environment
- mapping
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Abstract
The invention discloses a private data protecting method based on a data camouflage model. Firstly, features, which comprise file headers, file creators, file sizes, file formats, file types, creation date, last modified date and statistical information, of a data storage environment are analyzed; the information is extracted to serve as the features of the data storage environment, and different weights are endowed. The features are arranged in descending order according to the significance of the features, and the maximal first N features are selected to serve as the features of the data storage environment. The distance between private data and feature vectors of the data storage environment is calculated, the mapping between the N environmental features with the minimal distance and the private data features is established, and the mapping is stored into a mapping database; the user private data are converted into data expressed by environmental features according to the mapping. When a user needs to access the data, the data are recovered by mapping tables in the mapping database. The method is easy to achieve and to popularize.
Description
Technical field
The present invention proposes a kind of private data guard method based on data camouflage color model, the method relates to the fields such as internet data safety, image watermarking, large data security storage.
Background technology
Along with the development of internet and cloud computing technology, together with personal lifestyle is closely connected with various social networks, the information be closely related with personal identification and many spreading on internet of data grows.The private data of these magnanimity is for some enterprises or institutionally have very great value, and such as they are by excavating and analyze classifying to crowd of these data, obtain huge interests by precision marketing.The privacy of people has seriously been invaded when knowing nothing.How effectively the individual private data of protection becomes the problem that people are concerned about most.
In reality, soldier can by camouflage oneself being hidden in [1] in physical environment, ultimate principle becomes irregular part significant pattern or characteristic change exactly, use some combined materials, painted or illumination to be hidden in similar background, make them be difficult to be found.Gain enlightenment thus, we have proposed a kind of private data guard method based on data camouflage color model, the method carrys out hiding data by setting up a mode being similar to military camouflage painting the same, realizes the safe storage of individual private data.This method can improve the safety of individual private information significantly, eliminates people to the misgivings of social networks simultaneously.
Summary of the invention
The object of this invention is to provide a kind of private data guard method based on data camouflage color model; the method carrys out hiding data by setting up a mode being similar to military camouflage painting the same; realize the safe storage of individual private data, eliminate people simultaneously and using internet and the worry to individual private information security when interaction on social networks.
For achieving the above object, technical scheme of the present invention is:
The present invention proposes a kind of private data guard method based on data camouflage color model, the method analyzes the feature of user's private data, and adopts a maximum M feature to represent data.When user needs to store private data, first the feature of data storage environment is analyzed, comprise file title, document creation people, file size, file layout, file type, date created, finally revises the statistical information of date and data itself, extract the feature of these information as storage environment, and give different weights; Then carry out descending sort according to value, select wherein maximum top n feature as the feature of data storage environment.Calculate the distance between private data and the proper vector of storage environment, set up apart from the mapping between minimum N number of environmental characteristic and private data feature, and be deposited in mapping database; According to mapping data user's private data being converted to environmental characteristic and represent.When user needs to access these data time, recover raw data by the mapping table in mapping database.
Individual private data of the present invention is changed and is hidden schematic flow sheet as shown in Figure 1;
In the present invention, individual private data is changed and hides process flow diagram as shown in Figure 2, and its concrete steps are as follows:
1) individual private data feature interpretation
The present invention comprises title, author by extraction data, and some statistical informations of data itself are as the feature of data, and these features are defined as F
p={ F
p1, F
p2, F
p3... F
pm, wherein, m is characteristic dimension; Consider that the significance level of different characteristic is different, each feature is endowed different weights:
and adopt the M of a maximum weight feature to represent data;
2) storage environment feature is extracted
The present invention analyzes the feature of data storage environment, comprises file title, document creation people, file size, file layout, file type, date created, finally revise the statistical information of date and data itself, extract the feature of these information as storage environment, the feature of environmental characteristic is defined as F
e={ F
e1, F
e2, F
e3... F
en, the wherein characteristic dimension of n, and n is much larger than m.Consider that the significance degree of different characteristic is different, each feature is endowed different weights:
then carry out descending sort according to the conspicuousness of these features, the top n feature selecting wherein conspicuousness maximum is as the feature of data storage environment;
3) individual private data conversion is with hiding
The characterization of the individual private data that the present invention obtains according to step 1 and 2 represents and to represent with the characterization of data storage environment, calculates the distance between private data and the proper vector of storage environment, for every a pair (F
e, F
p), calculate their distance, (F
e, F
p) as follows apart from computing formula:
Dis(F
e,F
p)=||αF
e-αF
p||
By the distance of gained according to according to ascending order arrangement, selected distance minimum a pair as the distance of individual private data feature and storage environment feature, and sets up mapping ruler [F
e→ F
p], finally set up apart from the mapping between minimum N number of environmental characteristic and private data feature, and be deposited in mapping rules database; Then according to mapping data user's private data being converted to environmental characteristic and represent;
4) individual private data recovers
When user needs to access these data time, according to the environmental characteristic representing these data, extract original data characteristics from mapping rules database, by original data characteristics table registration certificate, thus recover data, and return to user.
The invention has the beneficial effects as follows, environmentally automatically can complete hiding individual private data, have good adaptive faculty to different data environments.The present invention utilizes data camouflage to hide data, add the difficulty that individual private data is excavated by unauthorized organizations and individuals and finds, significantly can improve the security of individual private data, eliminate the worry to safety problem when people use public network simultaneously, and the present invention easily realizes, be easy to promote.
Accompanying drawing explanation
Fig. 1 is the present invention individual private data conversion and hides schematic flow sheet schematic diagram.
Fig. 2 is that in the present invention, individual private data is changed and hides process flow diagram.
Embodiment
Below in conjunction with specific embodiment, the present invention is illustrated further.
Based on a private data guard method for data camouflage color model, the present invention is characterised in that: analyze user's private data and adopt a maximum M feature to represent data; Wherein, when user needs to store private data, first analyze the feature of data storage environment, comprise file title, document creation people, file size, file layout, file type, date created, finally revise the statistical information of date and data itself, extract the feature of these information as storage environment, and give different weights; Then carry out descending sort according to the conspicuousness of these features, select wherein maximum top n feature as the feature of data storage environment; Calculate the distance between private data and the proper vector of storage environment, set up apart from the mapping between minimum N number of environmental characteristic and private data feature, and be deposited in mapping rules database; User's private data converted to according to mapping ruler the data that environmental characteristic represents; When user needs to access these data time, recover raw data by the mapping table in mapping rules database.
1) individual private data feature interpretation
The present invention comprises title, author by extraction data, and some statistical informations of data itself are as the feature of data, and these features are defined as F
p={ F
p1, F
p2, F
p3... F
pm, wherein, m is characteristic dimension; Consider that the significance level of different characteristic is different, each feature is endowed different weights:
and adopt the M of a maximum weight feature to represent data;
2) storage environment feature is extracted
The present invention analyzes the feature of data storage environment, comprises file title, document creation people, file size, file layout, file type, date created, finally revise the statistical information of date and data itself, extract the feature of these information as storage environment, the feature of environmental characteristic is defined as F
e={ F
e1, F
e2, F
e3... F
en, the wherein characteristic dimension of n, and n is much larger than m.Consider that the significance degree of different characteristic is different, each feature is endowed different weights:
then carry out descending sort according to the conspicuousness of these features, the top n feature selecting wherein conspicuousness maximum is as the feature of data storage environment;
3) individual private data conversion is with hiding
The characterization of the individual private data that the present invention obtains according to step 1 and 2 represents and to represent with the characterization of data storage environment, calculates the distance between private data and the proper vector of storage environment, for every a pair (F
e, F
p), calculate their distance, (F
e, F
p) as follows apart from computing formula:
Dis(F
e,F
p)=||αF
e-αF
p||
By the distance of gained according to according to ascending order arrangement, selected distance minimum a pair as the distance of individual private data feature and storage environment feature, and sets up mapping ruler [F
e→ F
p], finally set up apart from the mapping between minimum N number of environmental characteristic and private data feature, and be deposited in mapping rules database; Then according to mapping data user's private data being converted to environmental characteristic and represent;
4) individual private data recovers
When user needs to access these data time, according to the environmental characteristic representing these data, extract original data characteristics from mapping rules database, by original data characteristics table registration certificate, thus recover data, and return to user.
Claims (2)
1. based on a private data guard method for data camouflage color model, it is characterized in that: analyze user's private data and adopt a maximum M feature to represent data; Wherein, when user needs to store private data, first analyze the feature of data storage environment, comprise file title, document creation people, file size, file layout, file type, date created, finally revise the statistical information of date and data itself, extract the feature of these information as storage environment, and give different weights; Then carry out descending sort according to the conspicuousness of these features, select wherein maximum top n feature as the feature of data storage environment; Calculate the distance between private data and the proper vector of storage environment, set up apart from the mapping between minimum N number of environmental characteristic and private data feature, and be deposited in mapping rules database; User's private data converted to according to mapping ruler the data that environmental characteristic represents; When user needs to access these data time, recover raw data by the mapping table in mapping rules database.
2. a kind of private data guard method based on data camouflage color model according to claim 1, is characterized in that: the step of user's private data conversion is:
1) individual private data feature interpretation
The present invention comprises title, author by extraction data, and some statistical informations of data itself are as the feature of data, and these features are defined as F
p={ F
p1, F
p2, F
p3... F
pm, wherein, m is characteristic dimension; Consider that the significance level of different characteristic is different, each feature is endowed different weights:
and adopt the M of a maximum weight feature to represent data;
2) storage environment feature is extracted
Analyze the feature of data storage environment, comprise file title, document creation people, file size, file layout, file type, date created, finally revise the statistical information of date and data itself, extract the feature of these information as storage environment, the feature of environmental characteristic is defined as F
e={ F
e1, F
e2, F
e3... F
en, the wherein characteristic dimension of n, and n is much larger than m; Consider that the significance degree of different characteristic is different, each feature is endowed different weights:
then carry out descending sort according to the conspicuousness of these features, the top n feature selecting wherein conspicuousness maximum is as the feature of data storage environment;
3) individual private data conversion is with hiding
The characterization of the individual private data obtained according to step 1 and 2 represents and to represent with the characterization of data storage environment, calculates the distance between private data and the proper vector of storage environment, for every a pair (F
e, F
p), calculate their distance, (F
e, F
p) as follows apart from computing formula:
Dis(F
e,F
p)=||aF
e-aF
p||
By the distance of gained according to according to ascending order arrangement, selected distance minimum a pair as the distance of individual private data feature and storage environment feature, and sets up mapping ruler [F
e→ F
p], finally set up apart from the mapping between minimum N number of environmental characteristic and private data feature, and be deposited in mapping rules database; Then according to mapping data user's private data being converted to environmental characteristic and represent;
4) individual private data recovers
When user needs to access these data time, according to the environmental characteristic representing these data, extract original data characteristics from mapping rules database, by original data characteristics table registration certificate, thus recover data, and return to user.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510119589.1A CN104794406B (en) | 2015-03-18 | 2015-03-18 | A kind of private data guard method based on data camouflage color model |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510119589.1A CN104794406B (en) | 2015-03-18 | 2015-03-18 | A kind of private data guard method based on data camouflage color model |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104794406A true CN104794406A (en) | 2015-07-22 |
CN104794406B CN104794406B (en) | 2018-03-27 |
Family
ID=53559195
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510119589.1A Active CN104794406B (en) | 2015-03-18 | 2015-03-18 | A kind of private data guard method based on data camouflage color model |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104794406B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106778295A (en) * | 2016-11-30 | 2017-05-31 | 广东欧珀移动通信有限公司 | File storage, display methods, device and terminal |
CN108133294A (en) * | 2018-01-10 | 2018-06-08 | 阳光财产保险股份有限公司 | Forecasting Methodology and device based on information sharing |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090132419A1 (en) * | 2007-11-15 | 2009-05-21 | Garland Grammer | Obfuscating sensitive data while preserving data usability |
CN101499116A (en) * | 2009-03-11 | 2009-08-05 | 宇龙计算机通信科技(深圳)有限公司 | Information hiding method, system and electronic equipment |
CN103106635A (en) * | 2012-12-26 | 2013-05-15 | 浙江大学 | Hiding method and device for digital camouflage information |
CN104200171A (en) * | 2014-08-20 | 2014-12-10 | 中国科学技术大学先进技术研究院 | Virtual file system based on information hiding |
-
2015
- 2015-03-18 CN CN201510119589.1A patent/CN104794406B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090132419A1 (en) * | 2007-11-15 | 2009-05-21 | Garland Grammer | Obfuscating sensitive data while preserving data usability |
CN101499116A (en) * | 2009-03-11 | 2009-08-05 | 宇龙计算机通信科技(深圳)有限公司 | Information hiding method, system and electronic equipment |
CN103106635A (en) * | 2012-12-26 | 2013-05-15 | 浙江大学 | Hiding method and device for digital camouflage information |
CN104200171A (en) * | 2014-08-20 | 2014-12-10 | 中国科学技术大学先进技术研究院 | Virtual file system based on information hiding |
Non-Patent Citations (1)
Title |
---|
涂植跑: ""数码迷彩的信息隐藏技术研究"", 《中国优秀硕士学位论文全文数据库信息科技辑》 * |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106778295A (en) * | 2016-11-30 | 2017-05-31 | 广东欧珀移动通信有限公司 | File storage, display methods, device and terminal |
CN106778295B (en) * | 2016-11-30 | 2020-04-10 | Oppo广东移动通信有限公司 | File storage method, file display method, file storage device, file display device and terminal |
CN108133294A (en) * | 2018-01-10 | 2018-06-08 | 阳光财产保险股份有限公司 | Forecasting Methodology and device based on information sharing |
WO2019137049A1 (en) * | 2018-01-10 | 2019-07-18 | 阳光财产保险股份有限公司 | Prediction method and apparatus based on information sharing, electronic device and computer storage medium |
CN108133294B (en) * | 2018-01-10 | 2020-12-04 | 阳光财产保险股份有限公司 | Prediction method and device based on information sharing |
Also Published As
Publication number | Publication date |
---|---|
CN104794406B (en) | 2018-03-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103823845B (en) | Method for automatically annotating remote sensing images on basis of deep learning | |
WO2019071754A1 (en) | Method for sensing image privacy on the basis of deep learning | |
Tschakert | Shifting discourses of vilification and the taming of unruly mining landscapes in Ghana | |
CN103020122A (en) | Transfer learning method based on semi-supervised clustering | |
CN108596211A (en) | It is a kind of that pedestrian's recognition methods again is blocked based on focusing study and depth e-learning | |
CN104317904B (en) | A kind of extensive method of Weight community network | |
CN102999638A (en) | Phishing website detection method excavated based on network group | |
CN102737237A (en) | Face image dimension reducing method based on local correlation preserving | |
CN106980651A (en) | A kind of knowledge based collection of illustrative plates crawls seed list update method and device | |
CN103473813B (en) | A kind of extraction method of threedimensional model component | |
CN104765852B (en) | Data digging method based on fuzzy algorithmic approach under big data background | |
Li et al. | Nonlinear projection based gradient estimation for query efficient blackbox attacks | |
CN104794406A (en) | Private data protecting method based on data camouflage model | |
CN115761310A (en) | Method and system for generating customizable countermeasure patch | |
CN116108167A (en) | Personal sensitive information classification method combined with knowledge graph | |
CN102314667B (en) | Vertex weight value-based OBJ (object)-format three-dimensional model digital-watermarking method | |
CN104580234B (en) | The guard method of behavioural characteristic in a kind of social networks | |
CN108427752A (en) | A kind of article meaning of one's words mask method using event based on isomery article | |
US20180322214A1 (en) | Data display method | |
CN105320647B (en) | A kind of user characteristics modeling method based on word interbehavior | |
CN107577681A (en) | A kind of terrain analysis based on social media picture, recommend method and system | |
CN105488458B (en) | A kind of Ship Target character representation method based on image space structure distribution | |
CN110990869B (en) | Power big data desensitization method applied to privacy protection | |
Wu et al. | A security concern about deep learning models | |
Ni et al. | A tally system based on CNN and block chain |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
EXSB | Decision made by sipo to initiate substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |