CN110365679B - Context-aware cloud data privacy protection method based on crowdsourcing evaluation - Google Patents
Context-aware cloud data privacy protection method based on crowdsourcing evaluation Download PDFInfo
- Publication number
- CN110365679B CN110365679B CN201910637836.5A CN201910637836A CN110365679B CN 110365679 B CN110365679 B CN 110365679B CN 201910637836 A CN201910637836 A CN 201910637836A CN 110365679 B CN110365679 B CN 110365679B
- Authority
- CN
- China
- Prior art keywords
- data
- context
- evaluation
- crowdsourcing
- sharing
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
- H04L63/205—Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Signal Processing (AREA)
- Databases & Information Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The invention aims to provide a context-aware cloud data privacy protection method based on crowdsourcing evaluation, which can provide data privacy protection service for a user in a cloud data sharing context. The method can sense the situation of user data sharing, including data type, content type, data owner and the like, and provides different data sharing strategies according to different situations, thereby effectively protecting the privacy of user data; meanwhile, collective intelligence of cloud users is integrated in a crowdsourcing mode, and based on a project reaction theory, data sensitivity is comprehensively and effectively evaluated in an objective evaluation and interactive crowdsourcing mode from the perspective of a system, accuracy of data privacy safety risk evaluation is further improved, and data privacy protection service under a cloud data sharing situation is provided for users.
Description
Technical Field
The invention belongs to the field of data privacy security, and particularly relates to a context-aware cloud data privacy protection method based on crowdsourcing evaluation.
Background
Under the era of mobile internet and cloud computing, users can enjoy various cloud application services including taxi taking, takeaway, mobile payment and the like by providing identity information for registration. However, users are exposed to the risk of private data leakage while enjoying various convenient application services. For example, the insecurity of netizens is increased in cases of secret divulgence such as data theft of 32 universal users in china 32 of the times of the cable television company of the united states, password leakage of a Tumblr account number of 6500 universal mailbox of a light blog website, public sale of 1.67 million accounts in black city of LinkedIn and the like. Ordinary users cannot protect the data security of themselves, and even do not realize the identity data of the users and the behavior data of service enjoying, the privacy information of travel laws, eating habits, consumption habits, interests and the like of the users is disclosed.
For the problem of privacy disclosure, the existing encryption-based method is difficult to be applied to a cloud scene, for example, if user data is encrypted ciphertext in the cloud, the file cannot be shared with other users. Other privacy preserving methods focus on privacy preserving signatures in the digital signature process. The method focuses on privacy protection of the consumers in different consumption scenes, and is not considered in different cloud data sharing scenes.
Disclosure of Invention
The invention provides a context-aware cloud data privacy protection method based on crowdsourcing evaluation, which solves the problem that an ordinary user cannot judge privacy disclosure risks independently, and particularly cannot estimate the disclosure risks after data is shared when the data is shared; according to the invention, the problem of data leakage is solved according to the lowest data privacy leakage storage mode in different cloud data sharing scenes.
The technical scheme adopted by the invention is as follows:
a context-aware cloud data privacy protection method based on crowd-sourcing evaluation comprises the following steps:
s1, the client generates a context dictionary according to the context information of the data file, and then the client sends the generated context dictionary to the server as a sensitivity query list;
s2, inquiring and establishing a data sensitivity value: the server inquires each situation in the situation List in the data sensitivity value database after receiving the client inquiry List, and directly returns a data sensitivity value (List) to the client if the situation is evaluated; otherwise, if the evaluation is not performed, the server side returns a List; simultaneously, designing the uploaded situation information into a crowdsourcing task, inviting the user to evaluate the sensitivity of the data together to obtain a data sensitivity value, and then storing the data sensitivity value obtained after crowdsourcing evaluation into a data sensitivity value database for the server side to inquire;
s3, evaluation of privacy risk exposure value: the server calculates objective probability value of the data privacy leakage event according to the context information received in the step S2 and the leakage probability corresponding to the same previous context information in the server; performing comprehensive evaluation according to the objective probability value and the data sensitivity value obtained by crowd sourcing evaluation in the second step to obtain a privacy risk leakage value;
s4, strategy recommendation: forming and recommending a plurality of sharing strategies with different risks according to the privacy risk leakage value evaluated in the step S3;
s5, applying a strategy: and according to the different risk sharing strategies obtained in the step S4, selecting a sharing strategy corresponding to the risk to apply to the data, and sharing the data processed by the corresponding sharing strategy to the cloud.
At present, users generally lack basic privacy protection consciousness, privacy safety of the users is often ignored, and a word bank under the privacy protection situation is created to help the users to evaluate the privacy protection consciousness degree of different users and to react to privacy protection in different aspects; based on a context thesaurus, a risk assessment algorithm is designed to determine sensitivity in a data sharing process and security policy (policies) setting of a user on privacy; the method can sense the situation of user data sharing, including data type, content type, data owner and the like, and provides different data sharing strategies according to different situations, thereby effectively protecting the privacy of user data; meanwhile, collective intelligence of cloud users is integrated in a crowdsourcing mode, and based on a project reaction theory, data sensitivity is comprehensively and effectively evaluated in an objective evaluation and interactive crowdsourcing mode from the perspective of a system, accuracy of data privacy safety risk evaluation is further improved, and data privacy protection service under a cloud data sharing situation is provided for users.
Further, in step S1, the context dictionary includes identity information of the sharee and/or a sharing policy and/or a sharing file type; the context dictionary defines the context of the shared data.
Further, before the context dictionary is sent in step S1, the information of the context dictionary is processed, and the processing mode includes processing in an anonymous form and/or an encrypted form and/or a data obfuscation form.
Further, after the data sensitivity value obtained in step S2 is returned to the client, the client caches information of the context dictionary corresponding to the data sensitivity value, and provides the client with a query; after the client generates the context dictionary, inquiring corresponding data sensitivity values for the information of the context dictionary in a cache database of the client so that the client can directly obtain the data sensitivity values; if the client side inquires the corresponding data sensitivity value, the information of the situation dictionary is not sent to the server any more; otherwise, if the client does not inquire the corresponding data sensitivity value in the cache database, the step S1 is performed.
Further, after the data is uploaded to the server according to the selected sharing policy in step S5, the uploaded data is shared.
Further, in step S3, a comprehensive evaluation is performed according to the data sensitivity value obtained in step S and the probability value of the occurrence of the data privacy leakage event, where the comprehensive evaluation employs a weighted evaluation function and/or a product evaluation function.
Further, the sharing policies of different risks in step S4 at least include two policies of completely disclosing shared data and not disclosing shared data at all; the full disclosure is to directly disclose and share data; the complete disclosure is to encrypt the data and partially hide the metadata of the data.
Further, the partial hiding of the metadata of the data includes data owner information and/or time information of last modification.
Further, after the data upload is completed each time in step S5, the context information and the corresponding sharing policy of the data upload sharing are sent to the cloud, and the evaluation history of this time is recorded for the next evaluation and crowd sourcing evaluation analysis.
The invention has the following advantages and beneficial effects:
1. the invention can provide data privacy protection service for the user in the cloud data sharing situation. At present, users generally lack basic privacy protection consciousness, privacy safety of the users is often ignored, and a word bank under the privacy protection situation is created to help the users to evaluate the privacy protection consciousness degree of different users and to react to privacy protection in different aspects; based on a context thesaurus, a risk assessment algorithm is designed to determine sensitivity in a data sharing process and security policy (policies) setting of a user on privacy; the method can sense the situation of user data sharing, including data type, content type, data owner and the like, and provides different data sharing strategies according to different situations, thereby effectively protecting the privacy of user data; meanwhile, collective intelligence of cloud users is integrated in a crowdsourcing mode, and based on a project reaction theory, data sensitivity is comprehensively and effectively evaluated in an objective evaluation and interactive crowdsourcing mode from the perspective of a system, accuracy of data privacy safety risk evaluation is further improved, and data privacy protection service under a cloud data sharing situation is provided for users.
2. The context awareness is embodied in that different contexts in the data sharing process can be accurately described by establishing a context dictionary, the data privacy leakage risk is evaluated according to the different contexts, and corresponding sharing strategies are recommended; the method has the advantages that a crowdsourcing evaluation mode is adopted, the sensitivity of the user to different data privacy is scientifically evaluated by combining a project reaction theory, the data sensitivity values of the user under different scenes are obtained by using collective wisdom and shared wisdom, and more personalized data privacy protection strategies are provided for different purposes.
Drawings
The accompanying drawings, which are included to provide a further understanding of the embodiments of the invention and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the invention and together with the description serve to explain the principles of the invention. In the drawings:
FIG. 1 is a schematic flow diagram of the process of the present invention.
FIG. 2 is a diagram of a context dictionary for data sharing according to the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is further described in detail below with reference to examples and accompanying drawings, and the exemplary embodiments and descriptions thereof are only used for explaining the present invention and are not meant to limit the present invention.
It should be understood that the terms first, second, etc. are used merely for distinguishing between descriptions and are not intended to indicate or imply relative importance. Although the terms first, second, etc. may be used herein to describe various elements, these elements should not be limited by these terms. These terms are only used to distinguish one element from another. For example, a first element could be termed a second element, and, similarly, a second element could be termed a first element, without departing from the scope of example embodiments of the present invention.
It should be understood that the term "and/or" herein is merely one type of association relationship that describes an associated object, meaning that three relationships may exist, e.g., a and/or B may mean: a exists alone, B exists alone, and A and B exist at the same time, and the term "/and" is used herein to describe another association object relationship, which means that two relationships may exist, for example, A/and B, may mean: a alone, and both a and B alone, and further, the character "/" in this document generally means that the former and latter associated objects are in an "or" relationship.
It is to be understood that in the description of the present invention, the terms "upper", "vertical", "inside", "outside", and the like, refer to an orientation or positional relationship that is conventionally used for placing the product of the present invention, or that is conventionally understood by those skilled in the art, and are used merely for convenience in describing and simplifying the description, and do not indicate or imply that the device or element referred to must have a particular orientation, be constructed in a particular orientation, and be operated, and therefore should not be considered as limiting the present invention.
It will be understood that when an element is referred to as being "connected," "connected," or "coupled" to another element, it can be directly connected or coupled to the other element or intervening elements may be present. In contrast, when an element is referred to as being "directly adjacent" or "directly coupled" to another element, there are no intervening elements present. Other words used to describe the relationship between elements should be interpreted in a similar manner (e.g., "between … …" versus "directly between … …", "adjacent" versus "directly adjacent", etc.).
In the description of the present invention, it should also be noted that, unless otherwise explicitly specified or limited, the terms "disposed," "mounted," and "connected" are to be construed broadly, e.g., as meaning fixedly connected, detachably connected, or integrally connected; can be mechanically or electrically connected; they may be connected directly or indirectly through intervening media, or they may be interconnected between two elements. The specific meanings of the above terms in the present invention can be understood in specific cases to those skilled in the art.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of example embodiments of the invention. As used herein, the singular forms "a", "an" and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms "comprises," "comprising," "includes," and/or "including," when used herein, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, numbers, steps, operations, elements, components, and/or groups thereof.
Example 1:
as shown in fig. 1 and fig. 2, the embodiment provides a context-aware cloud data privacy protection method based on crowdsourcing evaluation, which includes the following steps:
s1, the client generates a context dictionary according to the context information of the data file, and then the client sends the generated context dictionary to the server as a sensitivity query list;
s2, inquiring and establishing a data sensitivity value: after receiving the client query list, the server queries each situation in the situation list in the data sensitivity value database, and if the situation is evaluated, the server directly returns a data sensitivity value to the client; otherwise, if the situation information is not evaluated, the server end designs the uploaded situation information into a crowdsourcing task, invites the user to evaluate the sensitivity of the data together to obtain a data sensitivity value, and then stores the data sensitivity value obtained after crowdsourcing evaluation into the data sensitivity value database for the server end to inquire;
s3, evaluation of privacy risk exposure value: the server calculates objective probability value of the data privacy leakage event according to the context information received in the step S2 and the leakage probability corresponding to the same previous context information in the server; performing comprehensive evaluation according to the objective probability value and the data sensitivity value obtained by crowd sourcing evaluation in the second step to obtain a privacy risk leakage value;
s4, strategy recommendation: forming and recommending a plurality of sharing strategies with different risks according to the privacy risk leakage value evaluated in the step S3;
s5, applying a strategy: and according to the different risk sharing strategies obtained in the step S4, selecting a sharing strategy corresponding to the risk to apply to the data, and sharing the data processed by the corresponding sharing strategy to the cloud.
And judging the setting of each sharing operation, the sharing situation and the sharing strategy by adopting a crowdsourcing mode based on the crowdsourcing data sensitivity evaluation. The wisdom of many users is utilized to determine the risk of data leakage. Based on a project reaction theory, objective evaluation from the perspective of a system and an interactive crowdsourcing mode are used for comprehensively and effectively evaluating data sensitivity, and the reaction of a user can be two-dimensional, such as correct or wrong, agreement or disagreement; it may also be multi-dimensional, such as strongly disagreeable, neutral, agreeable, strongly agreeable, and the like. An example of a crowdsourcing task is where Bob shares an Excel on Bob's computer with Alice about Bob's financial status, and the risk rating assessment is very high, normal, low, and very low. After evaluation by the user, we evaluate different contexts. An example of crowd-sourced assessment is that we can be based on a Rasch model, and can effectively reflect the information contribution of items with different characteristics (parameters) when evaluating different tested characteristic levels. The project response function can be defined as
To evaluate the probability, beta, that the nth person has a correct judgment on the item inIndicates the capabilities of the nth person, and δiThe difficulty of the simulation item i. The parameter beta can be estimated by methods such as maximum likelihood estimation and the likenAnd deltai. This requires us to collect enough user responses to different sharing scenarios. Therefore, the data sharing situation and the data sensitivity value are stored for other data sensitivity queries from the client, so that quick response is achieved, and operation is convenient.
In step S1, the context dictionary includes identity information of the sharee and/or sharing policy and/or sharing file type. The context dictionary defines the context of the data to be shared, for example, Bob shares an Excel about Bob's financial status with Alice on Bob's computer. The context that we refine then includes file type, file content type, file storage location, sharer and sharee of the file. FIG. 2 shows a segment of a context map for data. We define a context font as a set of key-value doublets, such as (data type Excel, content type finance, storage location office).
According to the method, different situations in the data sharing process can be accurately described by establishing the situation dictionary, the data privacy leakage risk is evaluated according to the different situations, and corresponding sharing strategies are recommended; the method has the advantages that a crowdsourcing evaluation mode is adopted, the sensitivity of a user to different data privacy is scientifically evaluated by combining a project reaction theory, the data sensitivity values of the user under different scenes are obtained by using collective wisdom and shared wisdom, and more personalized data privacy protection strategies are provided for different purposes; the situation of user data sharing can be sensed, wherein the situation comprises a data category, a content category, a data owner and the like, different data sharing strategies are provided according to different situations, and the privacy of user data is effectively protected; meanwhile, collective intelligence of cloud users is integrated in a crowdsourcing mode, data sensitivity is effectively evaluated based on a project reaction theory, accuracy of data privacy safety risk evaluation is further improved, and data privacy protection service under a cloud data sharing situation is provided for users;
before the context dictionary is sent in step S1, the information of the context dictionary is processed, and the processing mode includes processing in an anonymous form and/or an encrypted form and/or a data obfuscation form. In specific implementation, taking data obfuscation as an example, for instance, context1 (k1 v1, k2 w2, and k3 y3), at a client, after data obfuscation, we form a List [ { v1, v4, v6}, { w1, w2, w5}, { y2, y3, y5} ], where the obfuscation coefficient k is 3, and each context has k3 possible values; the list of possible query context dictionaries is thus a Cartesian product: q { (v1, w1, y2), (v1, w1, y3), (v1, w1, y5), (v1, w2, y2), … }, so that the client sends the query List and Q after data confusion to the server for query.
In specific implementation, after the data sensitivity value obtained in step S2 is returned to the client, the client caches information of the context dictionary corresponding to the data sensitivity value, and provides the client with the information for querying; after the client generates the context dictionary, inquiring corresponding data sensitivity values for the information of the context dictionary in a cache database of the client so that the client can directly obtain the data sensitivity values; if the client side inquires the corresponding data sensitivity value, the information of the situation dictionary is not sent to the server any more; otherwise, if the client does not inquire the corresponding data sensitivity value in the cache database, the step S1 is performed.
In specific implementation, after the data is uploaded to the server according to the selected sharing policy in step S5, the uploaded data is shared.
In specific implementation, in step S3, the data privacy risk is evaluated by using a data privacy risk evaluation function, where the evaluation function may be determined according to different scenarios, such as a weighted product, a product, and the like.
In specific implementation, the sharing policies of different risks in step S4 at least include two policies of completely disclosing shared data and not disclosing shared data; the full disclosure is to directly disclose and share data; the complete disclosure is to encrypt the data and partially hide the metadata of the data. In specific implementation, the security policy value can be between [0,1], and the system can be flexibly adjusted; 0 means completely transparent and 1 means not shared at all. For example, if the user sharing policy is 1, it indicates that the data is not shared at all, which requires encrypting the data. If part of the metadata information is hidden, including data owner information, last modification time, etc., the value may be 0.2.
In a specific implementation, the partial hiding of the metadata of the data includes data owner information and/or last modified time information.
In specific implementation, after the data uploading is completed in step S5 each time, the context information and the corresponding sharing policy of the data uploading sharing are sent to the cloud, and the evaluation history of the time is recorded for the next evaluation and crowd-sourced evaluation analysis.
The above-mentioned embodiments are intended to illustrate the objects, technical solutions and advantages of the present invention in further detail, and it should be understood that the above-mentioned embodiments are merely exemplary embodiments of the present invention, and are not intended to limit the scope of the present invention, and any modifications, equivalent substitutions, improvements and the like made within the spirit and principle of the present invention should be included in the scope of the present invention.
Claims (9)
1. A context-aware cloud data privacy protection method based on crowd-sourcing evaluation is characterized by comprising the following steps: the method comprises the following steps:
s1, the client generates a context dictionary according to the context information of the data file, and the context dictionary is used for defining the context of the shared data; then the client sends the generated context dictionary to the server as a sensitivity query list;
s2, inquiring and establishing a data sensitivity value: after receiving the client query list, the server queries each situation in the situation list in the data sensitivity value database, and if the situation is evaluated, the server directly returns a data sensitivity value to the client; otherwise, if the situation information is not evaluated, the server end designs the uploaded situation information into a crowdsourcing task, invites the user to evaluate the sensitivity of the data together to obtain a data sensitivity value, and then stores the data sensitivity value obtained after crowdsourcing evaluation into the data sensitivity value database for the server end to inquire;
s3, evaluation of privacy risk exposure value: the server calculates objective probability value of the data privacy leakage event according to the context information received in the step S2 and the leakage probability corresponding to the same previous context information in the server; performing comprehensive evaluation according to the objective probability value and the data sensitivity value obtained by crowdsourcing evaluation in the step S2 to obtain a privacy risk leakage value;
s4, strategy recommendation: forming and recommending a plurality of sharing strategies with different risks according to the privacy risk leakage value evaluated in the step S3;
s5, applying a strategy: and according to the different risk sharing strategies obtained in the step S4, selecting a sharing strategy corresponding to the risk to apply to the data, and sharing the data processed by the corresponding sharing strategy to the cloud.
2. The context-aware cloud data privacy protection method based on crowdsourcing evaluation according to claim 1, wherein: in step S1, the context dictionary includes identity information of the sharee and/or sharing policy and/or sharing file type.
3. The context-aware cloud data privacy protection method based on crowdsourcing evaluation according to claim 1, wherein: before the context dictionary is sent in step S1, the information of the context dictionary is processed, and the processing mode includes processing in an anonymous form and/or an encrypted form and/or a data obfuscation form.
4. The context-aware cloud data privacy protection method based on crowdsourcing evaluation according to claim 1, wherein: after the data sensitivity value obtained in step S2 is returned to the client, the client caches information of the context dictionary corresponding to the data sensitivity value, and provides the client with a query; after the client generates the context dictionary, inquiring corresponding data sensitivity values for the information of the context dictionary in a cache database of the client so that the client can directly obtain the data sensitivity values; if the client side inquires the corresponding data sensitivity value, the information of the situation dictionary is not sent to the server any more; otherwise, if the client does not inquire the corresponding data sensitivity value in the cache database, the step S1 is performed.
5. The context-aware cloud data privacy protection method based on crowdsourcing evaluation according to claim 1, wherein: after the data is uploaded to the server according to the selected sharing policy in step S5, the uploaded data is also shared.
6. The context-aware cloud data privacy protection method based on crowdsourcing evaluation according to claim 1, wherein: and in the step S3, performing comprehensive evaluation according to the data sensitivity value obtained in the step S2 and the probability value of the occurrence of the data privacy leakage event, wherein the comprehensive evaluation adopts a weighted evaluation function and/or a product evaluation function.
7. The context-aware cloud data privacy protection method based on crowdsourcing evaluation according to claim 1, wherein: in step S4, the sharing policies of different risks at least include two policies of completely disclosing shared data and not disclosing shared data; the full disclosure is to directly disclose and share data; the complete disclosure is to encrypt the data and partially hide the metadata of the data.
8. The context-aware cloud data privacy protection method based on crowdsourcing evaluation according to claim 7, wherein: partial hiding of metadata of data includes data owner information and/or time information of last modification.
9. The context-aware cloud data privacy protection method based on crowdsourcing evaluation according to claim 1, wherein: after the data uploading is completed in step S5 each time, the context information and the corresponding sharing policy of the data uploading sharing are sent to the cloud, and the evaluation history of this time is recorded for the next evaluation and crowd sourcing evaluation analysis.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910637836.5A CN110365679B (en) | 2019-07-15 | 2019-07-15 | Context-aware cloud data privacy protection method based on crowdsourcing evaluation |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910637836.5A CN110365679B (en) | 2019-07-15 | 2019-07-15 | Context-aware cloud data privacy protection method based on crowdsourcing evaluation |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110365679A CN110365679A (en) | 2019-10-22 |
CN110365679B true CN110365679B (en) | 2021-10-19 |
Family
ID=68219536
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910637836.5A Active CN110365679B (en) | 2019-07-15 | 2019-07-15 | Context-aware cloud data privacy protection method based on crowdsourcing evaluation |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110365679B (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114443184A (en) * | 2020-10-30 | 2022-05-06 | 中国电信股份有限公司 | Intelligent terminal privacy protection method and device |
CN113239369A (en) * | 2021-04-25 | 2021-08-10 | 南方电网科学研究院有限责任公司 | Method, device, equipment and medium for auditing sensitivity of ciphertext data |
CN114937490A (en) * | 2022-06-02 | 2022-08-23 | 上海人工智能创新中心 | Computer system and evaluation method for providing medical privacy protection evaluation table |
CN115766841B (en) * | 2022-10-28 | 2024-06-14 | 支付宝(杭州)信息技术有限公司 | Service providing method and device based on wind control engine |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102656589A (en) * | 2009-12-15 | 2012-09-05 | 微软公司 | Verifiable trust for data through wrapper composition |
CN106533650A (en) * | 2016-11-17 | 2017-03-22 | 浙江工商大学 | Cloud-oriented interactive privacy protection method and system |
CN106537901A (en) * | 2014-03-26 | 2017-03-22 | 马克·W·帕布利科弗 | Computerized method and system for providing customized entertainment content |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105246072B (en) * | 2015-09-01 | 2018-12-28 | 重庆邮电大学 | User location method for secret protection and system under a kind of road network environment |
US10628608B2 (en) * | 2016-06-29 | 2020-04-21 | Sap Se | Anonymization techniques to protect data |
-
2019
- 2019-07-15 CN CN201910637836.5A patent/CN110365679B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102656589A (en) * | 2009-12-15 | 2012-09-05 | 微软公司 | Verifiable trust for data through wrapper composition |
CN106537901A (en) * | 2014-03-26 | 2017-03-22 | 马克·W·帕布利科弗 | Computerized method and system for providing customized entertainment content |
CN106533650A (en) * | 2016-11-17 | 2017-03-22 | 浙江工商大学 | Cloud-oriented interactive privacy protection method and system |
Also Published As
Publication number | Publication date |
---|---|
CN110365679A (en) | 2019-10-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110365679B (en) | Context-aware cloud data privacy protection method based on crowdsourcing evaluation | |
US11934540B2 (en) | System and method for multiparty secure computing platform | |
CA3061638C (en) | Systems and methods for enforcing centralized privacy controls in de-centralized systems | |
US10043035B2 (en) | Systems and methods for enhancing data protection by anonosizing structured and unstructured data and incorporating machine learning and artificial intelligence in classical and quantum computing environments | |
US9361481B2 (en) | Systems and methods for contextualized data protection | |
US9619669B2 (en) | Systems and methods for anonosizing data | |
Friedman et al. | Privacy aspects of recommender systems | |
CA2929269C (en) | Dynamic de-identification and anonymity | |
EP3063691B1 (en) | Dynamic de-identification and anonymity | |
US20210406386A1 (en) | System and method for multiparty secure computing platform | |
CA2975441C (en) | Systems and methods for contextualized data protection | |
KR20150115772A (en) | Privacy against interference attack against mismatched prior | |
Riboni et al. | Differentially-private release of check-in data for venue recommendation | |
Pramod | Privacy-preserving techniques in recommender systems: state-of-the-art review and future research agenda | |
Kuang et al. | A privacy protection model of data publication based on game theory | |
Ali-Eldin et al. | A risk evaluation approach for authorization decisions in social pervasive applications | |
Casas et al. | Social network privacy: Issues and measurement | |
Yang | Improving privacy preserving in modern applications | |
Lang et al. | Application of Personal Information Privacy Protection Based on Machine Learning Algorithm | |
Pingo | Privacy literacy in the era of the Internet of Things and big data | |
Nelson | Differential privacy-a balancing act | |
WO2015110408A1 (en) | A method for enhancing privacy in a recommendation system | |
Leung et al. | Personalized privacy-preserving semi-centralized recommendation system in a social network | |
EP4211586A1 (en) | System and method for multiparty secure computing platform | |
Dwivedi et al. | A novel approach for constructing privacy‐aware architecture utilizing Shannon's entropy |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TA01 | Transfer of patent application right | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20210930 Address after: 3 / F, xindongyuan North building, 3501 Chengfu Road, Haidian District, Beijing 100083 Applicant after: HUARUI XINZHI TECHNOLOGY (BEIJING) Co.,Ltd. Applicant after: Huarui Xinzhi Baoding Technology Co.,Ltd. Address before: 100000 room 91818, floor 9, building 683, zone 2, No. 5, Zhongguancun South Street, Haidian District, Beijing Applicant before: HUARUI XINZHI TECHNOLOGY (BEIJING) Co.,Ltd. |