CN109684865A - A kind of personalization method for secret protection and device - Google Patents

A kind of personalization method for secret protection and device Download PDF

Info

Publication number
CN109684865A
CN109684865A CN201811368178.6A CN201811368178A CN109684865A CN 109684865 A CN109684865 A CN 109684865A CN 201811368178 A CN201811368178 A CN 201811368178A CN 109684865 A CN109684865 A CN 109684865A
Authority
CN
China
Prior art keywords
decision
objective
privacy protection
protection policy
privacy
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811368178.6A
Other languages
Chinese (zh)
Other versions
CN109684865B (en
Inventor
牛犇
李凤华
耿魁
李晖
陈亚虹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Institute of Information Engineering of CAS
Original Assignee
Institute of Information Engineering of CAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Institute of Information Engineering of CAS filed Critical Institute of Information Engineering of CAS
Priority to CN201811368178.6A priority Critical patent/CN109684865B/en
Publication of CN109684865A publication Critical patent/CN109684865A/en
Application granted granted Critical
Publication of CN109684865B publication Critical patent/CN109684865B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Abstract

The embodiment of the present invention provides a kind of personalized method for secret protection and device, this method comprises: obtaining the subjective and objective demand information and current state information of user;The evaluation index of each privacy protection policy is obtained according to the subjective and objective demand information and the current state information;Optimal privacy protection policy is obtained according to the evaluation index, to protect to privacy of user.The embodiment of the present invention passes through the subjective demand and objective environment of user; in conjunction with user terminal current state information; decision has gone out the privacy protection policy of relationship between privacy protection policy, secret protection effect and resource consumption balanced; to provide dynamic personalized secret protection for user; the effect for improving secret protection, more efficiently protects privacy of user.

Description

A kind of personalization method for secret protection and device
Technical field
The present embodiments relate to mobile internet technical field more particularly to a kind of personalized method for secret protection and dress It sets.
Background technique
The combination of mobile Internet and traditional social networks produces mobile social networking (Mobile Social Networks, abbreviation MSNs).User in MSNs not only available related service data, for example, searching nearby dining room and doctor Institute etc. can also be with friend's share photos etc. it has also been found that the good friend of surrounding, can register in some semantic locations. This application model provides the social platform of virtual-real combination for user.Therefore, MSNs is rapidly developed, Component part important in people's daily life is had become, provides service and experience abundant for user.However, a large amount of true Information converges the also hurried risk for increasing privacy leakage.Reason for that is that user is next in order to enjoy these service bands Convenience, need to service provider submit associated personal information, for example, personal identifier, specific service content and position letter Breath etc..But due to economic interests stimulation etc., service provider is based on these information, may be tracked to user, And the personal portrait of user is depicted, these information are even sold to third party.Therefore, concern privacy of user is MSNs development Unavoidable core and problem in the process.
In order to protect privacy of user, academia and industry have all done many correlative studys, and propose a variety of for protecting Protect the mechanism of privacy of user.These mechanism can be divided into following classification: encryption method, anonymity side according to used technology Method and perturbation motion method etc..Every kind of Privacy Preservation Mechanism can realize the equal of secret protection and resource consumption to a certain extent Weighing apparatus.Different mechanism can realize different equilibriums, if different equilibriums also may be implemented using different parameters for identical mechanism.
However, mostly there is this feature of immobilization, as user terminal in the designed Privacy Preservation Mechanism out of the prior art Various adjustable parameters are provided the user with, user is allowed to adjust given parameter according to their own needs, personalization is realized with this Secret protection.But this scheme is for a user and unfriendly, user need to fully understand the meaning of various parameters, value model It encloses, and its influence to protecting effect and expense etc., and is only capable of providing preset privacy protection policy or scheme for user, it can not Meet the secret protection demand of user individual.Therefore, need to design a kind of personalized method for secret protection and device to solve The above problem.
Summary of the invention
In view of the problems of the existing technology, the embodiment of the present invention provides a kind of personalized method for secret protection and device.
In a first aspect, the embodiment of the present invention provides a kind of personalized method for secret protection, comprising:
Obtain the subjective and objective demand information and current state information of user;
Referred to according to the assessment that the subjective and objective demand information and the current state information obtain each privacy protection policy Mark;
Optimal privacy protection policy is obtained according to the evaluation index, to protect to privacy of user.
Second aspect, the embodiment of the invention provides a kind of personalized privacy protection devices, comprising:
Module is obtained, for obtaining the subjective and objective demand information and current state information of user;
Processing module, for obtaining every secret protection plan according to the subjective and objective demand information and the current state information Evaluation index slightly;
Privacy policy confirmation module, for obtaining optimal privacy protection policy according to the evaluation index, with hidden to user Private is protected.
The third aspect, the embodiment of the present invention provides a kind of electronic equipment, including memory, processor and is stored in memory Computer program that is upper and can running on a processor, is realized when the processor executes described program as first aspect provides Method the step of.
Fourth aspect, the embodiment of the present invention provide a kind of non-transient computer readable storage medium, are stored thereon with calculating Machine program is realized as provided by first aspect when the computer program is executed by processor the step of method.
A kind of personalized method for secret protection and device provided in an embodiment of the present invention, pass through the subjective demand of user and visitor Environment is seen, in conjunction with user terminal current state information, decision goes out equilibrium privacy protection policy, secret protection effect and resource and disappears The privacy protection policy of relationship between consumption improves secret protection to provide dynamic personalized secret protection for user Effect more efficiently protects privacy of user.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is this hair Bright some embodiments for those of ordinary skill in the art without creative efforts, can be with root Other attached drawings are obtained according to these attached drawings.
Fig. 1 is the flow diagram of personalized method for secret protection provided in an embodiment of the present invention;
Fig. 2 is the structural schematic diagram of personalized privacy protection device provided in an embodiment of the present invention;
Fig. 3 is electronic devices structure schematic diagram provided in an embodiment of the present invention.
Specific embodiment
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention In attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is A part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art Every other embodiment obtained without creative efforts, shall fall within the protection scope of the present invention.
In the Privacy Protection research process of mobile Internet, it is usually required mainly for consider following three aspects: privacy is protected Protect effect, service quality and resource consumption.How to realize that triangular equilibrium is problem mostly important in secret protection.It is based on Above-mentioned problem, the target of work on hand are mostly to design one kind to can be realized secret protection effect, service quality and resource Consume balanced Privacy Preservation Mechanism between this three.However, it can be found that every kind of mechanism can all have its advantage and disadvantage by research, with And certain special scenes being applicable in.Mostly there is this feature of immobilization as the mechanism gone out designed by target, it is so-called Immobilization can be described from two angles: first is that scene is fixed, work on hand is all based on specific scene greatly to design certain Privacy Preservation Mechanism, i.e. these mechanism can not be simply transplanted in other application scenarios;Second is that state is fixed, the state refers to Be user subjective demand and objective environment, work on hand do not consider the change of user's state in different environments mostly, i.e., Personalized secret protection can not be provided to it according to the actual demand of user.
Therefore, when scene or user demand change, designed Privacy Preservation Mechanism is likely to will be no longer suitable With.In order to avoid described problem generation, the embodiment of the present invention passes through the current user state and subjective and objective demand of user terminal, Decision goes out an optimal privacy protection policy for current state in available Privacy Preservation Mechanism.Wherein, subjective and objective need It asks including subjective demand and user rs environment, current user state includes the remaining capacity of user's device therefor, required processing data Size and the privacy requirements of user etc..Privacy protection policy refers to the Privacy Preservation Mechanism that parameter value determines, and optimal body The present embodiment of the present invention can be realized equal between secret protection effect and resource consumption according to subjective demand and objective environment Weighing apparatus.
Fig. 1 is the flow diagram of personalized method for secret protection provided in an embodiment of the present invention, as shown in Figure 1, this hair Bright embodiment provides a kind of personalized method for secret protection, comprising:
Step 101, the subjective and objective demand information and current state information of user are obtained;
Step 102, each privacy protection policy is obtained according to the subjective and objective demand information and the current state information Evaluation index;
Step 103, optimal privacy protection policy is obtained according to the evaluation index, to protect to privacy of user.
In embodiments of the present invention, the subjective and objective demand information and current state letter of user are obtained by step 101 first Breath, subjective and objective demand information include subjective demand information and objective environment information, wherein subjective demand information includes the hidden of user Private preference etc., objective environment information includes remaining capacity, charged state or the network connection state etc. of user terminal, and current shape State information includes size and privacy requirements of the currently processed data of user terminal etc..
Then, by step 102, each privacy is obtained according to the subjective and objective demand information and the current state information The evaluation index of Preservation tactics, in embodiments of the present invention, according to subjective and objective demand information obtain decision objective set, influence because Element set and privacy protection policy set, by decision objective set and influence factor set, fitting obtains decision objective and shadow The function expression of relationship between the factor of sound;Then, each decision mesh in decision objective set is obtained according to current state information Target decision-making power weight values, by each in the function expression and decision objective set of relationship between decision objective and influence factor The decision-making power weight values of decision objective, obtain the evaluation index of each privacy protection policy in privacy protection policy set.
Finally, obtain optimal privacy protection policy according to the evaluation index by step 103, with to privacy of user into Row protection.In embodiments of the present invention, evaluation index can be set according to the actual situation, for example, evaluation index is set as Privacy protection policy and optimizing decision weighted value distance difference and privacy protection policy and worst decision-making power weight values distance difference it Between ratio, according between the two ratio and preset threshold compare, if meeting preset threshold, generate optimal privacy Preservation tactics, to be protected to privacy of user.
A kind of personalized method for secret protection provided in an embodiment of the present invention, subjective demand and objective ring by user Border, in conjunction with user terminal current state information, decision gone out privacy protection policy, secret protection effect and resource consumption balanced it Between the privacy protection policy of relationship improve the effect of secret protection to provide dynamic personalized secret protection for user, More efficiently protect privacy of user.
On the basis of the above embodiments, it is described obtained according to subjective and objective demand information and the current state information it is each The evaluation index of privacy protection policy, comprising:
Decision objective set, influence factor set and privacy protection policy collection are obtained according to the subjective and objective demand information It closes;
Relationship between decision objective and influence factor is obtained according to the decision objective set and the influence factor set Function expression;
The decision-making power weight values of each decision objective in the decision objective set are obtained according to the current state information;
According to the function expression and the decision-making power weight values, each privacy in the privacy protection policy set is obtained The evaluation index of Preservation tactics.
In embodiments of the present invention, decision objective set, influence factor set and hidden are obtained by subjective and objective demand information Private Preservation tactics set, wherein include user terminal electric quantity consumption situation, bandwidth consumption situation and privacy in decision objective set Demand etc., various factors will affect the decision objective that can privacy protection policy reach required in influence factor set, and these Influence factor can be remaining capacity and network connection situation of user terminal etc., and what privacy protection policy set included is parameter It is worth fixed Privacy Preservation Mechanism.After determining decision objective set, influence factor set and privacy protection policy set, The function expression of relationship between decision objective and influence factor is obtained according to decision objective set and influence factor set.
It is determining between decision objective and influence factor after the function expression of relationship, is being obtained according to current state information The decision-making power weight values of each decision objective in decision objective set, in embodiments of the present invention, the current state letter that will acquire Breath is weighted processing to decision objective by subjective weighting method or objective weighted model, wherein level can be used in subjective weighting method Principal Component Analysis or multi-objective programming method etc. can be used in analytic approach or binomial coefficient method etc., objective weighted model.Then, according to working as The value and function expression of preceding influence factor generate the decision square for indicating privacy protection policy Yu decision objective relationship Battle array.Then, optimizing decision weighted value and worst decision-making power weight values in decision objective are selected according to decision matrix, to be formed optimal Two vectors of decision-making power weight values and worst decision-making power weight values, then calculate every kind of privacy protection policy and optimizing decision weighted value The distance between worst decision-making power weight values difference, finally, being referred to according to the assessment that distance difference obtains each privacy protection policy Mark, to generate optimal privacy protection policy.
On the basis of the above embodiments, described to be determined according to the decision objective set and the influence factor set The function expression of relationship between plan target and influence factor, comprising:
According to the relationship between the decision objective set and the influence factor set, judge to whether there is between set Theoretic direct relation directly obtains the function expression if presence is known in judgement;
If judgement knows that there is no theoretic direct relations between set, by the decision objective set and the shadow It rings sets of factors and is fitted processing, obtain the function expression.
In embodiments of the present invention, it according to theory relation existing between influence factor and decision objective, directly generates and is used for The function expression of its relationship is described, if between the two be not present theoretic direct relation, according to collected influence because The data of element and decision objective, by being fitted to these data, for example, spline-fit and neural network etc., to generate Corresponding function expression.
On the basis of the above embodiments, described to be obtained in the decision objective set often according to the current state information The decision-making power weight values of a decision objective, comprising:
Based on the current state information, the decision objective set is carried out by subjective weighting method or objective weighted model Weighting processing, obtains the decision-making power weight values of each decision objective in the decision objective set.
In embodiments of the present invention, by the current state information of user terminal by subjective weighting method, such as such as, level point Analysis method or binomial coefficient method etc.;Or objective weighted model, for example, Principal Component Analysis or multi-objective programming method etc., to be decision Each decision objective is weighted processing in target collection, obtains the decision-making power weight values of each decision objective.
On the basis of the above embodiments, described according to the function expression and the decision-making power weight values, it obtains described The evaluation index of each privacy protection policy in privacy protection policy set, comprising:
The decision matrix based on relationship between privacy protection policy and decision objective is obtained, the decision matrix is according to The value of influence factor set and the function expression obtain;
The optimizing decision weighted value in the decision matrix and worst decision-making power weight values are obtained, according to each secret protection plan Slightly with the distance between optimizing decision weighted value difference and each privacy protection policy and the worst decision-making power weight values The distance between difference, the evaluation index of each privacy protection policy in the privacy protection policy set is obtained, if institute's commentary Estimate index and meets preset condition, then using the corresponding privacy protection policy of the evaluation index as optimal privacy protection policy, with Privacy is carried out to privacy of user.
Fig. 2 is the structural schematic diagram of personalized privacy protection device provided in an embodiment of the present invention, as shown in Fig. 2, this hair Bright embodiment provides a kind of personalized privacy protection device, comprising: it is true to obtain module 201, processing module 202 and privacy policy Cover half block 203, wherein obtain subjective and objective demand information and current state information that module 201 is used to obtain user;Processing module 202 for obtaining the evaluation index of every privacy protection policy according to the subjective and objective demand information and the current state information; Privacy policy confirmation module 203 is used to obtain optimal privacy protection policy according to the evaluation index, to carry out to privacy of user Protection.
A kind of personalized privacy protection device provided in an embodiment of the present invention, subjective demand and objective ring by user Border, in conjunction with user terminal current state information, decision gone out privacy protection policy, secret protection effect and resource consumption balanced it Between the privacy protection policy of relationship improve the effect of secret protection to provide dynamic personalized secret protection for user, More efficiently protect privacy of user.
On the basis of the above embodiments, the processing module 202 includes: subjective and objective demand information processing unit, function Expression formula structural unit, weight calculation unit and assessment unit, wherein subjective and objective demand information unit is used for according to the host and guest It sees demand information and obtains decision objective set, influence factor set and privacy protection policy set;Function expression structural unit For obtaining the letter of relationship between decision objective and influence factor according to the decision objective set and the influence factor set Number expression formula;Weight calculation unit is used to obtain each decision mesh in the decision objective set according to the current state information Target decision-making power weight values;Assessment unit is used to obtain the privacy according to the function expression and the decision-making power weight values and protect Protect the evaluation index of each privacy protection policy in strategy set.
On the basis of the above embodiments, the privacy policy determining module 203 includes: that decision matrix unit and assessment refer to Mark unit, wherein decision matrix unit is used to obtain the decision matrix based on relationship between privacy protection policy and decision objective, The decision matrix is obtained according to the value and the function expression of the influence factor set;Evaluation index unit is for obtaining Take the optimizing decision weighted value in the decision matrix and worst decision-making power weight values, according to each privacy protection policy and it is described most The distance between excellent decision-making power weight values difference and the distance between each privacy protection policy and the worst decision-making power weight values Difference obtains the evaluation index of each privacy protection policy in the privacy protection policy set, if the evaluation index meets Preset condition, then using the corresponding privacy protection policy of the evaluation index as optimal privacy protection policy, to privacy of user It is protected.
Device provided in an embodiment of the present invention is for executing above-mentioned each method embodiment, detailed process and detailed content Above-described embodiment is please referred to, details are not described herein again.
Fig. 3 is electronic devices structure schematic diagram provided in an embodiment of the present invention, as shown in figure 3, the electronic equipment can wrap It includes: processor (processor) 301, communication interface (Communications Interface) 302, memory (memory) 303 and communication bus 304, wherein processor 301, communication interface 302, memory 303 are completed mutually by communication bus 304 Between communication.Processor 301 can call the logical order in memory 303, to execute following method: obtaining the host and guest of user See demand information and current state information;Each privacy is obtained according to the subjective and objective demand information and the current state information The evaluation index of Preservation tactics;Optimal privacy protection policy is obtained according to the evaluation index, to protect to privacy of user.
In addition, the logical order in above-mentioned memory 303 can be realized by way of SFU software functional unit and conduct Independent product when selling or using, can store in a computer readable storage medium.Based on this understanding, originally Substantially the part of the part that contributes to existing technology or the technical solution can be in other words for the technical solution of invention The form of software product embodies, which is stored in a storage medium, including some instructions to So that a computer equipment (can be personal computer, server or the network equipment etc.) executes each implementation of the present invention The all or part of the steps of example the method.And storage medium above-mentioned include: USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic or disk etc. it is various It can store the medium of program code.
The embodiment of the present invention discloses a kind of computer program product, and the computer program product is non-transient including being stored in Computer program on computer readable storage medium, the computer program include program instruction, when described program instructs quilt When computer executes, computer is able to carry out method provided by above-mentioned each method embodiment, for example, obtains the master of user Objective demand information and current state information;It is obtained according to the subjective and objective demand information and the current state information each hidden The evaluation index of private Preservation tactics;Optimal privacy protection policy is obtained according to the evaluation index, to protect to privacy of user Shield.
The embodiment of the present invention provides a kind of non-transient computer readable storage medium, the non-transient computer readable storage medium The instruction of matter storage server, the computer instruction make computer execute personalization secret protection side provided by above-described embodiment Method, for example, obtain the subjective and objective demand information and current state information of user;According to the subjective and objective demand information and institute It states current state information and obtains the evaluation index of each privacy protection policy;Optimal secret protection is obtained according to the evaluation index Strategy, to be protected to privacy of user.
Finally, it should be noted that the above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although Present invention has been described in detail with reference to the aforementioned embodiments, those skilled in the art should understand that: it still may be used To modify the technical solutions described in the foregoing embodiments or equivalent replacement of some of the technical features; And these are modified or replaceed, technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution spirit and Range.

Claims (10)

1. a kind of personalization method for secret protection characterized by comprising
Obtain the subjective and objective demand information and current state information of user;
The evaluation index of each privacy protection policy is obtained according to the subjective and objective demand information and the current state information;
Optimal privacy protection policy is obtained according to the evaluation index, to protect to privacy of user.
2. the method according to claim 1, wherein described according to subjective and objective demand information and the current state Information obtains the evaluation index of each privacy protection policy, comprising:
Decision objective set, influence factor set and privacy protection policy set are obtained according to the subjective and objective demand information;
The letter of relationship between decision objective and influence factor is obtained according to the decision objective set and the influence factor set Number expression formula;
The decision-making power weight values of each decision objective in the decision objective set are obtained according to the current state information;
According to the function expression and the decision-making power weight values, each secret protection in the privacy protection policy set is obtained The evaluation index of strategy.
3. according to the method described in claim 2, it is characterized in that, it is described according to the decision objective set and the influence because Element set obtains the function expression of relationship between decision objective and influence factor, comprising:
According to the relationship between the decision objective set and the influence factor set, judge between set with the presence or absence of theory On direct relation, if judgement know presence, directly obtain the function expression;
If judgement is known between set there is no theoretic direct relation, by the decision objective set and the influence because Element set is fitted processing, obtains the function expression.
4. according to the method described in claim 2, it is characterized in that, described obtain the decision according to the current state information The decision-making power weight values of each decision objective in target collection, comprising:
Based on the current state information, the decision objective set is weighted by subjective weighting method or objective weighted model Processing, obtains the decision-making power weight values of each decision objective in the decision objective set.
5. according to the method described in claim 2, it is characterized in that, described according to the function expression and the decision weights Value, obtains the evaluation index of each privacy protection policy in the privacy protection policy set, comprising:
The decision matrix based on relationship between privacy protection policy and decision objective is obtained, the decision matrix is according to the influence The value of sets of factors and the function expression obtain;
Obtain the optimizing decision weighted value in the decision matrix and worst decision-making power weight values, according to each privacy protection policy with Between the distance between optimizing decision weighted value difference and each privacy protection policy and the worst decision-making power weight values Distance difference, obtain the evaluation index of each privacy protection policy in the privacy protection policy set, if it is described assessment refer to Mark meets preset condition, then using the corresponding privacy protection policy of the evaluation index as optimal privacy protection policy, with to Family privacy is protected.
6. a kind of personalization privacy protection device characterized by comprising
Module is obtained, for obtaining the subjective and objective demand information and current state information of user;
Processing module, for obtaining every privacy protection policy according to the subjective and objective demand information and the current state information Evaluation index;
Privacy policy confirmation module, for obtaining optimal privacy protection policy according to the evaluation index, with to privacy of user into Row protection.
7. device according to claim 6, which is characterized in that the processing module includes:
Subjective and objective demand information processing unit, for according to the subjective and objective demand information obtain decision objective set, influence because Element set and privacy protection policy set;
Function expression structural unit, for obtaining decision objective according to the decision objective set and the influence factor set The function expression of relationship between influence factor;
Weight calculation unit, for obtaining each decision objective in the decision objective set according to the current state information Decision-making power weight values;
Assessment unit, for obtaining the privacy protection policy set according to the function expression and the decision-making power weight values In each privacy protection policy evaluation index.
8. device according to claim 7, which is characterized in that the privacy policy determining module includes:
Decision matrix unit, it is described to determine for obtaining the decision matrix based on relationship between privacy protection policy and decision objective Plan matrix is obtained according to the value and the function expression of the influence factor set;
Evaluation index unit, for obtaining optimizing decision weighted value and worst decision-making power weight values in the decision matrix, according to The distance between each privacy protection policy and the optimizing decision weighted value difference and each privacy protection policy with it is described The distance between worst decision-making power weight values difference, obtains the assessment of each privacy protection policy in the privacy protection policy set Index, if the evaluation index meets preset condition, using the corresponding privacy protection policy of the evaluation index as optimal hidden Private Preservation tactics, to be protected to privacy of user.
9. a kind of electronic equipment including memory, processor and stores the calculating that can be run on a memory and on a processor Machine program, which is characterized in that the processor is realized when executing described program such as any one of claim 1 to 5 the method Step.
10. a kind of non-transient computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer It is realized when program is executed by processor such as the step of any one of claim 1 to 5 the method.
CN201811368178.6A 2018-11-16 2018-11-16 Personalized privacy protection method and device Active CN109684865B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811368178.6A CN109684865B (en) 2018-11-16 2018-11-16 Personalized privacy protection method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811368178.6A CN109684865B (en) 2018-11-16 2018-11-16 Personalized privacy protection method and device

Publications (2)

Publication Number Publication Date
CN109684865A true CN109684865A (en) 2019-04-26
CN109684865B CN109684865B (en) 2020-06-16

Family

ID=66184759

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811368178.6A Active CN109684865B (en) 2018-11-16 2018-11-16 Personalized privacy protection method and device

Country Status (1)

Country Link
CN (1) CN109684865B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113645187A (en) * 2021-07-06 2021-11-12 暨南大学 Privacy measurement and protection policy selection method, device, server and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101493874A (en) * 2009-01-08 2009-07-29 西安交通大学 Personal context information privacy protection policy automatic generating method
CN103049704A (en) * 2012-12-07 2013-04-17 哈尔滨工业大学深圳研究生院 Self-adaptive privacy protection method and device for mobile terminal
EP2827277A1 (en) * 2013-07-16 2015-01-21 Alcatel Lucent Privacy protection in personalisation services
CN106650485A (en) * 2016-09-18 2017-05-10 山东大学 Personalized environmental perception privacy protection method based on Android
CN108416227A (en) * 2018-03-01 2018-08-17 山东大学 Big data platform secret protection evaluation method and device based on Dare Information Entropy

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101493874A (en) * 2009-01-08 2009-07-29 西安交通大学 Personal context information privacy protection policy automatic generating method
CN103049704A (en) * 2012-12-07 2013-04-17 哈尔滨工业大学深圳研究生院 Self-adaptive privacy protection method and device for mobile terminal
EP2827277A1 (en) * 2013-07-16 2015-01-21 Alcatel Lucent Privacy protection in personalisation services
CN106650485A (en) * 2016-09-18 2017-05-10 山东大学 Personalized environmental perception privacy protection method based on Android
CN108416227A (en) * 2018-03-01 2018-08-17 山东大学 Big data platform secret protection evaluation method and device based on Dare Information Entropy

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
李凤华等: "隐私计算研究范畴及发展趋势", 《通信学报》 *
牛犇等: "移动网络中场景关联的隐私保护机制研究", 《网络与信息安全学报》 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113645187A (en) * 2021-07-06 2021-11-12 暨南大学 Privacy measurement and protection policy selection method, device, server and storage medium

Also Published As

Publication number Publication date
CN109684865B (en) 2020-06-16

Similar Documents

Publication Publication Date Title
Zhang et al. Privacy-preserving quality prediction for edge-based IoT services
Olejnik et al. Smarper: Context-aware and automatic runtime-permissions for mobile devices
CN110647921B (en) User behavior prediction method, device, equipment and storage medium
AU2015213817B2 (en) Systems, apparatuses and methods for communication flow modification
RU2607621C2 (en) Method, system and computer-readable data medium for grouping in social networks
US20170153917A1 (en) Account activity level based-system resource allocating method and device
Wang et al. Infedge: A blockchain-based incentive mechanism in hierarchical federated learning for end-edge-cloud communications
WO2020211247A1 (en) Account information login method and device, computer device and computer storage medium
CN106910057A (en) The safety certifying method and device of mobile terminal and mobile terminal side
CN103049704A (en) Self-adaptive privacy protection method and device for mobile terminal
TWI701932B (en) Identity authentication method, server and client equipment
CN109661671B (en) Improvement of image classification using boundary bitmaps
CN106789947B (en) Internet of things node trust value evaluation and task delegation method based on environment
CN109684865A (en) A kind of personalization method for secret protection and device
CN109753873A (en) Image processing method and relevant apparatus
Xu et al. Cooperative swarm learning for distributed cyclic edge intelligent computing
US10621417B2 (en) Systems and methods for generating content
CN108921798A (en) The method, apparatus and electronic equipment of image procossing
Zou et al. ST-EUA: Spatio-temporal edge user allocation with task decomposition
CN110909189A (en) Method and device for processing face picture
CN116091844A (en) Image data processing method and system based on edge calculation
Atov et al. Data science and artificial intelligence for communications
Macedo et al. An evolutionary spatial game-based approach for the self-regulation of social exchanges in MAS
CN115170390A (en) File stylization method, device, equipment and storage medium
Sun et al. Optimal defense strategy model based on differential game in edge computing

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant