CN110365679B - Context-aware cloud data privacy protection method based on crowdsourcing evaluation - Google Patents

Context-aware cloud data privacy protection method based on crowdsourcing evaluation Download PDF

Info

Publication number
CN110365679B
CN110365679B CN201910637836.5A CN201910637836A CN110365679B CN 110365679 B CN110365679 B CN 110365679B CN 201910637836 A CN201910637836 A CN 201910637836A CN 110365679 B CN110365679 B CN 110365679B
Authority
CN
China
Prior art keywords
data
context
evaluation
crowdsourcing
sharing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910637836.5A
Other languages
Chinese (zh)
Other versions
CN110365679A (en
Inventor
庄浩
张继勇
刘鑫
蔡恒
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huarui Xinzhi Baoding Technology Co.,Ltd.
HUARUI XINZHI TECHNOLOGY (BEIJING) Co.,Ltd.
Original Assignee
Huarui Xinzhi Baoding Technology Co ltd
Huarui Xinzhi Technology Beijing Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huarui Xinzhi Baoding Technology Co ltd, Huarui Xinzhi Technology Beijing Co ltd filed Critical Huarui Xinzhi Baoding Technology Co ltd
Priority to CN201910637836.5A priority Critical patent/CN110365679B/en
Publication of CN110365679A publication Critical patent/CN110365679A/en
Application granted granted Critical
Publication of CN110365679B publication Critical patent/CN110365679B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • H04L63/205Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Signal Processing (AREA)
  • Databases & Information Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention aims to provide a context-aware cloud data privacy protection method based on crowdsourcing evaluation, which can provide data privacy protection service for a user in a cloud data sharing context. The method can sense the situation of user data sharing, including data type, content type, data owner and the like, and provides different data sharing strategies according to different situations, thereby effectively protecting the privacy of user data; meanwhile, collective intelligence of cloud users is integrated in a crowdsourcing mode, and based on a project reaction theory, data sensitivity is comprehensively and effectively evaluated in an objective evaluation and interactive crowdsourcing mode from the perspective of a system, accuracy of data privacy safety risk evaluation is further improved, and data privacy protection service under a cloud data sharing situation is provided for users.

Description

Context-aware cloud data privacy protection method based on crowdsourcing evaluation
Technical Field
The invention belongs to the field of data privacy security, and particularly relates to a context-aware cloud data privacy protection method based on crowdsourcing evaluation.
Background
Under the era of mobile internet and cloud computing, users can enjoy various cloud application services including taxi taking, takeaway, mobile payment and the like by providing identity information for registration. However, users are exposed to the risk of private data leakage while enjoying various convenient application services. For example, the insecurity of netizens is increased in cases of secret divulgence such as data theft of 32 universal users in china 32 of the times of the cable television company of the united states, password leakage of a Tumblr account number of 6500 universal mailbox of a light blog website, public sale of 1.67 million accounts in black city of LinkedIn and the like. Ordinary users cannot protect the data security of themselves, and even do not realize the identity data of the users and the behavior data of service enjoying, the privacy information of travel laws, eating habits, consumption habits, interests and the like of the users is disclosed.
For the problem of privacy disclosure, the existing encryption-based method is difficult to be applied to a cloud scene, for example, if user data is encrypted ciphertext in the cloud, the file cannot be shared with other users. Other privacy preserving methods focus on privacy preserving signatures in the digital signature process. The method focuses on privacy protection of the consumers in different consumption scenes, and is not considered in different cloud data sharing scenes.
Disclosure of Invention
The invention provides a context-aware cloud data privacy protection method based on crowdsourcing evaluation, which solves the problem that an ordinary user cannot judge privacy disclosure risks independently, and particularly cannot estimate the disclosure risks after data is shared when the data is shared; according to the invention, the problem of data leakage is solved according to the lowest data privacy leakage storage mode in different cloud data sharing scenes.
The technical scheme adopted by the invention is as follows:
a context-aware cloud data privacy protection method based on crowd-sourcing evaluation comprises the following steps:
s1, the client generates a context dictionary according to the context information of the data file, and then the client sends the generated context dictionary to the server as a sensitivity query list;
s2, inquiring and establishing a data sensitivity value: the server inquires each situation in the situation List in the data sensitivity value database after receiving the client inquiry List, and directly returns a data sensitivity value (List) to the client if the situation is evaluated; otherwise, if the evaluation is not performed, the server side returns a List; simultaneously, designing the uploaded situation information into a crowdsourcing task, inviting the user to evaluate the sensitivity of the data together to obtain a data sensitivity value, and then storing the data sensitivity value obtained after crowdsourcing evaluation into a data sensitivity value database for the server side to inquire;
s3, evaluation of privacy risk exposure value: the server calculates objective probability value of the data privacy leakage event according to the context information received in the step S2 and the leakage probability corresponding to the same previous context information in the server; performing comprehensive evaluation according to the objective probability value and the data sensitivity value obtained by crowd sourcing evaluation in the second step to obtain a privacy risk leakage value;
s4, strategy recommendation: forming and recommending a plurality of sharing strategies with different risks according to the privacy risk leakage value evaluated in the step S3;
s5, applying a strategy: and according to the different risk sharing strategies obtained in the step S4, selecting a sharing strategy corresponding to the risk to apply to the data, and sharing the data processed by the corresponding sharing strategy to the cloud.
At present, users generally lack basic privacy protection consciousness, privacy safety of the users is often ignored, and a word bank under the privacy protection situation is created to help the users to evaluate the privacy protection consciousness degree of different users and to react to privacy protection in different aspects; based on a context thesaurus, a risk assessment algorithm is designed to determine sensitivity in a data sharing process and security policy (policies) setting of a user on privacy; the method can sense the situation of user data sharing, including data type, content type, data owner and the like, and provides different data sharing strategies according to different situations, thereby effectively protecting the privacy of user data; meanwhile, collective intelligence of cloud users is integrated in a crowdsourcing mode, and based on a project reaction theory, data sensitivity is comprehensively and effectively evaluated in an objective evaluation and interactive crowdsourcing mode from the perspective of a system, accuracy of data privacy safety risk evaluation is further improved, and data privacy protection service under a cloud data sharing situation is provided for users.
Further, in step S1, the context dictionary includes identity information of the sharee and/or a sharing policy and/or a sharing file type; the context dictionary defines the context of the shared data.
Further, before the context dictionary is sent in step S1, the information of the context dictionary is processed, and the processing mode includes processing in an anonymous form and/or an encrypted form and/or a data obfuscation form.
Further, after the data sensitivity value obtained in step S2 is returned to the client, the client caches information of the context dictionary corresponding to the data sensitivity value, and provides the client with a query; after the client generates the context dictionary, inquiring corresponding data sensitivity values for the information of the context dictionary in a cache database of the client so that the client can directly obtain the data sensitivity values; if the client side inquires the corresponding data sensitivity value, the information of the situation dictionary is not sent to the server any more; otherwise, if the client does not inquire the corresponding data sensitivity value in the cache database, the step S1 is performed.
Further, after the data is uploaded to the server according to the selected sharing policy in step S5, the uploaded data is shared.
Further, in step S3, a comprehensive evaluation is performed according to the data sensitivity value obtained in step S and the probability value of the occurrence of the data privacy leakage event, where the comprehensive evaluation employs a weighted evaluation function and/or a product evaluation function.
Further, the sharing policies of different risks in step S4 at least include two policies of completely disclosing shared data and not disclosing shared data at all; the full disclosure is to directly disclose and share data; the complete disclosure is to encrypt the data and partially hide the metadata of the data.
Further, the partial hiding of the metadata of the data includes data owner information and/or time information of last modification.
Further, after the data upload is completed each time in step S5, the context information and the corresponding sharing policy of the data upload sharing are sent to the cloud, and the evaluation history of this time is recorded for the next evaluation and crowd sourcing evaluation analysis.
The invention has the following advantages and beneficial effects:
1. the invention can provide data privacy protection service for the user in the cloud data sharing situation. At present, users generally lack basic privacy protection consciousness, privacy safety of the users is often ignored, and a word bank under the privacy protection situation is created to help the users to evaluate the privacy protection consciousness degree of different users and to react to privacy protection in different aspects; based on a context thesaurus, a risk assessment algorithm is designed to determine sensitivity in a data sharing process and security policy (policies) setting of a user on privacy; the method can sense the situation of user data sharing, including data type, content type, data owner and the like, and provides different data sharing strategies according to different situations, thereby effectively protecting the privacy of user data; meanwhile, collective intelligence of cloud users is integrated in a crowdsourcing mode, and based on a project reaction theory, data sensitivity is comprehensively and effectively evaluated in an objective evaluation and interactive crowdsourcing mode from the perspective of a system, accuracy of data privacy safety risk evaluation is further improved, and data privacy protection service under a cloud data sharing situation is provided for users.
2. The context awareness is embodied in that different contexts in the data sharing process can be accurately described by establishing a context dictionary, the data privacy leakage risk is evaluated according to the different contexts, and corresponding sharing strategies are recommended; the method has the advantages that a crowdsourcing evaluation mode is adopted, the sensitivity of the user to different data privacy is scientifically evaluated by combining a project reaction theory, the data sensitivity values of the user under different scenes are obtained by using collective wisdom and shared wisdom, and more personalized data privacy protection strategies are provided for different purposes.
Drawings
The accompanying drawings, which are included to provide a further understanding of the embodiments of the invention and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the invention and together with the description serve to explain the principles of the invention. In the drawings:
FIG. 1 is a schematic flow diagram of the process of the present invention.
FIG. 2 is a diagram of a context dictionary for data sharing according to the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is further described in detail below with reference to examples and accompanying drawings, and the exemplary embodiments and descriptions thereof are only used for explaining the present invention and are not meant to limit the present invention.
It should be understood that the terms first, second, etc. are used merely for distinguishing between descriptions and are not intended to indicate or imply relative importance. Although the terms first, second, etc. may be used herein to describe various elements, these elements should not be limited by these terms. These terms are only used to distinguish one element from another. For example, a first element could be termed a second element, and, similarly, a second element could be termed a first element, without departing from the scope of example embodiments of the present invention.
It should be understood that the term "and/or" herein is merely one type of association relationship that describes an associated object, meaning that three relationships may exist, e.g., a and/or B may mean: a exists alone, B exists alone, and A and B exist at the same time, and the term "/and" is used herein to describe another association object relationship, which means that two relationships may exist, for example, A/and B, may mean: a alone, and both a and B alone, and further, the character "/" in this document generally means that the former and latter associated objects are in an "or" relationship.
It is to be understood that in the description of the present invention, the terms "upper", "vertical", "inside", "outside", and the like, refer to an orientation or positional relationship that is conventionally used for placing the product of the present invention, or that is conventionally understood by those skilled in the art, and are used merely for convenience in describing and simplifying the description, and do not indicate or imply that the device or element referred to must have a particular orientation, be constructed in a particular orientation, and be operated, and therefore should not be considered as limiting the present invention.
It will be understood that when an element is referred to as being "connected," "connected," or "coupled" to another element, it can be directly connected or coupled to the other element or intervening elements may be present. In contrast, when an element is referred to as being "directly adjacent" or "directly coupled" to another element, there are no intervening elements present. Other words used to describe the relationship between elements should be interpreted in a similar manner (e.g., "between … …" versus "directly between … …", "adjacent" versus "directly adjacent", etc.).
In the description of the present invention, it should also be noted that, unless otherwise explicitly specified or limited, the terms "disposed," "mounted," and "connected" are to be construed broadly, e.g., as meaning fixedly connected, detachably connected, or integrally connected; can be mechanically or electrically connected; they may be connected directly or indirectly through intervening media, or they may be interconnected between two elements. The specific meanings of the above terms in the present invention can be understood in specific cases to those skilled in the art.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of example embodiments of the invention. As used herein, the singular forms "a", "an" and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms "comprises," "comprising," "includes," and/or "including," when used herein, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, numbers, steps, operations, elements, components, and/or groups thereof.
Example 1:
as shown in fig. 1 and fig. 2, the embodiment provides a context-aware cloud data privacy protection method based on crowdsourcing evaluation, which includes the following steps:
s1, the client generates a context dictionary according to the context information of the data file, and then the client sends the generated context dictionary to the server as a sensitivity query list;
s2, inquiring and establishing a data sensitivity value: after receiving the client query list, the server queries each situation in the situation list in the data sensitivity value database, and if the situation is evaluated, the server directly returns a data sensitivity value to the client; otherwise, if the situation information is not evaluated, the server end designs the uploaded situation information into a crowdsourcing task, invites the user to evaluate the sensitivity of the data together to obtain a data sensitivity value, and then stores the data sensitivity value obtained after crowdsourcing evaluation into the data sensitivity value database for the server end to inquire;
s3, evaluation of privacy risk exposure value: the server calculates objective probability value of the data privacy leakage event according to the context information received in the step S2 and the leakage probability corresponding to the same previous context information in the server; performing comprehensive evaluation according to the objective probability value and the data sensitivity value obtained by crowd sourcing evaluation in the second step to obtain a privacy risk leakage value;
s4, strategy recommendation: forming and recommending a plurality of sharing strategies with different risks according to the privacy risk leakage value evaluated in the step S3;
s5, applying a strategy: and according to the different risk sharing strategies obtained in the step S4, selecting a sharing strategy corresponding to the risk to apply to the data, and sharing the data processed by the corresponding sharing strategy to the cloud.
And judging the setting of each sharing operation, the sharing situation and the sharing strategy by adopting a crowdsourcing mode based on the crowdsourcing data sensitivity evaluation. The wisdom of many users is utilized to determine the risk of data leakage. Based on a project reaction theory, objective evaluation from the perspective of a system and an interactive crowdsourcing mode are used for comprehensively and effectively evaluating data sensitivity, and the reaction of a user can be two-dimensional, such as correct or wrong, agreement or disagreement; it may also be multi-dimensional, such as strongly disagreeable, neutral, agreeable, strongly agreeable, and the like. An example of a crowdsourcing task is where Bob shares an Excel on Bob's computer with Alice about Bob's financial status, and the risk rating assessment is very high, normal, low, and very low. After evaluation by the user, we evaluate different contexts. An example of crowd-sourced assessment is that we can be based on a Rasch model, and can effectively reflect the information contribution of items with different characteristics (parameters) when evaluating different tested characteristic levels. The project response function can be defined as
Figure BDA0002130865190000071
To evaluate the probability, beta, that the nth person has a correct judgment on the item inIndicates the capabilities of the nth person, and δiThe difficulty of the simulation item i. The parameter beta can be estimated by methods such as maximum likelihood estimation and the likenAnd deltai. This requires us to collect enough user responses to different sharing scenarios. Therefore, the data sharing situation and the data sensitivity value are stored for other data sensitivity queries from the client, so that quick response is achieved, and operation is convenient.
In step S1, the context dictionary includes identity information of the sharee and/or sharing policy and/or sharing file type. The context dictionary defines the context of the data to be shared, for example, Bob shares an Excel about Bob's financial status with Alice on Bob's computer. The context that we refine then includes file type, file content type, file storage location, sharer and sharee of the file. FIG. 2 shows a segment of a context map for data. We define a context font as a set of key-value doublets, such as (data type Excel, content type finance, storage location office).
According to the method, different situations in the data sharing process can be accurately described by establishing the situation dictionary, the data privacy leakage risk is evaluated according to the different situations, and corresponding sharing strategies are recommended; the method has the advantages that a crowdsourcing evaluation mode is adopted, the sensitivity of a user to different data privacy is scientifically evaluated by combining a project reaction theory, the data sensitivity values of the user under different scenes are obtained by using collective wisdom and shared wisdom, and more personalized data privacy protection strategies are provided for different purposes; the situation of user data sharing can be sensed, wherein the situation comprises a data category, a content category, a data owner and the like, different data sharing strategies are provided according to different situations, and the privacy of user data is effectively protected; meanwhile, collective intelligence of cloud users is integrated in a crowdsourcing mode, data sensitivity is effectively evaluated based on a project reaction theory, accuracy of data privacy safety risk evaluation is further improved, and data privacy protection service under a cloud data sharing situation is provided for users;
before the context dictionary is sent in step S1, the information of the context dictionary is processed, and the processing mode includes processing in an anonymous form and/or an encrypted form and/or a data obfuscation form. In specific implementation, taking data obfuscation as an example, for instance, context1 (k1 v1, k2 w2, and k3 y3), at a client, after data obfuscation, we form a List [ { v1, v4, v6}, { w1, w2, w5}, { y2, y3, y5} ], where the obfuscation coefficient k is 3, and each context has k3 possible values; the list of possible query context dictionaries is thus a Cartesian product: q { (v1, w1, y2), (v1, w1, y3), (v1, w1, y5), (v1, w2, y2), … }, so that the client sends the query List and Q after data confusion to the server for query.
In specific implementation, after the data sensitivity value obtained in step S2 is returned to the client, the client caches information of the context dictionary corresponding to the data sensitivity value, and provides the client with the information for querying; after the client generates the context dictionary, inquiring corresponding data sensitivity values for the information of the context dictionary in a cache database of the client so that the client can directly obtain the data sensitivity values; if the client side inquires the corresponding data sensitivity value, the information of the situation dictionary is not sent to the server any more; otherwise, if the client does not inquire the corresponding data sensitivity value in the cache database, the step S1 is performed.
In specific implementation, after the data is uploaded to the server according to the selected sharing policy in step S5, the uploaded data is shared.
In specific implementation, in step S3, the data privacy risk is evaluated by using a data privacy risk evaluation function, where the evaluation function may be determined according to different scenarios, such as a weighted product, a product, and the like.
In specific implementation, the sharing policies of different risks in step S4 at least include two policies of completely disclosing shared data and not disclosing shared data; the full disclosure is to directly disclose and share data; the complete disclosure is to encrypt the data and partially hide the metadata of the data. In specific implementation, the security policy value can be between [0,1], and the system can be flexibly adjusted; 0 means completely transparent and 1 means not shared at all. For example, if the user sharing policy is 1, it indicates that the data is not shared at all, which requires encrypting the data. If part of the metadata information is hidden, including data owner information, last modification time, etc., the value may be 0.2.
In a specific implementation, the partial hiding of the metadata of the data includes data owner information and/or last modified time information.
In specific implementation, after the data uploading is completed in step S5 each time, the context information and the corresponding sharing policy of the data uploading sharing are sent to the cloud, and the evaluation history of the time is recorded for the next evaluation and crowd-sourced evaluation analysis.
The above-mentioned embodiments are intended to illustrate the objects, technical solutions and advantages of the present invention in further detail, and it should be understood that the above-mentioned embodiments are merely exemplary embodiments of the present invention, and are not intended to limit the scope of the present invention, and any modifications, equivalent substitutions, improvements and the like made within the spirit and principle of the present invention should be included in the scope of the present invention.

Claims (9)

1. A context-aware cloud data privacy protection method based on crowd-sourcing evaluation is characterized by comprising the following steps: the method comprises the following steps:
s1, the client generates a context dictionary according to the context information of the data file, and the context dictionary is used for defining the context of the shared data; then the client sends the generated context dictionary to the server as a sensitivity query list;
s2, inquiring and establishing a data sensitivity value: after receiving the client query list, the server queries each situation in the situation list in the data sensitivity value database, and if the situation is evaluated, the server directly returns a data sensitivity value to the client; otherwise, if the situation information is not evaluated, the server end designs the uploaded situation information into a crowdsourcing task, invites the user to evaluate the sensitivity of the data together to obtain a data sensitivity value, and then stores the data sensitivity value obtained after crowdsourcing evaluation into the data sensitivity value database for the server end to inquire;
s3, evaluation of privacy risk exposure value: the server calculates objective probability value of the data privacy leakage event according to the context information received in the step S2 and the leakage probability corresponding to the same previous context information in the server; performing comprehensive evaluation according to the objective probability value and the data sensitivity value obtained by crowdsourcing evaluation in the step S2 to obtain a privacy risk leakage value;
s4, strategy recommendation: forming and recommending a plurality of sharing strategies with different risks according to the privacy risk leakage value evaluated in the step S3;
s5, applying a strategy: and according to the different risk sharing strategies obtained in the step S4, selecting a sharing strategy corresponding to the risk to apply to the data, and sharing the data processed by the corresponding sharing strategy to the cloud.
2. The context-aware cloud data privacy protection method based on crowdsourcing evaluation according to claim 1, wherein: in step S1, the context dictionary includes identity information of the sharee and/or sharing policy and/or sharing file type.
3. The context-aware cloud data privacy protection method based on crowdsourcing evaluation according to claim 1, wherein: before the context dictionary is sent in step S1, the information of the context dictionary is processed, and the processing mode includes processing in an anonymous form and/or an encrypted form and/or a data obfuscation form.
4. The context-aware cloud data privacy protection method based on crowdsourcing evaluation according to claim 1, wherein: after the data sensitivity value obtained in step S2 is returned to the client, the client caches information of the context dictionary corresponding to the data sensitivity value, and provides the client with a query; after the client generates the context dictionary, inquiring corresponding data sensitivity values for the information of the context dictionary in a cache database of the client so that the client can directly obtain the data sensitivity values; if the client side inquires the corresponding data sensitivity value, the information of the situation dictionary is not sent to the server any more; otherwise, if the client does not inquire the corresponding data sensitivity value in the cache database, the step S1 is performed.
5. The context-aware cloud data privacy protection method based on crowdsourcing evaluation according to claim 1, wherein: after the data is uploaded to the server according to the selected sharing policy in step S5, the uploaded data is also shared.
6. The context-aware cloud data privacy protection method based on crowdsourcing evaluation according to claim 1, wherein: and in the step S3, performing comprehensive evaluation according to the data sensitivity value obtained in the step S2 and the probability value of the occurrence of the data privacy leakage event, wherein the comprehensive evaluation adopts a weighted evaluation function and/or a product evaluation function.
7. The context-aware cloud data privacy protection method based on crowdsourcing evaluation according to claim 1, wherein: in step S4, the sharing policies of different risks at least include two policies of completely disclosing shared data and not disclosing shared data; the full disclosure is to directly disclose and share data; the complete disclosure is to encrypt the data and partially hide the metadata of the data.
8. The context-aware cloud data privacy protection method based on crowdsourcing evaluation according to claim 7, wherein: partial hiding of metadata of data includes data owner information and/or time information of last modification.
9. The context-aware cloud data privacy protection method based on crowdsourcing evaluation according to claim 1, wherein: after the data uploading is completed in step S5 each time, the context information and the corresponding sharing policy of the data uploading sharing are sent to the cloud, and the evaluation history of this time is recorded for the next evaluation and crowd sourcing evaluation analysis.
CN201910637836.5A 2019-07-15 2019-07-15 Context-aware cloud data privacy protection method based on crowdsourcing evaluation Active CN110365679B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910637836.5A CN110365679B (en) 2019-07-15 2019-07-15 Context-aware cloud data privacy protection method based on crowdsourcing evaluation

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910637836.5A CN110365679B (en) 2019-07-15 2019-07-15 Context-aware cloud data privacy protection method based on crowdsourcing evaluation

Publications (2)

Publication Number Publication Date
CN110365679A CN110365679A (en) 2019-10-22
CN110365679B true CN110365679B (en) 2021-10-19

Family

ID=68219536

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910637836.5A Active CN110365679B (en) 2019-07-15 2019-07-15 Context-aware cloud data privacy protection method based on crowdsourcing evaluation

Country Status (1)

Country Link
CN (1) CN110365679B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114443184A (en) * 2020-10-30 2022-05-06 中国电信股份有限公司 Intelligent terminal privacy protection method and device
CN113239369A (en) * 2021-04-25 2021-08-10 南方电网科学研究院有限责任公司 Method, device, equipment and medium for auditing sensitivity of ciphertext data
CN114937490A (en) * 2022-06-02 2022-08-23 上海人工智能创新中心 Computer system and evaluation method for providing medical privacy protection evaluation table
CN115766841B (en) * 2022-10-28 2024-06-14 支付宝(杭州)信息技术有限公司 Service providing method and device based on wind control engine

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102656589A (en) * 2009-12-15 2012-09-05 微软公司 Verifiable trust for data through wrapper composition
CN106533650A (en) * 2016-11-17 2017-03-22 浙江工商大学 Cloud-oriented interactive privacy protection method and system
CN106537901A (en) * 2014-03-26 2017-03-22 马克·W·帕布利科弗 Computerized method and system for providing customized entertainment content

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105246072B (en) * 2015-09-01 2018-12-28 重庆邮电大学 User location method for secret protection and system under a kind of road network environment
US10628608B2 (en) * 2016-06-29 2020-04-21 Sap Se Anonymization techniques to protect data

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102656589A (en) * 2009-12-15 2012-09-05 微软公司 Verifiable trust for data through wrapper composition
CN106537901A (en) * 2014-03-26 2017-03-22 马克·W·帕布利科弗 Computerized method and system for providing customized entertainment content
CN106533650A (en) * 2016-11-17 2017-03-22 浙江工商大学 Cloud-oriented interactive privacy protection method and system

Also Published As

Publication number Publication date
CN110365679A (en) 2019-10-22

Similar Documents

Publication Publication Date Title
CN110365679B (en) Context-aware cloud data privacy protection method based on crowdsourcing evaluation
US11934540B2 (en) System and method for multiparty secure computing platform
CA3061638C (en) Systems and methods for enforcing centralized privacy controls in de-centralized systems
US10043035B2 (en) Systems and methods for enhancing data protection by anonosizing structured and unstructured data and incorporating machine learning and artificial intelligence in classical and quantum computing environments
US9361481B2 (en) Systems and methods for contextualized data protection
US9619669B2 (en) Systems and methods for anonosizing data
Friedman et al. Privacy aspects of recommender systems
CA2929269C (en) Dynamic de-identification and anonymity
EP3063691B1 (en) Dynamic de-identification and anonymity
US20210406386A1 (en) System and method for multiparty secure computing platform
CA2975441C (en) Systems and methods for contextualized data protection
KR20150115772A (en) Privacy against interference attack against mismatched prior
Riboni et al. Differentially-private release of check-in data for venue recommendation
Pramod Privacy-preserving techniques in recommender systems: state-of-the-art review and future research agenda
Kuang et al. A privacy protection model of data publication based on game theory
Ali-Eldin et al. A risk evaluation approach for authorization decisions in social pervasive applications
Casas et al. Social network privacy: Issues and measurement
Yang Improving privacy preserving in modern applications
Lang et al. Application of Personal Information Privacy Protection Based on Machine Learning Algorithm
Pingo Privacy literacy in the era of the Internet of Things and big data
Nelson Differential privacy-a balancing act
WO2015110408A1 (en) A method for enhancing privacy in a recommendation system
Leung et al. Personalized privacy-preserving semi-centralized recommendation system in a social network
EP4211586A1 (en) System and method for multiparty secure computing platform
Dwivedi et al. A novel approach for constructing privacy‐aware architecture utilizing Shannon's entropy

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20210930

Address after: 3 / F, xindongyuan North building, 3501 Chengfu Road, Haidian District, Beijing 100083

Applicant after: HUARUI XINZHI TECHNOLOGY (BEIJING) Co.,Ltd.

Applicant after: Huarui Xinzhi Baoding Technology Co.,Ltd.

Address before: 100000 room 91818, floor 9, building 683, zone 2, No. 5, Zhongguancun South Street, Haidian District, Beijing

Applicant before: HUARUI XINZHI TECHNOLOGY (BEIJING) Co.,Ltd.