CN109583227A - A kind of method for protecting privacy, apparatus and system - Google Patents

A kind of method for protecting privacy, apparatus and system Download PDF

Info

Publication number
CN109583227A
CN109583227A CN201811272603.1A CN201811272603A CN109583227A CN 109583227 A CN109583227 A CN 109583227A CN 201811272603 A CN201811272603 A CN 201811272603A CN 109583227 A CN109583227 A CN 109583227A
Authority
CN
China
Prior art keywords
privacy
secret protection
preserving algorithms
privacy preserving
algorithms
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811272603.1A
Other languages
Chinese (zh)
Other versions
CN109583227B (en
Inventor
李凤华
牛犇
李晖
谢绒娜
李维皓
朱辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xidian University
Institute of Information Engineering of CAS
Original Assignee
Xidian University
Institute of Information Engineering of CAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xidian University, Institute of Information Engineering of CAS filed Critical Xidian University
Priority to CN201811272603.1A priority Critical patent/CN109583227B/en
Publication of CN109583227A publication Critical patent/CN109583227A/en
Application granted granted Critical
Publication of CN109583227B publication Critical patent/CN109583227B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Landscapes

  • Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Databases & Information Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Medical Informatics (AREA)
  • Storage Device Security (AREA)

Abstract

The embodiment of the invention discloses a kind of method for protecting privacy, apparatus and system, the method for protecting privacy includes: the privacy information feature for obtaining privacy information;Secret protection scheme is determined according at least one of scene information and privacy information feature, and at least one of the Privacy preserving algorithms in secret protection scheme and secret protection scheme are assessed.The embodiment of the present invention determines the normalization framework of Privacy preserving algorithms and secret protection scheme according to privacy information feature and scene information, and designs the Privacy preserving algorithms and secret protection scheme for adapting to specific application scene and privacy information;According to the assessment result of Privacy preserving algorithms and secret protection scheme; it is designed by the iterative manner of Privacy preserving algorithms and secret protection scheme and adapts to specific application scene and privacy information, the Privacy preserving algorithms for meeting secret protection demand and secret protection scheme, improve design, realization and the efficiency of assessment.

Description

A kind of method for protecting privacy, apparatus and system
Technical field
The present embodiments relate to but be not limited to information technology field, espespecially a kind of method for protecting privacy, device and System.
Background technique
As information technology and network technology are lasting, fast-developing, related application is widely available and personalized service is continuous Evolution, large-scale Internet company have accumulated mass data during providing service, these data are frequently cross-border, interdepartmental System, across the ecosphere interaction have become normality, and it is intentional in different information systems or be not intended to retain to cause privacy information, and by A large number of users privacy information is contained in the data of accumulation.So that user enjoy work, life, in terms of it is convenient same When, data face disclosure risk during data collection, shared, storage, analysis etc., seriously threaten privacy of user peace Entirely.
Existing privacy information protection scheme is protected only for special scenes, specific data, but due to privacy information class Type multiplicity, secret protection demand are different, and privacy algorithm protective capability is different, lacks row when designing specific Privacy preserving algorithms Effective guideline;Different secret protection demands results in the need for carrying out same or like algorithm more under different application scene Secondary exploitation reduces the reusability of code, increases development amount and cost;Algorithm parameter by developer according to demand Artificial selection lacks the mechanism that automation solves optimized parameter, affects the effect of algorithm.
Summary of the invention
The embodiment of the invention provides a kind of method for protecting privacy, apparatus and system, and it is specific can to design adaptation Application scenarios and privacy information, the Privacy preserving algorithms for meeting secret protection demand and secret protection scheme, improve design, reality Now with the efficiency of assessment.
At least one the embodiment of the invention provides a kind of method for protecting privacy, include the following steps:
Obtain the privacy information feature of privacy information;
Secret protection scheme is determined according at least one of scene information and privacy information feature.
In embodiments of the present invention, further includes:
At least one of Privacy preserving algorithms in the secret protection scheme and secret protection scheme are assessed.
In embodiments of the present invention, described that secret protection scheme assess including at least one of:
The secret protection effect of secret protection scheme is assessed;
The complexity of secret protection scheme is assessed;
It includes at least one of that the Privacy preserving algorithms in secret protection scheme, which carry out assessment:
The secret protection effect of Privacy preserving algorithms in secret protection scheme is assessed;
The complexity of Privacy preserving algorithms in secret protection scheme is assessed.
In embodiments of the present invention, the secret protection effect to the Privacy preserving algorithms in secret protection scheme carries out Assessment includes:
Calculate the secret protection Effect value of the Privacy preserving algorithms;
When the secret protection Effect value of the Privacy preserving algorithms is greater than or equal to the demand of the Privacy preserving algorithms Middle secret protection effect desired value judges that the Privacy preserving algorithms are commented by the secret protection effect of Privacy preserving algorithms Estimate;
When privacy in the demand that the secret protection Effect value of the Privacy preserving algorithms is less than the Privacy preserving algorithms Protecting effect desired value judges the Privacy preserving algorithms not over the secret protection recruitment evaluation of Privacy preserving algorithms.
In embodiments of the present invention, the secret protection Effect value of the Privacy preserving algorithms includes one or more of Any combination:
Using between the privacy information before the Privacy preserving algorithms treated privacy information and processing departure, adopt It is deduced with the loss ratio between the privacy information before the Privacy preserving algorithms treated privacy information and processing, attacker The probability of privacy information before the Privacy preserving algorithms are handled.
In embodiments of the present invention, the complexity of the Privacy preserving algorithms includes any group of one or more of It closes: time complexity, space complexity;
It includes one or more of that the complexity to the Privacy preserving algorithms in secret protection scheme, which carries out assessment, Any combination:
The time complexity of the Privacy preserving algorithms is assessed;
The space complexity of the Privacy preserving algorithms is assessed.
In embodiments of the present invention, the time complexity to Privacy preserving algorithms, which assess, includes:
Judge whether the speed of service of Privacy preserving algorithms meets the minimum fortune in the demand of the Privacy preserving algorithms Scanning frequency degree;
Minimum operation speed in the demand that the speed of service of Privacy preserving algorithms is greater than or equal to Privacy preserving algorithms When, judge that Privacy preserving algorithms are assessed by the time complexity of Privacy preserving algorithms;
When the minimum operation speed in the demand that the speed of service of Privacy preserving algorithms is less than Privacy preserving algorithms, judgement Privacy preserving algorithms are assessed not over the time complexity of Privacy preserving algorithms out.
In embodiments of the present invention, the space complexity to Privacy preserving algorithms carry out assessment include it is following a kind of or A variety of any combination:
Whether the software resource for judging that the Privacy preserving algorithms operation occupies meets in the needs of Privacy preserving algorithms The software resource needed;
When the software resource that Privacy preserving algorithms operation occupies is less than or equal in the demand of Privacy preserving algorithms When the software resource needed, it is soft in the space complexity assessment of Privacy preserving algorithms to judge that the Privacy preserving algorithms pass through Part stock assessment;
Need in the demand that the software resource that Privacy preserving algorithms operation occupies is greater than the Privacy preserving algorithms When the software resource wanted, judge that the Privacy preserving algorithms are assessed not over the space complexity of the Privacy preserving algorithms In software resource assessment;
Judge whether the hardware resource of the operation occupancy of the Privacy preserving algorithms meets the need of the Privacy preserving algorithms Seek the hardware resource of middle needs;
When the hardware resource that Privacy preserving algorithms operation occupies is less than or equal to the demand of the Privacy preserving algorithms In needs hardware resource when, judge that the Privacy preserving algorithms are commented by the space complexity of the Privacy preserving algorithms Estimate middle hardware resource assessment;
When hard in the demand that the hardware resource that Privacy preserving algorithms operation occupies is greater than the Privacy preserving algorithms When part resource, judge the Privacy preserving algorithms not over hardware in the space complexity assessment of the Privacy preserving algorithms Stock assessment.
In embodiments of the present invention, the secret protection effect to secret protection scheme, which assess, includes:
Calculate the secret protection Effect value of the secret protection scheme;
It is protected when the secret protection Effect value of the secret protection scheme is greater than or equal to privacy in the secret protection demand When protecting effect desired value, judge that the secret protection scheme passes through the secret protection recruitment evaluation of secret protection scheme;
It is protected when the secret protection Effect value of the secret protection scheme is less than privacy in the secret protection scheme demand When protecting effect desired value, judge the secret protection scheme not over the secret protection recruitment evaluation of Privacy preserving algorithms.
In embodiments of the present invention, the secret protection Effect value of the secret protection scheme includes one or more of Any combination:
Using between the privacy information before the secret protection scheme treated privacy information and processing departure, adopt It is deduced with the loss ratio between the privacy information before the secret protection scheme treated privacy information and processing, attacker The probability of privacy information before the secret protection scheme is handled.
In embodiments of the present invention, the complexity of the secret protection scheme includes any group of one or more of It closes: time complexity, space complexity;
The complexity to secret protection scheme carries out any combination that assessment includes one or more of:
The time complexity of the secret protection scheme is assessed;
The space complexity of the secret protection scheme is assessed.
In embodiments of the present invention, the time complexity to secret protection scheme, which assess, includes:
Judge whether the speed of service of secret protection scheme meets the minimum operation speed in the secret protection demand;
When the speed of service of secret protection scheme is greater than or equal to the minimum operation speed in secret protection demand, judgement Secret protection scheme is assessed by the time complexity of secret protection scheme out;
When the speed of service of secret protection scheme is less than the minimum operation speed in secret protection demand, privacy is judged Protection scheme is assessed not over the time complexity of secret protection scheme.
In embodiments of the present invention, the space complexity to secret protection scheme carry out assessment include it is following a kind of or A variety of any combination:
Judge whether the software resource of the secret protection scheme operation occupancy meets the needs in secret protection demand Software resource;
When the software resource that secret protection scheme operation occupies is less than or equal to the needs in secret protection demand When software resource, judge that the secret protection scheme passes through the software resource in the space complexity assessment of secret protection scheme Assessment;
When the software resource that secret protection scheme operation occupies is greater than the soft of the needs in the secret protection demand When part resource, judge the secret protection scheme not over soft in the space complexity assessment of the secret protection scheme Part stock assessment;
Whether the hardware resource for judging that the secret protection scheme operation occupies meets needs in the secret protection demand Hardware resource;
When the hardware resource that secret protection scheme operation occupies is less than or equal to the need in the secret protection demand When the hardware resource wanted, judge that the secret protection scheme passes through in the space complexity assessment of the secret protection scheme firmly Part stock assessment;
When the hardware resource that secret protection scheme operation occupies is greater than the hardware resource in the secret protection demand When, judge that the secret protection scheme is commented not over hardware resource in the space complexity assessment of the secret protection scheme Estimate.
In embodiments of the present invention, described to determine that privacy is protected according at least one of scene information and privacy information feature Shield scheme includes the following steps one or more any combination:
Secret protection demand is generated according at least one of scene information and privacy information feature;
Privacy is determined according to one or more any combination in scene information, privacy information feature, secret protection demand The demand of protection algorism;
According to one or more in scene information, privacy information feature, secret protection demand, the demand of Privacy preserving algorithms A any combination determines at least one of: the type of Privacy preserving algorithms and the theoretical basis of Privacy preserving algorithms;
It is calculated according to scene information, privacy information feature, secret protection demand, the demand of Privacy preserving algorithms, secret protection Any combination of one or more of the type of method, the theoretical basis of Privacy preserving algorithms provide Privacy preserving algorithms step and Syntagmatic between Privacy preserving algorithms step;
According to one in scene information, secret protection demand, the demand of Privacy preserving algorithms, Privacy preserving algorithms step Or the parameter of multiple any combination selection Privacy preserving algorithms;
The Privacy preserving algorithms step and secret protection are calculated according to the syntagmatic between Privacy preserving algorithms step The parameter of method is combined generation Privacy preserving algorithms;
According to appointing for one or more of scene information, privacy information feature, secret protection demand, Privacy preserving algorithms Meaning combines the assembled scheme for determining Privacy preserving algorithms;
The Privacy preserving algorithms are combined according to the assembled scheme of the Privacy preserving algorithms and generate privacy guarantor Shield scheme.
In embodiments of the present invention, further includes:
At least one of Privacy preserving algorithms in the secret protection scheme and secret protection scheme are assessed, Execute at least one of:
When the Privacy preserving algorithms are not over assessment, Privacy preserving algorithms step, hidden is modified according to assessment result Any combination of one or more of syntagmatic, the parameter of Privacy preserving algorithms between private protection algorism step, continues to hold According to the syntagmatic between Privacy preserving algorithms step to the Privacy preserving algorithms step and Privacy preserving algorithms described in row Parameter be combined generate Privacy preserving algorithms the step of;
When the Privacy preserving algorithms have passed through assessment, and the secret protection scheme is not over assessment, modification The Privacy preserving algorithms assembled scheme continues to execute the assembled scheme according to the Privacy preserving algorithms to described hidden Private protection algorism is combined the step of generating secret protection scheme;
When Privacy preserving algorithms have passed through assessment, but by repeatedly modifying Privacy preserving algorithms assembled scheme, new is hidden When private protection scheme is again without assessment is passed through, the combination between modification Privacy preserving algorithms step, Privacy preserving algorithms step is closed System, Privacy preserving algorithms one or more of parameter any combination, continue to execute and described walked according to Privacy preserving algorithms Syntagmatic between rapid, which is combined the parameter of the Privacy preserving algorithms step and Privacy preserving algorithms, generates privacy guarantor The step of protecting algorithm, then the Privacy preserving algorithms assembled scheme is modified, it continues to execute described according to the Privacy preserving algorithms Assembled scheme to the Privacy preserving algorithms be combined generate secret protection scheme the step of.
In embodiments of the present invention, the secret protection demand includes any combination of one or more of:
Secret protection effect desired value, the performance requirement of secret protection scheme, the privacy operations, constraint of secret protection scheme Corresponding relationship between condition, privacy operations and constraint condition;
Wherein, constraint condition is used to describe to carry out the condition that privacy operations need to meet, comprising: application entity attribute, behaviour Make environment;
The operating environment includes: time, spatial position, network, equipment.
In embodiments of the present invention, the performance requirement of the secret protection scheme is not limited to include one or more of Any combination:
The environment of operation, minimum operation speed, the software resource of needs, needs hardware resource.
In embodiments of the present invention, the demand of the Privacy preserving algorithms includes at least one of: Privacy preserving algorithms Secret protection effect desired value and performance requirement;
The performance requirement of the Privacy preserving algorithms be not limited to include one or more of any combination:
The environment of operation, minimum operation speed, the software resource of needs, needs hardware resource.
In embodiments of the present invention, the type of the Privacy preserving algorithms includes any combination of one or more of:
Privacy preserving algorithms based on cryptography, the Privacy preserving algorithms based on upset are calculated based on the secret protection obscured Method, based on extensive Privacy preserving algorithms, based on the Privacy preserving algorithms of access control.
In embodiments of the present invention, the theoretical basis of the Privacy preserving algorithms includes any group of one or more of It closes:
Secret protection technology, secret protection technology based on probability, the secret protection skill based on game based on cryptography Art.
In embodiments of the present invention, the Privacy preserving algorithms step is not limited to include any group of one or more of It closes:
S variation, P displacement, cipher key spreading, initialization, setting memory, linear feedback shift register device, nonlinear feedback Shift register determines and upsets granularity, addition noise, set information weight, the scramble data for screening the condition that meets, chooses and obscure Information constitutes solicited message in conjunction with real information, determines fuzzy granularity, setting fuzzy ranges, construction solicited message.
In embodiments of the present invention, the parameter of the Privacy preserving algorithms includes any combination of one or more of:
It is key length, anonymous set sizes, privacy budget, susceptibility, drift rate, block length, encryption round number, S box, more Item formula parameter, MDS code, P permutation table.
In embodiments of the present invention, the privacy information feature includes any combination of following one or more:
Privacy information type, privacy information content, data value range, data distribution characteristics, privacy information susceptibility, Desired value, the social experience value of privacy operations result of executable privacy operations, privacy operations number.
In embodiments of the present invention, the susceptibility of the privacy information is the value for scaling information sensitivity, is passed through Probability, mathematic expectaion, any combination one or more in mathematics variance, which calculate, to be obtained.
In embodiments of the present invention, the executable privacy operations include any combination of one or more of:
Reading and writing, encryption, it is fuzzy, extensive, plus make an uproar, anonymity, signature, sign test, calculate abstract, encryption, save, replicate, glue Patch, shearing, modification, is deleted at forwarding.
In embodiments of the present invention, the scene information includes any combination of one or more of:
Time, spatial position, equipment, equipment performance, interactive object, interaction approach, request type, service type.
At least one the embodiment of the present invention proposes a kind of privacy information protection device, comprise the following modules:
Privacy information feature obtains module, for obtaining the privacy information feature of privacy information;
Secret protection program decisions module, for hidden according to the determination of at least one of scene information and privacy information feature Private protection scheme.
In embodiments of the present invention, further includes:
Secret protection scheme evaluation module, for the secret protection in the secret protection scheme and secret protection scheme At least one of algorithm is assessed.
The embodiment of the present invention proposes a kind of privacy information protection device, including processor and computer-readable storage medium Matter is stored with instruction in the computer readable storage medium, when described instruction is executed by the processor, realizes above-mentioned A kind of method for protecting privacy.
The embodiment of the present invention proposes a kind of computer readable storage medium, is stored thereon with computer program, the meter The step of calculation machine program realizes any of the above-described kind of method for protecting privacy when being executed by processor.
The embodiment of the present invention proposes a kind of privacy information protection system, comprising:
Privacy information feature obtains module, for obtaining the privacy information feature of privacy information;
Secret protection program decisions module, for hidden according to the determination of at least one of scene information and privacy information feature Private protection scheme;
Wherein, privacy information feature obtains module and different equipment is arranged in secret protection program decisions module.
In embodiments of the present invention, further includes:
Secret protection scheme evaluation module, for the secret protection in the secret protection scheme and secret protection scheme At least one of algorithm is assessed;
Wherein, the secret protection scheme evaluation module, privacy information feature obtain module and secret protection program decisions Different equipment is arranged at least two modules in module.
The embodiment of the present invention includes: obtain the privacy information feature of privacy information;It is special according to scene information and privacy information At least one of sign determines secret protection scheme.The embodiment of the present invention determines privacy based on privacy information feature and scene information Protection scheme improves the efficiency of Privacy preserving algorithms and secret protection conceptual design, realization and assessment.
In another embodiment, by pretreatment, the acquisition of privacy information feature, Privacy preserving algorithms class Syntagmatic between the determination of type or theoretical basis, the selection of Privacy preserving algorithms step and design, Privacy preserving algorithms step Determination and the ring layouts such as design, parameter designing meet the safe and efficient secret protection of specific application scene and privacy information Algorithm.Wherein, pretreatment is mainly used for carrying out suitability processing to privacy information, scene information in advance, it is ensured that the privacy of design Protection algorism meets specific privacy information and scene information;The type or theoretical basis of Privacy preserving algorithms are mainly according to scene Information, privacy information feature, secret protection demand, the demand of Privacy preserving algorithms determine, it is ensured that the Privacy preserving algorithms of design Secret protection is provided on demand;It is protected by the type or theoretical basis, Privacy preserving algorithms step, privacy that determine Privacy preserving algorithms The links such as algorithm steps combination, parameter designing are protected, Privacy preserving algorithms design efficiency and secret protection effect are improved;According to field Scape information, privacy information feature, secret protection demand determine Privacy preserving algorithms assembled scheme, protect to the privacy of design or selection Shield algorithm is combined, and then generates complete set, architecture secret protection scheme;The assessment of secret protection scheme is used for Privacy preserving algorithms and secret protection scheme to generation are assessed from secret protection effect and performance.
The embodiment of the present invention is calculated according to the characteristics of application scenarios, privacy information with Privacy preserving algorithms, extraction secret protection The essential characteristic of method, determines the normalization framework of Privacy preserving algorithms, and designs and adapt to specific application scene and privacy information Privacy preserving algorithms.Based on this, the universal programming frame of Privacy preserving algorithms Iterative Design and Privacy preserving algorithms is realized.
The embodiment of the present invention provides the characteristics of according to application scenarios, privacy information, selects Privacy preserving algorithms, determines privacy The assembled scheme of protection algorism, and it is hidden to design and/or the one or more of selection according to the assembled scheme of Privacy preserving algorithms Private protection algorism, which is combined, generates secret protection scheme.Based on this, realizes secret protection scheme Iterative Design and privacy is protected The universal programming frame of shield scheme.
The embodiment of the present invention is provided according to Privacy preserving algorithms assessment result, by algorithm iteration mode, determines that privacy is protected The syntagmatic and algorithm parameter selection and optimization between algorithm steps, Privacy preserving algorithms step are protected, it is specific hidden to design adaptation Personal letter breath and application scenarios, meet the Privacy preserving algorithms of secret protection demand, improve the efficiency of algorithm design and realization.
The embodiment of the present invention is provided according to secret protection scheme evaluation as a result, being calculated by Privacy preserving algorithms and secret protection The adjustment and modification of method assembled scheme, design meet the secret protection scheme of secret protection demand, improve secret protection scheme and set Meter and the efficiency realized.
The other feature and advantage of the embodiment of the present invention will illustrate in the following description, also, partly from explanation It is become apparent in book, or understood by implementing the embodiment of the present invention.The purpose of the embodiment of the present invention and other advantages It can be achieved and obtained by structure specifically noted in the specification, claims and drawings.
Detailed description of the invention
Attached drawing is used to provide one for further understanding technical solution of the embodiment of the present invention, and constituting specification Point, it is used to explain the present invention the technical solution of embodiment together with the embodiment of the embodiment of the present invention, does not constitute to the present invention The limitation of embodiment technical solution.
Fig. 1 is the flow chart for the method for protecting privacy that one embodiment of the invention proposes;
Fig. 2 is the embodiment of the present invention according to the determining secret protection side of at least one of scene information and privacy information feature The flow chart of the method for case;
Fig. 3 is the structure composition schematic diagram for the privacy information protection device that another embodiment of the present invention proposes;
Fig. 4 is the structure composition schematic diagram of secret protection of embodiment of the present invention program decisions module.
Specific embodiment
The embodiment of the present invention is described in detail below in conjunction with attached drawing.It should be noted that in the feelings not conflicted Under condition, the feature in embodiment and embodiment in the present invention can mutual any combination.
Step shown in the flowchart of the accompanying drawings can be in a computer system such as a set of computer executable instructions It executes.Also, although logical order is shown in flow charts, and it in some cases, can be to be different from herein suitable Sequence executes shown or described step.
At least one referring to Fig. 1, one embodiment of the invention proposes a kind of method for secret protection, include the following steps:
Step 100, the privacy information feature for obtaining privacy information.
In embodiments of the present invention, information analysis can be carried out to privacy information and/or is calculated in privacy information Privacy information feature.Specifically, privacy information feature can be obtained using one or more any combination of following technology:
Semantic analysis technology, machine learning techniques, depth learning technology, probabilistic method, method of information theory.
In embodiments of the present invention, privacy information feature includes any combination of following one or more:
Privacy information type, privacy information content, data value range, data distribution characteristics, privacy information susceptibility, Desired value, the social experience value of privacy operations result of executable privacy operations, privacy operations number.
Wherein, data distribution characteristics are used to measure the statistical property of privacy information distribution, can pass through the side of probability statistics Method obtains.
The susceptibility of privacy information is the value for scaling information sensitivity, can pass through probability, mathematic expectaion, mathematics One or more any combination calculates the susceptibility of the information in variance.
The executable privacy operations include any combination of one or more of:
Reading and writing, encryption, it is fuzzy, extensive, plus make an uproar, anonymity, signature, sign test, calculate abstract, encryption, save, replicate, glue Patch, shearing, modification, is deleted at forwarding.
Step 101 determines secret protection scheme according at least one of scene information and privacy information feature.
In embodiments of the present invention, referring to fig. 2, step 101 includes:
Step 201 generates secret protection demand according at least one of scene information and privacy information feature.
In embodiments of the present invention, scene information include be not limited to include one or more of any combination:
Time, spatial position, equipment, equipment performance, interactive object, interaction approach, request type, service type.
Wherein, scene belongs to different application scenarios, may include any combination of one or more of: shared field Scape, inquiry scene, payment scene.Different application scenarios have different scene informations.
In embodiments of the present invention, secret protection demand include be not limited to include one or more of any combination:
Secret protection effect desired value, the performance requirement of secret protection scheme, the privacy operations, constraint of secret protection scheme Corresponding relationship between condition, privacy operations and constraint condition;
The secret protection effect desired value of secret protection scheme is handled for describing privacy information using secret protection scheme The various desired values of front and back, any combination including one or more of:
Using between the privacy information before secret protection scheme treated privacy information and processing departure desired value, It is pushed away using the loss between the privacy information before secret protection scheme treated privacy information and processing than desired value, attacker Measure the desired value of the probability of privacy information before secret protection scheme is handled;
The performance requirement of secret protection scheme include be not limited to include one or more of any combination:
The environment of operation, minimum operation speed, the software resource of needs, needs hardware resource;
Constraint condition is used to describe to carry out the condition that privacy operations need to meet, including is not limited to include: application entity category Property, operating environment;
Wherein, application entity attribute be to privacy information carry out privacy operations entity attributes, including be not limited to include: Identity, role, relationship, address, cell-phone number, ID number, telephone number, occupation.
The operating environment includes being not limited to include: time, spatial position, network, equipment;
Wherein, generating secret protection demand can be generated by the way of being manually entered, or according to the rule being pre-designed It generates, both modes are all in the protection scope of the embodiment of the present invention.
Wherein, it is pre-designed rule and secret protection demand is generated according to scene information and privacy information feature for describing Method can be described using natural language and/or Formal Languages mode.
Being pre-designed rule can be using following method, but is not limited to following method: can be by scene information and/or privacy Information characteristics are directly mapped by chart or aggregate manner, or are mapped by function.
Such as: the service type in scene information is mapped as secret protection effect desired value, for example service type is gold Melt business, related data sensitive is relatively high, and secret protection effect desired value is high, if service type is to search for some position The restaurant or market on periphery are set, related data sensitive is not high, and secret protection effect desired value is low;According in scene information Equipment or equipment performance are mapped as the performance requirement of secret protection scheme, for example, the software resource, needs needed hardware resource, The environment of operation;It can be respective operations entity attribute by privacy information Type mapping in privacy information feature, privacy operations, hidden Private operation constraint condition, the operation that can be carried out for different types of privacy information such as text, picture, video etc. is different, It is also different to application entity attribute;
The spatial position of scene information can be mapped as to corresponding application entity attribute, privacy operations, privacy operations about Beam condition, such as in an office environment, the operation such as can read and write, and the identity in application entity attribute meets certain Condition, and hotel, this open environment in airport and railway station outside, only allow to carry out read operation, application entity Identity in attribute must satisfy specific condition etc..
Step 202, according to one or more any combination in scene information, privacy information feature, secret protection demand Determine the demand of Privacy preserving algorithms.
In embodiments of the present invention, the demand of Privacy preserving algorithms includes at least one of:
The performance requirement of the secret protection effect desired values of Privacy preserving algorithms, Privacy preserving algorithms.
Wherein, the secret protection effect desired value of Privacy preserving algorithms is for describing privacy information using Privacy preserving algorithms Various desired values before and after the processing, any combination including one or more of:
Using between the privacy information before Privacy preserving algorithms treated privacy information and processing departure desired value, It is pushed away using the loss between the privacy information before Privacy preserving algorithms treated privacy information and processing than desired value, attacker Measure the desired value of the probability of privacy information before Privacy preserving algorithms are handled;
Wherein, the performance requirement of Privacy preserving algorithms includes but is not limited to any combination for including one or more of:
The environment of operation, minimum operation speed, the software resource of needs, needs hardware resource.
Wherein it is determined that the secret protection effect desired value of Privacy preserving algorithms and the performance requirement of Privacy preserving algorithms can be with It is generated by the way of being manually entered, or is generated according to the rule being pre-designed, both modes are all in the embodiment of the present invention In protection scope.
Wherein, it is hidden for describing to determine according to scene information, privacy information feature, secret protection demand to be pre-designed rule Private protection algorism performance requirement.
Being pre-designed rule can be using following method, but is not limited to following method: can be by scene information, privacy information Feature, secret protection demand are directly mapped by chart or aggregate manner, or are mapped by function.
In the embodiment of the present invention, appointed according to one or more in scene information, privacy information feature, secret protection demand Meaning combines the secret protection effect desired value for determining Privacy preserving algorithms, such as scene information, privacy information feature, privacy are protected The secret protection effect desired value of shield demand is mapped as the secret protection effect desired value of Privacy preserving algorithms;
Privacy is determined according to any combination one or more in scene information, privacy information feature, secret protection demand The performance requirement of protection algorism, such as: if scene information belongs to server end, the speed of service is required for Privacy preserving algorithms Fastly, for example calculating how many times per second are required, or the data flow of processing how many byte.If Privacy preserving algorithms are that signature is calculated Method, it is desirable that completion how many times signature per second;If scene information is terminal device, software and hardware resources environment is limited, secret protection Algorithm software and hardware resources can set limitation;If restricted to the space of operation in secret protection demand, to Privacy preserving algorithms Running environment also have corresponding requirement.
Step 203, according in scene information, privacy information feature, secret protection demand, the demand of Privacy preserving algorithms One or more any combination determine at least one of: the type of Privacy preserving algorithms and the theoretical base of Privacy preserving algorithms Plinth.
In embodiments of the present invention, the type of Privacy preserving algorithms includes but is not limited to times for including one or more of Meaning combination:
Privacy preserving algorithms based on cryptography, the Privacy preserving algorithms based on upset are calculated based on the secret protection obscured Method, based on extensive Privacy preserving algorithms, based on the Privacy preserving algorithms of access control.
The theoretical basis of the Privacy preserving algorithms includes but is not limited to any combination for including one or more of:
Secret protection technology, secret protection technology based on probability, the secret protection skill based on game based on cryptography Art.
Wherein it is determined that the type of Privacy preserving algorithms and the theoretical basis of Privacy preserving algorithms can be using being manually entered Mode generates, or is generated according to the rule being pre-designed, both modes are all in the protection scope of the embodiment of the present invention.
Wherein, rule is pre-designed for describing according to scene information, privacy information feature, secret protection demand, privacy Protection algorism performance requirement determines the theoretical basis of Privacy preserving algorithms type and Privacy preserving algorithms.
Being pre-designed rule can be using following method, but is not limited to following method: can be by scene information, privacy information Feature, secret protection demand, the demand of Privacy preserving algorithms directly mapped by chart or aggregate manner, classified matching method or Person is mapped by function;
Such as: the type of Privacy preserving algorithms is determined according to the privacy operations that can be carried out in the demand of Privacy preserving algorithms, If privacy operations are only obscured, then Privacy preserving algorithms can only be selected based on the Privacy preserving algorithms obscured;If privacy It requires the speed of service than very fast in the performance requirement of protection algorism, is run then the type of Privacy preserving algorithms can only select to meet The algorithm types of speed;If the secret protection effect desired value of Privacy preserving algorithms is relatively high, Privacy preserving algorithms can only be selected Select the Privacy preserving algorithms based on cryptography;
It can equally be selected according to scene information, privacy information feature, secret protection demand, Privacy preserving algorithms performance requirement Select Privacy preserving algorithms theoretical basis, for example the secret protection effect desired value of Privacy preserving algorithms is relatively high, secret protection is calculated Law theory basis must use the secret protection technology based on cryptography;If privacy operations only have anonymous operation, secret protection Theory of algorithm basis can only use secret protection technology based on probability.
Step 204, according to scene information, privacy information feature, secret protection demand, the demand of Privacy preserving algorithms, hidden Any combination of one or more of the type of private protection algorism, the theoretical basis of Privacy preserving algorithms, provides secret protection Syntagmatic between algorithm steps and Privacy preserving algorithms step.
In embodiments of the present invention, described according to scene information, privacy information feature, secret protection demand, secret protection Any combination of one or more of the demand of algorithm, the type of Privacy preserving algorithms, the theoretical basis of Privacy preserving algorithms, Determine that Privacy preserving algorithms step equally can directly be mapped or be mapped using function.For example, according to Privacy preserving algorithms Type and Privacy preserving algorithms theoretical basis select Privacy preserving algorithms step, if the theory of Privacy preserving algorithms be base It is the Privacy preserving algorithms based on cryptography in the type of the secret protection technology of cryptography, Privacy preserving algorithms, can only selects Cryptographic algorithm step, further privacy operations are signature, and Privacy preserving algorithms step can only select to be based on signature algorithm password mould Block;It is main to select lightweight cryptographic algorithm step if hardware and software is resource-constrained in the performance requirement of Privacy preserving algorithms;
It is described according to scene information, privacy information feature, secret protection demand, Privacy preserving algorithms performance requirement, hidden Any combination of one or more of the type of private protection algorism, the theoretical basis of Privacy preserving algorithms, determines secret protection Syntagmatic between algorithm steps equally can directly be mapped or be mapped using function.Wherein, the step of selected algorithm Between there are successive logic and execute sequence, then guarantee that the logic of script and execution sequence are constant, executed;Selected calculation There is no successive logic between the step of method and execute sequence, then the step of algorithm is ranked up at random.
For example, choosing k-1 anonymous location in based on the Privacy preserving algorithms obscured and being mixed to realize to real information Confuse process: the calculating of each position units inquiry probability in map partitioning, map, user position unit inquiry probability into Row compares, selection probability meets the position units of condition, the position units that chosen position is met the requirements, construction solicited message.Its In, step 1-3 is the sequencing with logic and execution, then needs to guarantee that the step is constant, and step 4 and 5 patrol not have The step of collecting and executing sequencing, then it is random that 4 and 5 are ranked up.
Such as: Privacy preserving algorithms are using SP structure in block cipher, and all Privacy preserving algorithms steps are according to SP Structure combination;
In embodiments of the present invention, the Privacy preserving algorithms step include but is not limited to include one or more of Any combination:
S variation, P displacement, cipher key spreading, initialization, setting memory, linear feedback shift register device, nonlinear feedback Shift register determines and upsets granularity, addition noise, set information weight, the scramble data for screening the condition that meets, chooses and obscure Information constitutes solicited message in conjunction with real information, determines fuzzy granularity, setting fuzzy ranges, construction solicited message.
Step 205, according to scene information, secret protection demand, the demand of Privacy preserving algorithms, Privacy preserving algorithms step One or more of any combination selection Privacy preserving algorithms parameter.
In embodiments of the present invention, the parameter of the Privacy preserving algorithms includes any group of one or more of It closes:
It is key length, anonymous set sizes, privacy budget, susceptibility, drift rate, block length, encryption round number, S box, more Item formula parameter, MDS code, P permutation table.
In embodiments of the present invention, it is protected according to scene information, secret protection demand, the demand of Privacy preserving algorithms, privacy The parameter for protecting any combination selection Privacy preserving algorithms of one or more of algorithm steps can be according to the rule being pre-designed Then.The rule being pre-designed can directly be mapped or be mapped by function.
For example corresponding table between the speed of service, runs software hardware resource and parameter can be formulated, if secret protection The speed of service of algorithm is required than very fast, and the hardware and software environment of the operation of algorithm is limited, can be joined with Privacy preserving algorithms step Number can choose smaller, and key length is shorter, and encryption round number is less;If Privacy preserving algorithms secret protection is imitated in scene information Fruit desired value is relatively high, and more greatly, key length is long, and encryption round number is more greatly for parameter selection;For example setting Privacy preserving algorithms are pacified It is complete require with the corresponding table between parameter, according to corresponding table selection parameter.
Step 206, according to syntagmatic between Privacy preserving algorithms step to the Privacy preserving algorithms step and privacy The parameter of protection algorism is combined generation Privacy preserving algorithms.
Step 207, according to one in scene information, privacy information feature, secret protection demand, Privacy preserving algorithms or Multiple any combination determines the assembled scheme of Privacy preserving algorithms.
In embodiments of the present invention, according to scene information, privacy information feature, secret protection demand, Privacy preserving algorithms One or more of any combination determine that Privacy preserving algorithms assembled scheme can be set in advance using the rule that is pre-designed The rule of meter can directly be mapped or be mapped by function.
For example, formulating according to the secret protection effect desired value and Privacy preserving algorithms in the secret protection demand Type, Privacy preserving algorithms assembled scheme correspond to table, select corresponding Privacy preserving algorithms according to the type of Privacy preserving algorithms With Privacy preserving algorithms assembled scheme;For example privacy information feature table corresponding with Privacy preserving algorithms type is formulated, according to privacy Information characteristics select Privacy preserving algorithms, and determine Privacy preserving algorithms assembled scheme, such as privacy according to input privacy information Information type is text, selects No. 1 Privacy preserving algorithms, if privacy information type is image, No. 2 secret protections is selected to calculate Method, that just selects corresponding Privacy preserving algorithms according to input privacy information, and then determines secret protection scheme.For example privacy is protected Protecting algorithm is one, and different secret protection effect desired values use various combination mode, formulates a secret protection effect expectation It is worth table corresponding with assembled scheme, different assembled schemes is selected according to different desired values, for example can authenticate and combine with authenticated encryption Scheme, input feedback assembled scheme etc..
Step 208 is combined the Privacy preserving algorithms according to the assembled scheme of the Privacy preserving algorithms Generate secret protection scheme.
In another embodiment, method for protecting privacy further include:
Step 102, in the Privacy preserving algorithms in the secret protection scheme and secret protection scheme of generation at least it One is assessed.
In embodiments of the present invention, carrying out assessment to the secret protection scheme of generation includes at least one of:
The secret protection effect of secret protection scheme is assessed;
The complexity of secret protection scheme is assessed;
Carrying out assessment to the Privacy preserving algorithms in secret protection scheme includes at least one of:
The secret protection effect of Privacy preserving algorithms in secret protection scheme is assessed;
The complexity of Privacy preserving algorithms in secret protection scheme is assessed.
Wherein, carrying out assessment to the secret protection effect of the Privacy preserving algorithms in secret protection scheme includes:
Calculate the secret protection Effect value of Privacy preserving algorithms;
When hidden in the demand that the secret protection Effect value of Privacy preserving algorithms is greater than or equal to the Privacy preserving algorithms Private protecting effect desired value judges that Privacy preserving algorithms pass through the secret protection recruitment evaluation of Privacy preserving algorithms;
When secret protection in the demand that the secret protection Effect value of Privacy preserving algorithms is less than the Privacy preserving algorithms Effect desired value judges Privacy preserving algorithms not over the secret protection recruitment evaluation of Privacy preserving algorithms.
Wherein, secret protection Effect value includes but is not limited to any combination for including one or more of:
Using between the privacy information before the Privacy preserving algorithms treated privacy information and processing departure, It is pushed away using the loss ratio between the privacy information before the Privacy preserving algorithms treated privacy information and processing, attacker Measure the probability of privacy information before handling.
Wherein, the complexity of Privacy preserving algorithms includes any combination of one or more of: time complexity, space Complexity.
Carrying out assessment to the complexity of the Privacy preserving algorithms in secret protection scheme includes appointing for one or more of Meaning combination:
The time complexity of the Privacy preserving algorithms is assessed;
The space complexity of the Privacy preserving algorithms is assessed.
Wherein, the time complexity to Privacy preserving algorithms, which assess, includes:
Whether the software resource for judging that the Privacy preserving algorithms operation occupies meets in the needs of Privacy preserving algorithms The software resource needed;
When the software resource that Privacy preserving algorithms operation occupies is less than or equal in the demand of Privacy preserving algorithms When the software resource needed, it is soft in the space complexity assessment of Privacy preserving algorithms to judge that the Privacy preserving algorithms pass through Part stock assessment;
Need in the demand that the software resource that Privacy preserving algorithms operation occupies is greater than the Privacy preserving algorithms When the software resource wanted, judge that the Privacy preserving algorithms are assessed not over the space complexity of the Privacy preserving algorithms In software resource assessment;
Whether the hardware resource for judging that the Privacy preserving algorithms operation occupies meets the needs of Privacy preserving algorithms The hardware resource of middle needs;
When the hardware resource that Privacy preserving algorithms operation occupies is less than or equal to the demand of the Privacy preserving algorithms In needs hardware resource when, judge that the Privacy preserving algorithms are commented by the space complexity of the Privacy preserving algorithms Estimate middle hardware resource assessment;
When hard in the demand that the hardware resource that Privacy preserving algorithms operation occupies is greater than the Privacy preserving algorithms When part resource, judge the Privacy preserving algorithms not over hardware in the space complexity assessment of the Privacy preserving algorithms Stock assessment.
Wherein, carrying out assessment to the secret protection effect of secret protection scheme includes:
Calculate the secret protection Effect value of the secret protection scheme;
It is protected when the secret protection Effect value of the secret protection scheme is greater than or equal to privacy in the secret protection demand When protecting effect desired value, judge that the secret protection scheme passes through the secret protection recruitment evaluation of secret protection scheme;
It is protected when the secret protection Effect value of the secret protection scheme is less than privacy in the secret protection scheme demand When protecting effect desired value, judge the secret protection scheme not over the secret protection recruitment evaluation of Privacy preserving algorithms.
Wherein, the secret protection Effect value of secret protection scheme includes but is not limited to include one or more of any Combination:
Using between the privacy information before the secret protection scheme treated privacy information and processing departure, It is pushed away using the loss ratio between the privacy information before the secret protection scheme treated privacy information and processing, attacker Measure the probability of privacy information before handling.
Wherein, the complexity of the secret protection scheme includes any combination of one or more of: time complexity, Space complexity;
The complexity to secret protection scheme carries out any combination that assessment includes one or more of:
The time complexity of the secret protection scheme is assessed;
The space complexity of the secret protection scheme is assessed.
Wherein, the time complexity to secret protection scheme, which assess, includes:
Judge whether the speed of service of secret protection scheme meets the minimum operation speed in the secret protection demand;
When the speed of service of secret protection scheme is greater than or equal to the minimum operation speed in secret protection demand, judgement Secret protection scheme is assessed by the time complexity of secret protection scheme out;
When the speed of service of secret protection scheme is less than the speed of service in secret protection demand, secret protection is judged Scheme is assessed not over the time complexity of secret protection scheme.
Wherein, the space complexity to secret protection scheme carries out any group that assessment includes one or more of It closes:
Judge whether the software resource of the secret protection scheme operation occupancy meets the needs in secret protection demand Software resource;
When the software resource that secret protection scheme operation occupies is less than or equal to the needs in secret protection demand When software resource, judge that the secret protection scheme passes through the software resource in the space complexity assessment of secret protection scheme Assessment;
When the software resource that secret protection scheme operation occupies is greater than the soft of the needs in the secret protection demand When part resource, judge the secret protection scheme not over soft in the space complexity assessment of the secret protection scheme Part stock assessment;
Whether the hardware resource for judging that the secret protection scheme operation occupies meets needs in the secret protection demand Hardware resource;
When the hardware resource that secret protection scheme operation occupies is less than or equal to the need in the secret protection demand When the hardware resource wanted, judge that the secret protection scheme passes through in the space complexity assessment of the secret protection scheme firmly Part stock assessment;
When the hardware resource that secret protection scheme operation occupies is greater than the hardware resource in the secret protection demand When, judge that the secret protection scheme is commented not over hardware resource in the space complexity assessment of the secret protection scheme Estimate.
In another embodiment, this method further include:
When Privacy preserving algorithms are not over assessment, iteration Privacy preserving algorithms step is constantly modified according to assessment result Suddenly, any combination of one or more of the syntagmatic between Privacy preserving algorithms step, parameter of Privacy preserving algorithms, after According to the syntagmatic between Privacy preserving algorithms step to the Privacy preserving algorithms step and secret protection described in continuous execution The parameter of algorithm is combined the step of generating Privacy preserving algorithms, then assesses new Privacy preserving algorithms, until new The Privacy preserving algorithms assessment that passes through Privacy preserving algorithms.
Illustrate how Privacy preserving algorithms carry out constantly modifying iteration below by specific example, but is not limited to following feelings Condition.Such as: the assessment result of Privacy preserving algorithms is displayed without the complexity evaluations by Privacy preserving algorithms, is protected by privacy Protect recruitment evaluation, at this moment can the combination between the parameter and/or secret protection step by simply modifying Privacy preserving algorithms close System, generates new Privacy preserving algorithms, then assess newly-generated Privacy preserving algorithms, if assessment result shows privacy Protecting effect and Privacy preserving algorithms complexity pass through assessment, terminate Privacy preserving algorithms design;
If the assessment result of Privacy preserving algorithms is displayed without through secret protection recruitment evaluation, and passes through secret protection The complexity evaluations of algorithm, the syntagmatic between parameter and/or secret protection step by simply modifying Privacy preserving algorithms, New Privacy preserving algorithms are generated, then newly-generated Privacy preserving algorithms are assessed, if new Privacy preserving algorithms There are no pass through secret protection recruitment evaluation as the result is shown for secret protection recruitment evaluation.According to the type of Privacy preserving algorithms and hidden The theoretical basis of private protection algorism selects syntagmatic between new Privacy preserving algorithms step, Privacy preserving algorithms step, hidden The parameter of private protection algorism regenerates new Privacy preserving algorithms and is assessed, if assessment result shows secret protection effect Fruit and Privacy preserving algorithms complexity pass through assessment, terminate Privacy preserving algorithms design;
If the assessment result of Privacy preserving algorithms shows that the complexity of secret protection effect and Privacy preserving algorithms does not have Have through assessment, according to Privacy preserving algorithms type and Privacy preserving algorithms theoretical basis, new Privacy preserving algorithms is selected to walk Suddenly, the syntagmatic between Privacy preserving algorithms step, Privacy preserving algorithms parameter regenerate new Privacy preserving algorithms and progress Assessment terminates secret protection if assessment result shows secret protection effect and Privacy preserving algorithms complexity passes through assessment Algorithm design.
When Privacy preserving algorithms have passed through assessment, and secret protection scheme is not over assessment, secret protection is modified Algorithm combination scheme, continue to execute the assembled scheme according to the Privacy preserving algorithms to the Privacy preserving algorithms into The step of row combination producing secret protection scheme, then the new secret protection scheme of generation is assessed, until newly-generated Secret protection scheme passes through the assessment of secret protection scheme;
When Privacy preserving algorithms have passed through assessment, but by repeatedly modifying Privacy preserving algorithms assembled scheme, new is hidden When private protection scheme is again without assessment is passed through, it can also modify between Privacy preserving algorithms step, Privacy preserving algorithms step Any combination of one or more of syntagmatic, the parameter of Privacy preserving algorithms continues to execute described according to secret protection Syntagmatic between algorithm steps is combined generation to the parameter of the Privacy preserving algorithms step and Privacy preserving algorithms The step of Privacy preserving algorithms, so that Privacy preserving algorithms indices more optimize, then modifies the Privacy preserving algorithms group Conjunction scheme continues to execute the assembled scheme according to the Privacy preserving algorithms and is combined to the Privacy preserving algorithms The step of generating secret protection scheme, so that new secret protection scheme passes through the assessment of secret protection scheme.
Example
Step 300, the privacy information feature for obtaining privacy information.
In this step, for example, the request of user's input is " one around finding when user requests location based service Restaurant within kilometer ", using semantic analysis technology, obtains privacy information feature.
Wherein, the privacy information type in privacy information feature is the request private data of text type, in privacy information Appearance includes: user identity, timestamp, location information, inquiry content.
Step 301 generates secret protection demand according at least one of scene information and privacy information feature.
In this step, scene information is based on the request information on services under location-based service scene.
In this step, the secret protection scheme secret protection effect demand in secret protection demand is selected by each The inquiry probability of position units is identical with user current location inquiry probability.
Step 302, according to one or more any combination in scene information, privacy information feature, secret protection demand Determine the demand of Privacy preserving algorithms.
In this step, according to scene information, privacy information feature, secret protection demand, the property of Privacy preserving algorithms is determined The environment run in energy demand is mobile radio network, and software resource is Baidu/Google Maps, and hardware resource is that intelligent movable is whole End (has positioning and navigation feature).
Step 303, according in scene information, privacy information feature, secret protection demand, the demand of Privacy preserving algorithms One or more any combination determine at least one of: the type of Privacy preserving algorithms and the theoretical base of Privacy preserving algorithms Plinth.
In this step, determine that the Privacy preserving algorithms for the privacy information are to calculate based on the secret protection obscured Method.
Step 304, according to scene information, privacy information feature, secret protection demand, the demand of Privacy preserving algorithms, hidden Any combination of one or more of the type of private protection algorism, the theoretical basis of Privacy preserving algorithms provides secret protection calculation Syntagmatic between method step and Privacy preserving algorithms step;
In this step, the step of selection, is as follows:
1, to map is divided.
2, the historical query probability of each location information of map is calculated;
3, compare and be compared with the inquiry probability of user current location information, selection has same queries probability positions letter Breath is used as anonymous location information;
4, according in the anonymous location information selected in step 3, distance between calculating, and choose k-1 distance and use The distance of family position is greater than the location information of D, the length that wherein D is a numerical value to limit distance;
5, l-1 pseudo- inquiry content, the inquiry content as each location information are randomly selected.
6, solicited message is constructed, by k-1 anonymous location information, l-1 pseudo- inquiry content, the true location information of user Service provider is sent to inquiry content.
K anonymity and l diversity Privacy preserving algorithms are using secret protection technology based on probability, i.e., wherein, position The probability of information can be obtained by two methods, the first setting access point, the number of the transmission information on taken at regular intervals position Mesh is for second application programming interface (API, the Application Programming by Google Maps Interface) number that the location information is sent directly can be obtained from third party.It is somebody's turn to do by a kind of method of any of the above The information of region whithin a period of time sends number, obtains the probability of required location information, position in map by ratio calculation lociProbability calculation it is as follows:
Wherein, M is the information transmission number for getting some map, the position loc in the mapiInformation send number For mi
Step 305 is walked according to scene information, secret protection demand, Privacy preserving algorithms performance requirement, Privacy preserving algorithms The parameter of one or more of rapid any combination selection Privacy preserving algorithms.
In this step, parameter adaptation function respectively provides range to parameter k and l, wherein k anonymity and the multifarious privacy of l The value range of k is [5,50] in protection algorism, and the value range of l is [2,20].
Step 306, according to the syntagmatic between Privacy preserving algorithms step to the Privacy preserving algorithms step and hidden The parameter of private protection algorism is combined generation Privacy preserving algorithms.
In this example, k anonymity Privacy preserving algorithms and l diversity Privacy preserving algorithms are generated using step 301-306.
Step 307, according to one in scene information, privacy information feature, secret protection demand, Privacy preserving algorithms or The multiple any combination of person determines the assembled scheme of Privacy preserving algorithms.
Step 308 is combined the Privacy preserving algorithms according to the assembled scheme of the Privacy preserving algorithms Generate secret protection scheme.
In this example, k anonymity Privacy preserving algorithms and l diversity Privacy preserving algorithms are combined, it is hidden using k anonymity Private protection algorism protects the location privacy of user, and l diversity Privacy preserving algorithms protect the inquiry content privacy of user.
Step 309 assesses the Privacy preserving algorithms and secret protection scheme of generation.
In this step, it includes: secret protection effect to Privacy preserving algorithms and hidden for carrying out assessment to Privacy preserving algorithms The complexity of private protection algorism is assessed.
Wherein, before the secret protection effect utilization attacker of Privacy preserving algorithms deduces the Privacy preserving algorithms processing The probability of privacy information is assessed.
In this step, carrying out assessment to secret protection scheme includes: to the secret protection effect of secret protection scheme and hidden The complexity of private protection scheme is assessed.
Wherein, before the secret protection effect utilization attacker of secret protection scheme deduces the secret protection scheme processing The probability of privacy information is assessed.
Wherein, time complexity and the space that assessment refers to secret protection scheme are carried out to the complexity of secret protection scheme Complexity is assessed.
Referring to Fig. 3, another embodiment of the present invention proposes a kind of privacy information protection device, comprises the following modules at least One of:
Privacy information feature obtains module 301, for obtaining the privacy information feature of privacy information;
Secret protection program decisions module 302, for true according at least one of scene information and privacy information feature Determine secret protection scheme.
In another embodiment, further includes:
Secret protection scheme evaluation module 303, for the privacy in the secret protection scheme and secret protection scheme At least one of protection algorism is assessed.
In embodiments of the present invention, referring to fig. 4, secret protection program decisions module 302 includes:
Secret protection demand generation unit 401, for raw according at least one of scene information and privacy information feature At secret protection demand;
Privacy preserving algorithms demand generation unit 402, for according to scene information, privacy information feature, secret protection need One or more any combination in asking determine the demand of Privacy preserving algorithms;
Privacy preserving algorithms type or theoretical basis determination unit 403, for according to scene information, privacy information feature, Any combination of one or more of secret protection demand, the demand of Privacy preserving algorithms determines at least one of: privacy The type of protection algorism and the theoretical basis of Privacy preserving algorithms;
Assembled unit 404 between Privacy preserving algorithms step, for being protected according to scene information, privacy information feature, privacy Shield demand, the demand of Privacy preserving algorithms, the type of Privacy preserving algorithms, one in the theoretical basis of Privacy preserving algorithms or Multiple any combination provides the syntagmatic between Privacy preserving algorithms step and Privacy preserving algorithms step;
Parameter designing unit 405, for according to scene information, secret protection demand, the demand of Privacy preserving algorithms, privacy The parameter of any combination selection Privacy preserving algorithms of one or more of protection algorism step;
Assembled unit 406 between Privacy preserving algorithms and Privacy preserving algorithms, for according between Privacy preserving algorithms step Syntagmatic to the parameter of the Privacy preserving algorithms step and Privacy preserving algorithms be combined generate secret protection calculate Method;
According to appointing for one or more of scene information, privacy information feature, secret protection demand, Privacy preserving algorithms Meaning combines the assembled scheme for determining Privacy preserving algorithms;
Secret protection schemes generation unit 407, for according to the assembled schemes of the Privacy preserving algorithms to described hidden Private protection algorism, which is combined, generates secret protection scheme.
The specific implementation process of modules or unit and previous embodiment privacy are believed in above-mentioned privacy information protection device The specific implementation process for ceasing guard method is identical, and which is not described herein again.
Another embodiment of the present invention proposes a kind of privacy information protection device, including processor and computer-readable deposits Storage media is stored with instruction in the computer readable storage medium, when described instruction is executed by the processor, in realization State any method for protecting privacy.
Another embodiment of the present invention proposes a kind of computer readable storage medium, is stored thereon with computer program, The computer program realizes the step of any of the above-described kind of method for protecting privacy when being executed by processor.
Another embodiment of the present invention proposes a kind of privacy information protection system, comprising:
Privacy information feature obtains module 301, for obtaining the privacy information feature of privacy information;
Secret protection program decisions module 302, for true according at least one of scene information and privacy information feature Determine secret protection scheme;
Wherein, privacy information feature obtains module 301 and different equipment is arranged in secret protection program decisions module 302 In.
In another embodiment, further includes:
Secret protection scheme evaluation module 303, for assessing the secret protection scheme;
Wherein, secret protection scheme evaluation module 303, privacy information feature obtain module 301 and secret protection scheme is determined At least two modules are arranged in different equipment in plan module 302.
In embodiments of the present invention, referring to fig. 4, secret protection program decisions module 302 includes:
Secret protection demand generation unit 401, for raw according at least one of scene information and privacy information feature At secret protection demand;
Privacy preserving algorithms demand generation unit 402, for according to scene information, privacy information feature, secret protection need One or more any combination in asking determine the demand of Privacy preserving algorithms;
Privacy preserving algorithms type or theoretical basis determination unit 403, for according to scene information, privacy information feature, Any combination of one or more of secret protection demand, the demand of Privacy preserving algorithms determines at least one of: privacy The type of protection algorism and the theoretical basis of Privacy preserving algorithms;
Assembled unit 404 between Privacy preserving algorithms step, for being protected according to scene information, privacy information feature, privacy Shield demand, the demand of Privacy preserving algorithms, the type of Privacy preserving algorithms, one in the theoretical basis of Privacy preserving algorithms or Multiple any combination provides the syntagmatic between Privacy preserving algorithms step and Privacy preserving algorithms step;
Parameter designing unit 405, for according to scene information, secret protection demand, the demand of Privacy preserving algorithms, privacy The parameter of any combination selection Privacy preserving algorithms of one or more of protection algorism step;
Assembled unit 406 between Privacy preserving algorithms and Privacy preserving algorithms, for according between Privacy preserving algorithms step Syntagmatic to the parameter of the Privacy preserving algorithms step and Privacy preserving algorithms be combined generate secret protection calculate Method;
According to appointing for one or more of scene information, privacy information feature, secret protection demand, Privacy preserving algorithms Meaning combines the assembled scheme for determining Privacy preserving algorithms;
Secret protection schemes generation unit 407, for according to the assembled schemes of the Privacy preserving algorithms to described hidden Private protection algorism, which is combined, generates secret protection scheme;
Wherein, above-mentioned Unit at least two is arranged in different equipment.
The specific implementation process of modules or unit and previous embodiment privacy are believed in above-mentioned privacy information protection system The specific implementation process for ceasing guard method is identical, and which is not described herein again.
It will appreciated by the skilled person that whole or certain steps, system, dress in method disclosed hereinabove Functional module/unit in setting may be implemented as software, firmware, hardware and its combination appropriate.In hardware embodiment, Division between the functional module/unit referred in the above description not necessarily corresponds to the division of physical assemblies;For example, one Physical assemblies can have multiple functions or a function or step and can be executed by several physical assemblies cooperations.Certain groups Part or all components may be implemented as by processor, such as the software that digital signal processor or microprocessor execute, or by It is embodied as hardware, or is implemented as integrated circuit, such as specific integrated circuit.Such software can be distributed in computer-readable On medium, computer-readable medium may include computer storage medium (or non-transitory medium) and communication media (or temporarily Property medium).As known to a person of ordinary skill in the art, term computer storage medium is included in for storing information (such as Computer readable instructions, data structure, program module or other data) any method or technique in the volatibility implemented and non- Volatibility, removable and nonremovable medium.Computer storage medium include but is not limited to RAM, ROM, EEPROM, flash memory or its His memory technology, CD-ROM, digital versatile disc (DVD) or other optical disc storages, magnetic holder, tape, disk storage or other Magnetic memory apparatus or any other medium that can be used for storing desired information and can be accessed by a computer.This Outside, known to a person of ordinary skill in the art to be, communication media generally comprises computer readable instructions, data structure, program mould Other data in the modulated data signal of block or such as carrier wave or other transmission mechanisms etc, and may include any information Delivery media.
Although embodiment disclosed by the embodiment of the present invention is as above, only the present invention is real for ease of understanding for the content The embodiment applying example and using is not intended to limit the invention embodiment.Skill in any fields of the embodiment of the present invention Art personnel can be in the form and details of implementation under the premise of not departing from spirit and scope disclosed by the embodiment of the present invention It is upper to carry out any modification and variation, but the scope of patent protection of the embodiment of the present invention, it still must be with appended claims institute Subject to the range defined.

Claims (32)

  1. At least one 1. a kind of method for protecting privacy, include the following steps:
    Obtain the privacy information feature of privacy information;
    Secret protection scheme is determined according at least one of scene information and privacy information feature.
  2. 2. method for protecting privacy according to claim 1, which is characterized in that further include:
    At least one of Privacy preserving algorithms in the secret protection scheme and secret protection scheme are assessed.
  3. 3. method for protecting privacy according to claim 2, which is characterized in that described to comment secret protection scheme Estimate including at least one of:
    The secret protection effect of secret protection scheme is assessed;
    The complexity of secret protection scheme is assessed;
    It includes at least one of that the Privacy preserving algorithms in secret protection scheme, which carry out assessment:
    The secret protection effect of Privacy preserving algorithms in secret protection scheme is assessed;
    The complexity of Privacy preserving algorithms in secret protection scheme is assessed.
  4. 4. method for protecting privacy according to claim 3, which is characterized in that described to hidden in secret protection scheme The secret protection effect of private protection algorism carries out assessment
    Calculate the secret protection Effect value of the Privacy preserving algorithms;
    When hidden in the demand that the secret protection Effect value of the Privacy preserving algorithms is greater than or equal to the Privacy preserving algorithms Private protecting effect desired value judges that the Privacy preserving algorithms pass through the secret protection recruitment evaluation of Privacy preserving algorithms;
    When secret protection in the demand that the secret protection Effect value of the Privacy preserving algorithms is less than the Privacy preserving algorithms Effect desired value judges the Privacy preserving algorithms not over the secret protection recruitment evaluation of Privacy preserving algorithms.
  5. 5. method for secret protection according to claim 4, which is characterized in that the secret protection of the Privacy preserving algorithms is imitated Fruit value includes any combination of one or more of:
    Using between the privacy information before the Privacy preserving algorithms treated privacy information and processing departure, using institute The loss ratio between privacy information before stating Privacy preserving algorithms treated privacy information and processing, attacker deduce described The probability of privacy information before Privacy preserving algorithms processing.
  6. 6. method for protecting privacy according to claim 3, which is characterized in that the complexity of the Privacy preserving algorithms Any combination including one or more of: time complexity, space complexity;
    It includes appointing for one or more of that the complexity to the Privacy preserving algorithms in secret protection scheme, which carries out assessment, Meaning combination:
    The time complexity of the Privacy preserving algorithms is assessed;
    The space complexity of the Privacy preserving algorithms is assessed.
  7. 7. method for protecting privacy according to claim 6, which is characterized in that the time to Privacy preserving algorithms Complexity carries out assessment
    Judge whether the speed of service of Privacy preserving algorithms meets the minimum operation speed in the demand of the Privacy preserving algorithms Degree;
    When the minimum operation speed in the demand that the speed of service of Privacy preserving algorithms is greater than or equal to Privacy preserving algorithms, sentence Disconnected Privacy preserving algorithms out are assessed by the time complexity of Privacy preserving algorithms;
    When the minimum operation speed in the demand that the speed of service of Privacy preserving algorithms is less than Privacy preserving algorithms, judge hidden Private protection algorism is assessed not over the time complexity of Privacy preserving algorithms.
  8. 8. method for protecting privacy according to claim 6, which is characterized in that the space to Privacy preserving algorithms Complexity carries out any combination that assessment includes one or more of:
    Judge whether the software resource of the Privacy preserving algorithms operation occupancy meets the needs in the needs of Privacy preserving algorithms Software resource;
    Needs in the demand that the software resource that Privacy preserving algorithms operation occupies is less than or equal to Privacy preserving algorithms Software resource when, judge that the Privacy preserving algorithms pass through the software money in the assessment of the space complexities of Privacy preserving algorithms Source assessment;
    When the needs in the demand that the software resource that Privacy preserving algorithms operation occupies is greater than the Privacy preserving algorithms When software resource, judge the Privacy preserving algorithms not in the space complexity assessment of the Privacy preserving algorithms Software resource assessment;
    Whether the hardware resource for judging that the operation of the Privacy preserving algorithms occupies meets in the needs of Privacy preserving algorithms The hardware resource needed;
    When the hardware resource that Privacy preserving algorithms operation occupies is less than or equal in the demand of the Privacy preserving algorithms When the hardware resource needed, judge that the Privacy preserving algorithms pass through in the space complexity assessment of the Privacy preserving algorithms Hardware resource assessment;
    When the hardware money in the demand that the hardware resource that Privacy preserving algorithms operation occupies is greater than the Privacy preserving algorithms When source, judge the Privacy preserving algorithms not over hardware resource in the space complexity assessment of the Privacy preserving algorithms Assessment.
  9. 9. method for protecting privacy according to claim 3, which is characterized in that the privacy to secret protection scheme Protecting effect carries out assessment
    Calculate the secret protection Effect value of the secret protection scheme;
    When the secret protection Effect value of the secret protection scheme is greater than or equal to secret protection effect in the secret protection demand When fruit desired value, judge that the secret protection scheme passes through the secret protection recruitment evaluation of secret protection scheme;
    When the secret protection Effect value of the secret protection scheme is less than secret protection effect in the secret protection scheme demand When fruit desired value, judge the secret protection scheme not over the secret protection recruitment evaluation of Privacy preserving algorithms.
  10. 10. method for secret protection according to claim 9, which is characterized in that the secret protection of the secret protection scheme Effect value includes any combination of one or more of:
    Using between the privacy information before the secret protection scheme treated privacy information and processing departure, using institute The loss ratio between privacy information before stating secret protection scheme treated privacy information and processing, attacker deduce described The probability of privacy information before the processing of secret protection scheme.
  11. 11. method for protecting privacy according to claim 3, which is characterized in that the complexity of the secret protection scheme Degree includes any combination of one or more of: time complexity, space complexity;
    The complexity to secret protection scheme carries out any combination that assessment includes one or more of:
    The time complexity of the secret protection scheme is assessed;
    The space complexity of the secret protection scheme is assessed.
  12. 12. method for protecting privacy according to claim 11, which is characterized in that it is described to secret protection scheme when Between complexity carry out assessment include:
    Judge whether the speed of service of secret protection scheme meets the minimum operation speed in the secret protection demand;
    When the speed of service of secret protection scheme is greater than or equal to the minimum operation speed in secret protection demand, judge hidden Private protection scheme is assessed by the time complexity of secret protection scheme;
    When the speed of service of secret protection scheme is less than the minimum operation speed in secret protection demand, secret protection is judged Scheme is assessed not over the time complexity of secret protection scheme.
  13. 13. method for protecting privacy according to claim 11, which is characterized in that the sky to secret protection scheme Between complexity carry out assessment include one or more of any combination:
    Judge whether the software resource of the secret protection scheme operation occupancy meets the software of the needs in secret protection demand Resource;
    When the software resource that secret protection scheme operation occupies is less than or equal to the software of the needs in secret protection demand When resource, judge that the secret protection scheme is commented by the software resource in the assessment of the space complexity of secret protection scheme Estimate;
    When the software resource that secret protection scheme operation occupies is greater than the software money of the needs in the secret protection demand When source, judge that the secret protection scheme is provided not over the software in the space complexity assessment of the secret protection scheme Source assessment;
    Judge hardware resource that secret protection scheme operation occupies whether meet needed in the secret protection demand it is hard Part resource;
    When the hardware resource that secret protection scheme operation occupies is less than or equal to the needs in the secret protection demand When hardware resource, judge that the secret protection scheme passes through hardware money in the space complexity assessment of the secret protection scheme Source assessment;
    When the hardware resource that secret protection scheme operation occupies is greater than the hardware resource in the secret protection demand, sentence The disconnected secret protection scheme out is assessed not over hardware resource in the space complexity assessment of the secret protection scheme.
  14. 14. method for protecting privacy according to claim 1, which is characterized in that described according to scene information and privacy At least one of information characteristics determine that secret protection scheme includes the following steps one or more any combination:
    Secret protection demand is generated according at least one of scene information and privacy information feature;
    Secret protection is determined according to one or more any combination in scene information, privacy information feature, secret protection demand The demand of algorithm;
    According to one or more of scene information, privacy information feature, secret protection demand, the demand of Privacy preserving algorithms Any combination determines at least one of: the type of Privacy preserving algorithms and the theoretical basis of Privacy preserving algorithms;
    According to scene information, privacy information feature, secret protection demand, the demands of Privacy preserving algorithms, Privacy preserving algorithms Any combination of one or more of type, the theoretical basis of Privacy preserving algorithms provides Privacy preserving algorithms step and privacy Syntagmatic between protection algorism step;
    According to one or more in scene information, secret protection demand, the demand of Privacy preserving algorithms, Privacy preserving algorithms step The parameter of a any combination selection Privacy preserving algorithms;
    According to the syntagmatic between Privacy preserving algorithms step to the Privacy preserving algorithms step and Privacy preserving algorithms Parameter is combined generation Privacy preserving algorithms;
    According to any group of one or more of scene information, privacy information feature, secret protection demand, Privacy preserving algorithms Close the assembled scheme for determining Privacy preserving algorithms;
    The Privacy preserving algorithms are combined according to the assembled scheme of the Privacy preserving algorithms and generate secret protection side Case.
  15. 15. method for protecting privacy according to claim 14, which is characterized in that further include:
    At least one of Privacy preserving algorithms in the secret protection scheme and secret protection scheme are assessed, are executed At least one of:
    When the Privacy preserving algorithms are not over assessment, Privacy preserving algorithms step is modified according to assessment result, privacy is protected Any combination of one or more of syntagmatic, the parameter of Privacy preserving algorithms between shield algorithm steps, continues to execute institute State the ginseng according to the syntagmatic between Privacy preserving algorithms step to the Privacy preserving algorithms step and Privacy preserving algorithms Number is combined the step of generating Privacy preserving algorithms;
    When the Privacy preserving algorithms have passed through assessment, and the secret protection scheme is not over assessment, described in modification Privacy preserving algorithms assembled scheme continues to execute the assembled scheme according to the Privacy preserving algorithms and protects to the privacy Shield algorithm is combined the step of generating secret protection scheme;
    When Privacy preserving algorithms have passed through assessment, but by repeatedly modifying Privacy preserving algorithms assembled scheme, new privacy is protected It is modification Privacy preserving algorithms step, the syntagmatic between Privacy preserving algorithms step, hidden when shield scheme is again without assessment is passed through Any combination of one or more of the parameter of private protection algorism continues to execute described according between Privacy preserving algorithms step Syntagmatic is combined generation Privacy preserving algorithms to the parameter of the Privacy preserving algorithms step and Privacy preserving algorithms The step of, then the Privacy preserving algorithms assembled scheme is modified, continue to execute the combination according to the Privacy preserving algorithms Scheme is combined the step of generating secret protection scheme to the Privacy preserving algorithms.
  16. 16. method for protecting privacy according to claim 14 or 15, which is characterized in that the secret protection demand packet Include any combination of one or more of:
    The secret protection effect desired value of secret protection scheme, the performance requirement of secret protection scheme, privacy operations, constraint item Corresponding relationship between part, privacy operations and constraint condition;
    Wherein, constraint condition is used to describe to carry out the condition that privacy operations need to meet, comprising: application entity attribute, operation ring Border;
    The operating environment includes: time, spatial position, network, equipment.
  17. 17. method for protecting privacy according to claim 16, which is characterized in that the performance of the secret protection scheme Demand be not limited to include one or more of any combination:
    The environment of operation, minimum operation speed, the software resource of needs, needs hardware resource.
  18. 18. method for protecting privacy according to claim 14 or 15, which is characterized in that the Privacy preserving algorithms Demand includes at least one of: the secret protection effect desired value and performance requirement of Privacy preserving algorithms;
    The performance requirement of the Privacy preserving algorithms be not limited to include one or more of any combination:
    The environment of operation, minimum operation speed, the software resource of needs, needs hardware resource.
  19. 19. method for protecting privacy according to claim 14 or 15, which is characterized in that the Privacy preserving algorithms Type includes any combination of one or more of:
    Privacy preserving algorithms based on cryptography, the Privacy preserving algorithms based on upset, the Privacy preserving algorithms based on obscuring, base In extensive Privacy preserving algorithms, based on the Privacy preserving algorithms of access control.
  20. 20. method for protecting privacy according to claim 14 or 15, which is characterized in that the Privacy preserving algorithms Theoretical basis includes any combination of one or more of:
    Secret protection technology, secret protection technology based on probability, the secret protection technology based on game based on cryptography.
  21. 21. method for protecting privacy according to claim 14 or 15, which is characterized in that the Privacy preserving algorithms step Rapid includes any combination of one or more of:
    S variation, P displacement, cipher key spreading, initialization, setting memory, linear feedback shift register device, nonlinear feedback shift Register determines and upsets granularity, addition noise, set information weight, the scramble data for screening the condition that meets, chooses and obscure letter Breath constitutes solicited message in conjunction with real information, determines fuzzy granularity, setting fuzzy ranges, construction solicited message.
  22. 22. method for secret protection according to claim 14 or 15, which is characterized in that the parameter of the Privacy preserving algorithms Any combination including one or more of:
    Key length, anonymous set sizes, privacy budget, susceptibility, drift rate, block length, encryption round number, S box, multinomial Parameter, MDS code, P permutation table.
  23. 23. method for protecting privacy according to claim 1, which is characterized in that the privacy information feature include with Next or multiple any combination:
    Privacy information type, privacy information content, data value range, data distribution characteristics, privacy information susceptibility, can hold Desired value, the social experience value of privacy operations result of capable privacy operations, privacy operations number.
  24. 24. method for protecting privacy according to claim 23, which is characterized in that the susceptibility of the privacy information is For the value of scaling information sensitivity, calculated by any combination one or more in probability, mathematic expectaion, mathematics variance It obtains.
  25. 25. method for protecting privacy according to claim 23, which is characterized in that the executable privacy operations packet Include any combination of one or more of:
    Reading and writing, encryption, it is fuzzy, extensive, plus make an uproar, anonymity, signature, sign test, calculate abstract, encryption, save, duplication, stickup, turn Hair, modification, is deleted at shearing.
  26. 26. method for protecting privacy according to claim 1, which is characterized in that the scene information includes with next Kind or a variety of any combination:
    Time, spatial position, equipment, equipment performance, interactive object, interaction approach, request type, service type.
  27. At least one 27. a kind of privacy information protection device, comprise the following modules:
    Privacy information feature obtains module, for obtaining the privacy information feature of privacy information;
    Secret protection program decisions module, for determining that privacy is protected according at least one of scene information and privacy information feature Shield scheme.
  28. 28. privacy information protection device according to claim 27, which is characterized in that further include:
    Secret protection scheme evaluation module, for the Privacy preserving algorithms in the secret protection scheme and secret protection scheme At least one of assessed.
  29. 29. a kind of privacy information protection device, including processor and computer readable storage medium, the computer-readable storage Instruction is stored in medium, which is characterized in that when described instruction is executed by the processor, realize such as claim 1~26 Described in any item method for protecting privacy.
  30. 30. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program The step of method for protecting privacy as described in any item such as claim 1~26 are realized when being executed by processor.
  31. 31. a kind of privacy information protection system, comprising:
    Privacy information feature obtains module, for obtaining the privacy information feature of privacy information;
    Secret protection program decisions module, for determining that privacy is protected according at least one of scene information and privacy information feature Shield scheme;
    Wherein, privacy information feature obtains module and different equipment is arranged in secret protection program decisions module.
  32. 32. privacy information protection system according to claim 31, which is characterized in that further include:
    Secret protection scheme evaluation module, for the Privacy preserving algorithms in the secret protection scheme and secret protection scheme At least one of assessed;
    Wherein, the secret protection scheme evaluation module, privacy information feature obtain module and secret protection program decisions module In at least two modules different equipment is set.
CN201811272603.1A 2018-10-30 2018-10-30 Privacy information protection method, device and system Active CN109583227B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811272603.1A CN109583227B (en) 2018-10-30 2018-10-30 Privacy information protection method, device and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811272603.1A CN109583227B (en) 2018-10-30 2018-10-30 Privacy information protection method, device and system

Publications (2)

Publication Number Publication Date
CN109583227A true CN109583227A (en) 2019-04-05
CN109583227B CN109583227B (en) 2020-08-07

Family

ID=65921270

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811272603.1A Active CN109583227B (en) 2018-10-30 2018-10-30 Privacy information protection method, device and system

Country Status (1)

Country Link
CN (1) CN109583227B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020087879A1 (en) * 2018-10-30 2020-05-07 中国科学院信息工程研究所 Method, device, and system for protecting private information
CN111178203A (en) * 2019-12-20 2020-05-19 江苏常熟农村商业银行股份有限公司 Signature verification method and device, computer equipment and storage medium
CN112231750A (en) * 2020-10-14 2021-01-15 海南大学 Multi-mode privacy protection method integrating fairness, justice and transparent regulation technologization
CN112269987A (en) * 2020-09-27 2021-01-26 西安电子科技大学 Intelligent model information leakage degree evaluation method, system, medium and equipment
CN112818390A (en) * 2021-01-26 2021-05-18 支付宝(杭州)信息技术有限公司 Data information publishing method, device and equipment based on privacy protection

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102196431A (en) * 2011-05-13 2011-09-21 南京邮电大学 Internet of things application scene-based protection method of privacy query and private identity verification
US20150339493A1 (en) * 2013-08-07 2015-11-26 Thomson Licensing Privacy protection against curious recommenders
CN105574437A (en) * 2015-12-31 2016-05-11 北京金山安全软件有限公司 Method and device for protecting privacy information and electronic equipment
CN106650485A (en) * 2016-09-18 2017-05-10 山东大学 Personalized environmental perception privacy protection method based on Android
CN107944299A (en) * 2017-12-29 2018-04-20 西安电子科技大学 A kind of processing method of privacy information, apparatus and system
CN108563962A (en) * 2018-05-03 2018-09-21 桂林电子科技大学 A kind of difference method for secret protection based on spatial position service

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102196431A (en) * 2011-05-13 2011-09-21 南京邮电大学 Internet of things application scene-based protection method of privacy query and private identity verification
US20150339493A1 (en) * 2013-08-07 2015-11-26 Thomson Licensing Privacy protection against curious recommenders
CN105574437A (en) * 2015-12-31 2016-05-11 北京金山安全软件有限公司 Method and device for protecting privacy information and electronic equipment
CN106650485A (en) * 2016-09-18 2017-05-10 山东大学 Personalized environmental perception privacy protection method based on Android
CN107944299A (en) * 2017-12-29 2018-04-20 西安电子科技大学 A kind of processing method of privacy information, apparatus and system
CN108563962A (en) * 2018-05-03 2018-09-21 桂林电子科技大学 A kind of difference method for secret protection based on spatial position service

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
李凤华,李晖: ""隐私计算研究范畴及发展趋势"", 《通信学报》 *
牛犇,李凤华,华佳烽,何媛媛: "移动网络中场景关联的隐私保护机制研究", 《网络与信息安全学报》 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020087879A1 (en) * 2018-10-30 2020-05-07 中国科学院信息工程研究所 Method, device, and system for protecting private information
CN111178203A (en) * 2019-12-20 2020-05-19 江苏常熟农村商业银行股份有限公司 Signature verification method and device, computer equipment and storage medium
CN112269987A (en) * 2020-09-27 2021-01-26 西安电子科技大学 Intelligent model information leakage degree evaluation method, system, medium and equipment
CN112269987B (en) * 2020-09-27 2023-01-24 西安电子科技大学 Intelligent model information leakage degree evaluation method, system, medium and equipment
CN112231750A (en) * 2020-10-14 2021-01-15 海南大学 Multi-mode privacy protection method integrating fairness, justice and transparent regulation technologization
CN112818390A (en) * 2021-01-26 2021-05-18 支付宝(杭州)信息技术有限公司 Data information publishing method, device and equipment based on privacy protection

Also Published As

Publication number Publication date
CN109583227B (en) 2020-08-07

Similar Documents

Publication Publication Date Title
CN109583227A (en) A kind of method for protecting privacy, apparatus and system
Li et al. Auditing cache data integrity in the edge computing environment
Rahman et al. Challenges, applications and design aspects of federated learning: A survey
JP2017091515A (en) Computer-implemented system and method for automatically identifying attributes for anonymization
Ni et al. An anonymous entropy-based location privacy protection scheme in mobile social networks
CN111428887B (en) Model training control method, device and system based on multiple computing nodes
WO2020087879A1 (en) Method, device, and system for protecting private information
Xiao et al. QLDS: A novel design scheme for trajectory privacy protection with utility guarantee in participatory sensing
CN113422801B (en) Edge network node content distribution method, system, device and computer equipment
CN111753324B (en) Private data processing method, private data computing method and applicable equipment
EP4198783A1 (en) Federated model training method and apparatus, electronic device, computer program product, and computer-readable storage medium
Wu et al. A novel dummy-based mechanism to protect privacy on trajectories
CN109543422A (en) A kind of privacy information method of disposal, apparatus and system
Shahid et al. Ppvc: Privacy preserving voronoi cell for location-based services
CN117540106B (en) Social activity recommendation method and device for protecting multi-mode data privacy
Lin et al. Protecting location privacy and query privacy: a combined clustering approach
CN113342418B (en) Distributed machine learning task unloading method based on block chain
Chen A security integration model for private data of intelligent mobile communication based on edge computing
Han et al. Privacy Protection Algorithm for the Internet of Vehicles Based on Local Differential Privacy and Game Model.
Bakopoulou et al. Location leakage in federated signal maps
Li et al. A personalized trajectory privacy protection method
Chen et al. Activity tracking: A new attack on location privacy
Zhang et al. A local differential privacy trajectory protection method based on temporal and spatial restrictions for staying detection
CN108111968B (en) Generalization-based location privacy protection method
Pan et al. Dummy trajectory generation scheme based on deep learning

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant