CN114297714A - Method for data privacy protection and safe search in cloud environment - Google Patents
Method for data privacy protection and safe search in cloud environment Download PDFInfo
- Publication number
- CN114297714A CN114297714A CN202111654194.3A CN202111654194A CN114297714A CN 114297714 A CN114297714 A CN 114297714A CN 202111654194 A CN202111654194 A CN 202111654194A CN 114297714 A CN114297714 A CN 114297714A
- Authority
- CN
- China
- Prior art keywords
- data
- search
- cloud
- user
- privacy
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 31
- 238000005070 sampling Methods 0.000 claims description 24
- 241000405147 Hermes Species 0.000 claims description 19
- 238000005516 engineering process Methods 0.000 claims description 11
- 230000004927 fusion Effects 0.000 claims description 10
- 238000012423 maintenance Methods 0.000 claims description 10
- 238000011156 evaluation Methods 0.000 claims description 8
- 230000001133 acceleration Effects 0.000 claims description 6
- 238000012545 processing Methods 0.000 claims description 5
- 238000013475 authorization Methods 0.000 claims description 3
- 238000004364 calculation method Methods 0.000 claims description 3
- 230000007246 mechanism Effects 0.000 claims description 3
- 230000004044 response Effects 0.000 claims description 3
- 238000011161 development Methods 0.000 description 4
- 238000007726 management method Methods 0.000 description 4
- 238000003860 storage Methods 0.000 description 3
- 230000010354 integration Effects 0.000 description 2
- 238000005259 measurement Methods 0.000 description 2
- 238000005065 mining Methods 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 238000011160 research Methods 0.000 description 2
- 230000009471 action Effects 0.000 description 1
- 230000004075 alteration Effects 0.000 description 1
- 238000012098 association analyses Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 239000012141 concentrate Substances 0.000 description 1
- 238000010219 correlation analysis Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000000586 desensitisation Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000003203 everyday effect Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 238000012946 outsourcing Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Images
Landscapes
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Storage Device Security (AREA)
Abstract
The invention relates to the technical field of data security, in particular to a method for protecting and searching data privacy in a cloud environment.
Description
Technical Field
The invention relates to the technical field of data security, in particular to a method for protecting data privacy and safely searching in a cloud environment.
Background
With the fusion development of the latest technologies such as cloud computing, the internet of things and the mobile internet, the data volume generated by various industries is increased explosively, the latest report published by the research institution Gartner shows that the volume of the global network equipment in 2016 is increased by 64 hundred million, the volume is increased by 30% in 2015, 550 million new equipment is accessed to the network in 2016 every day on average, and the volume of the network equipment is expected to be increased to 208 hundred million in 2020. The ubiquitous network scale has exploded while also producing a huge amount of multimodal data, and market research organization IDC projected [3], the global amount of data will remain at 50% annual growth rate in the next decade, and projected that this number will reach 40ZB in 2020. In China, with the steady implementation of an 'internet +' action plan, emerging technologies such as the internet of things and the mobile internet are combined with various industries, so that a huge market of big data content consultation services is greatly prized, and big data enters a new stage of leap-type development. Moore's law shows that the improvement of the computing speed of classic computer hardware is close to the physical upper limit, and small and medium-sized enterprises or organizations rely on self-operated servers to complete tasks such as data storage, multi-source fusion and shared computing. First, storage, maintenance, and management of mass data are often very complex and expensive, and may even exceed the load of their existing equipment when involving multi-source data fusion; secondly, because the big data has multiple sources and high dimensionality, potential business knowledge and privacy information can be mined out when the big data is analyzed, and all parties participating in data integration are also the concerns of business and the responsible persons for privacy protection, so that data integration, storage and management are handed over to any business participant and difficult to be questioned, and a manager seeking a proper business unrelated party as data outsourcing service is of great importance to the development of the big data industry. With the development of cloud computing, as a novel data bearing platform, the cloud computing organically integrates data related to each platform and each industry in a network by using a computing resource sharing mode distributed according to needs and the payment characteristic of 'pay-as-you-go', so that the real-meaning big data 'knowledge' mining is realized. Cloud computing has become a dominant tool for solving the problem of big data, and is focused on the essence that the storage and management of data is handled by Cloud Service Providers (CSPs), and the data owner only needs to concentrate on the mining insight of business knowledge. However, as for the twofold nature of swords, in the process of migrating data to a cloud platform, a data owner still has security concerns about data on a package, a data package service (DaaS) mode based on the cloud platform causes classification of data ownership and management rights, and data is stored on which servers is transparent to the data owner, which determines the necessity of data privacy protection in a cloud environment. The recent data leakage incident [136] occurring in commercial macros such as Google, Kiddicare, etc. has exacerbated the concern of DaaS models. In addition, facing mass generated data, strong data association analysis, and a brand-new data publishing architecture, the privacy protection technology also faces the following challenges:
firstly, the characteristics of diversified data sources, fragmented information, individualized and differentiated privacy requirements result in the risk of privacy disclosure when multi-party data are fused. On one hand, privacy protection strategies and granularity adopted by data owners for the data are different, when the data are fused, the phenomena of over-protection, under-protection and the like of the data can be caused by the partial order relation between the strategies and the correlation between data attributes, and how to detect and resolve conflicts among privacy operations of all parties becomes a practical problem in maximizing the usability of the fused data while balancing the privacy protection requirements of all parties; on the other hand, in the process of data fusion, each party also prevents other participants from acquiring private information of the other party, so that designing a multi-party data security fusion strategy cannot be avoided.
Secondly, due to the characteristics of multi-source, high-dimensional, batch addition and the like of the large data, the traditional privacy protection method for single data source release at one time is insufficient, and the problem of non-explicit privacy information leakage caused by data depth correlation analysis cannot be effectively solved. For example, in order to prevent the disclosure of the privacy of the user, before data fusion and release, each data source platform needs to perform desensitization processing (such as perturbation, noise addition, generalization, and the like) on the data set of each platform, but the local privacy protection on each source data cannot avoid the risk of the disclosure of the global data privacy after fusion, which is also an essential problem facing the privacy protection of large data release.
Thirdly, from the multidimensional requirements of the data owner and the user on the large data view, on one hand, the data owner needs the large data to customize the result view of 'thousands of people and thousands of faces' according to the role and authority of the user due to privacy concerns, and on the other hand, the data user expects more to obtain the rapid search experience meeting the precision requirement than waiting for an accurate solution silently. From the search mode, the traditional search engine technology is a scanning type search based on the existence of keywords, and the mode cannot meet the requirement of quick and high-precision search proposed by users when the users face large data with 4V characteristics. From a measurement evaluation system, most of the existing measurement indexes only aim at single-dimension evaluation, and the application requirements of big data on multi-dimensional attributes such as search timeliness, precision, privacy and the like are difficult to meet. These problems have led researchers to explore new fast and accurate data search and privacy protection technologies corresponding thereto.
Therefore, it is necessary to solve the security problem and the data search problem of cloud data.
Disclosure of Invention
The invention provides a method for protecting data privacy and safely searching in a cloud environment aiming at the problems in the prior art.
In order to solve the technical problems, the invention adopts the following technical scheme:
the invention provides a method for protecting data privacy and safely searching in a cloud environment, which comprises the following steps:
performing multiple rounds of thinning anonymization algorithm on original data after anonymization processing of each cloud tenant to obtain a data set, and uploading the data set to a cloud end through multiple rounds of collaborative thinning of the data set by the cloud tenant with the attribute of maximum information acquisition gain under the condition of meeting data anonymity, wherein the cloud tenant gives a final controller of the data set to a cloud service provider;
the cloud service provider encrypts the received data, sends the encrypted data to the public cloud end, stores the received data according to the number and the size of the data blocks and authorizes the inquiry authority to the private user;
step three, the private user puts forward a data search requirement and submits the data search requirement to a search engine Hermes, the search engine Hermes judges whether a search request put forward by the user exceeds the search precision upper limit of the authorized query authority of the user, if so, the search engine Hermes refuses to accept the search request put forward by the user, and if not, the search request put forward by the user is accepted;
step four, generating a search task J after receiving the request, inquiring corresponding data according to the search task J by the public cloud, and sending the matched encrypted file to an authorized user;
and step five, the search engine Hermes receives the matched encrypted file and returns the encrypted file to the authorized user, and the authorized user decrypts the encrypted file at the terminal of the authorized user.
Preferably, in the first step, the multi-round refinement anonymization algorithm includes that each cloud tenant with data fusion calculates information entropy of each attribute according to local data owned by the cloud tenant and publishes a maximum entropy value for comparison, each party selects the attribute with the maximum global entropy value in the current round, the owner of the attribute performs refinement division on the attribute based on the data division result in the previous round, if the division result does not violate data anonymity constraint, the division result is published, otherwise, the next round is directly performed until no attribute can contribute to data refinement division on the premise of meeting anonymity constraint.
Preferably, in the step one, the reputation grade set by the cloud tenant on the cloud service provider hides the association relation between the data for the cloud service provider with the semi-trusted reputation grade, and ensures the value range balanced distribution of the attributes in a grouping and balancing manner, so as to prevent the cloud service provider from revealing the data privacy of the cloud tenant; and (4) providing a classification index tree data structure for the cloud service provider with the completely untrusted reputation level, and verifying the correctness and integrity of data returned by the cloud service provider.
Preferably, in the second step, when the authorization query right is performed on the private user, different grades can be classified according to the role of the private user, the data access granularity and the payment capability, and a high-grade authorized user can access more data information, whereas a low-grade authorized user can access limited data information.
Preferably, the public cloud queries corresponding data according to the search task J and performs data query according to a white lift method, wherein the white lift method comprises the following steps: step A, setting a user search request under a Hadoop architecture as a triple Q (Op, D, rho), wherein Op represents search operation of a user on a target data set D, and rho is a search precision lower limit value set by the user;
b, extracting an initial sample S from the data set D, and then performing m times of repeated sampling { S1., Sm } by taking S as a domain of discourse;
step C, performing approximate calculation on m results { Op (S1) }, Op (Sm) } generated by implementing operation Op (D) in the step B to obtain a relative error value of the variation coefficient;
and step four, evaluating according to the relative error of the variation coefficient in the step C to obtain a search result meeting the approximate precision of the user.
Preferably, when an attacker directly accesses the public cloud, fuzzy query logic is adopted, and the search domain space and the semantic space of the keywords are expanded through the search index based on granularity, so that the attacker cannot accurately deduce the file content.
Preferably, the search engine Hermes comprises a search evaluation module, an approximate search module and a search maintenance module.
Preferably, the search evaluation module is responsible for bridging the user and the data platform, waiting for the search request of the user and analyzing the required resources; intermittently collecting state information of a data platform to finally form a feasible search plan, wherein the approximate search module comprises a sampling layer, an acceleration layer and an operation layer, the operation layer consists of a plurality of basic operation components, and for a given operation Op, if an unbiased estimation that corresponding statistics formed based on a specific data sampling algorithm are Op exists, the Op can be brought into the operation layer in the form of the components; the acceleration layer provides a quick response mechanism, and records related information of historical search by constructing a search record TLB table so as to accelerate the received isomorphic search; the sampling layer provides various sampling technologies, the various sampling technologies comprise Bernoulli sampling, a bootstrap method and a cutting method, the search maintenance module introduces an increment sampling strategy, for isomorphic search with variable precision, time overhead is greatly reduced by effectively multiplexing historical results, and for the characteristic of incremental release of large data, the search maintenance module starts from the granularity of privacy protection and the stability of the historical results and provides the applicability of the historical results relative to isomorphic search of new version data.
The invention has the beneficial effects that:
the invention provides a method for protecting data privacy and safely searching in a cloud environment, which comprises the following steps: performing multiple rounds of thinning anonymization algorithm on original data after anonymization processing of each cloud tenant to obtain a data set, and uploading the data set to a cloud end through multiple rounds of collaborative thinning of the data set by the cloud tenant with the attribute of maximum information acquisition gain under the condition of meeting data anonymity, wherein the cloud tenant gives a final controller of the data set to a cloud service provider; the cloud service provider encrypts the received data, sends the encrypted data to the public cloud end, stores the received data according to the number and the size of the data blocks and authorizes the inquiry authority to the private user; step three, the private user puts forward a data search requirement and submits the data search requirement to a search engine Hermes, the search engine Hermes judges whether a search request put forward by the user exceeds the search precision upper limit of the authorized query authority of the user, if so, the search engine Hermes refuses to accept the search request put forward by the user, and if not, the search request put forward by the user is accepted; step four, generating a search task J after receiving the request, inquiring corresponding data according to the search task J by the public cloud, and sending the matched encrypted file to an authorized user; and step five, the search engine Hermes receives the matched encrypted file and returns the encrypted file to the authorized user, and the authorized user decrypts the encrypted file at the terminal of the authorized user.
Drawings
FIG. 1 is a block diagram of the framework of the present invention.
Detailed Description
In order to facilitate understanding of those skilled in the art, the present invention will be further described with reference to the following examples and drawings, which are not intended to limit the present invention. The present invention is described in detail below with reference to the attached drawings.
As shown in fig. 1, the method for protecting data privacy and safely searching in a cloud environment provided by the present invention includes the following steps: performing multiple rounds of thinning anonymization algorithm on original data after anonymization processing of each cloud tenant to obtain a data set, and uploading the data set to a cloud end through multiple rounds of collaborative thinning of the data set by the cloud tenant with the attribute of maximum information acquisition gain under the condition of meeting data anonymity, wherein the cloud tenant gives a final controller of the data set to a cloud service provider; the cloud service provider encrypts the received data, sends the encrypted data to the public cloud end, stores the received data according to the number and the size of the data blocks and authorizes the inquiry authority to the private user; step three, the private user puts forward a data search requirement and submits the data search requirement to a search engine Hermes, the search engine Hermes judges whether a search request put forward by the user exceeds the search precision upper limit of the authorized query authority of the user, if so, the search engine Hermes refuses to accept the search request put forward by the user, and if not, the search request put forward by the user is accepted; step four, generating a search task J after receiving the request, inquiring corresponding data according to the search task J by the public cloud, and sending the matched encrypted file to an authorized user; and step five, the search engine Hermes receives the matched encrypted file and returns the encrypted file to the authorized user, and the authorized user decrypts the encrypted file at the terminal of the authorized user.
In this embodiment, in the first step, the multi-round refinement anonymization algorithm includes that each cloud tenant with data fusion calculates information entropy of each attribute with respect to local data owned by the cloud tenant and publishes a maximum entropy value for comparison, each party selects an attribute with a maximum global entropy value in the current round, an owner of the attribute performs refinement division on the attribute based on a data division result in the previous round, if the division result does not violate anonymous data constraint, the division result is published, otherwise, the next round is directly performed, until no attribute can contribute to data refinement division on the premise that anonymous constraint is satisfied.
In the embodiment, step one, the reputation grade set by the cloud tenant on the cloud service provider hides the association relation between the data for the cloud service provider with the semi-credible reputation grade, and ensures the value range balanced distribution of the attributes in a grouping and balancing manner, so as to prevent the cloud service provider from revealing the data privacy of the cloud tenant; and (4) providing a classification index tree data structure for the cloud service provider with the completely untrusted reputation level, and verifying the correctness and integrity of data returned by the cloud service provider.
In this embodiment, in the second step, when the authorization query right is performed on the private user, different levels of division may be performed according to the role of the private user, the data access granularity, and the payment capability, and the high-level authorized user may access more data information, whereas the low-level authorized user may access limited data information.
In this embodiment, the public cloud queries corresponding data according to the search task J and performs data query according to a white lift method, where the white lift method includes the following steps: step A, setting a user search request under a Hadoop architecture as a triple Q (Op, D, rho), wherein Op represents search operation of a user on a target data set D, and rho is a search precision lower limit value set by the user; b, extracting an initial sample S from the data set D, and then performing m times of repeated sampling { S1., Sm } by taking S as a domain of discourse; step C, performing approximate calculation on m results { Op (S1) }, Op (Sm) } generated by implementing operation Op (D) in the step B to obtain a relative error value of the variation coefficient; and step four, evaluating according to the relative error of the variation coefficient in the step C to obtain a search result meeting the approximate precision of the user.
In this embodiment, when an attacker directly accesses the public cloud, the search domain space and the semantic space of the keywords are expanded by using the search index based on the granularity by using the fuzzy query logic, so that the attacker cannot accurately infer the file content.
In this embodiment, the search engine Hermes includes a search evaluation module, an approximate search module, and a search maintenance module.
In this embodiment, the search evaluation module is responsible for bridging the user and the data platform, waiting for the search request of the user and analyzing the resources required by the user; intermittently collecting state information of a data platform to finally form a feasible search plan, wherein the approximate search module comprises a sampling layer, an acceleration layer and an operation layer, the operation layer consists of a plurality of basic operation components, and for a given operation Op, if an unbiased estimation that corresponding statistics formed based on a specific data sampling algorithm are Op exists, the Op can be brought into the operation layer in the form of the components; the acceleration layer provides a quick response mechanism, and records related information of historical search by constructing a search record TLB table so as to accelerate the received isomorphic search; the sampling layer provides various sampling technologies, the various sampling technologies comprise Bernoulli sampling, a bootstrap method and a cutting method, the search maintenance module introduces an increment sampling strategy, for isomorphic search with variable precision, time overhead is greatly reduced by effectively multiplexing historical results, and for the characteristic of incremental release of large data, the search maintenance module starts from the granularity of privacy protection and the stability of the historical results and provides the applicability of the historical results relative to isomorphic search of new version data.
Although the present invention has been described with reference to the above preferred embodiments, it should be understood that various changes, substitutions and alterations can be made herein without departing from the spirit and scope of the invention as defined by the appended claims.
Claims (8)
1. A method for data privacy protection and safe search in a cloud environment is characterized by comprising the following steps:
performing multiple rounds of thinning anonymization algorithm on original data after anonymization processing of each cloud tenant to obtain a data set, and uploading the data set to a cloud end through multiple rounds of collaborative thinning of the data set by the cloud tenant with the attribute of maximum information acquisition gain under the condition of meeting data anonymity, wherein the cloud tenant gives a final controller of the data set to a cloud service provider;
the cloud service provider encrypts the received data, sends the encrypted data to the public cloud end, stores the received data according to the number and the size of the data blocks and authorizes the inquiry authority to the private user;
step three, the private user puts forward a data search requirement and submits the data search requirement to a search engine Hermes, the search engine Hermes judges whether a search request put forward by the user exceeds the search precision upper limit of the authorized query authority of the user, if so, the search engine Hermes refuses to accept the search request put forward by the user, and if not, the search request put forward by the user is accepted;
step four, generating a search task J after receiving the request, inquiring corresponding data according to the search task J by the public cloud, and sending the matched encrypted file to an authorized user;
and step five, the search engine Hermes receives the matched encrypted file and returns the encrypted file to the authorized user, and the authorized user decrypts the encrypted file at the terminal of the authorized user.
2. The method for protecting data privacy and safely searching in the cloud environment according to claim 1, wherein: in the first step, the multi-round refinement anonymization algorithm comprises the steps that each cloud tenant with data fusion calculates the information entropy of each attribute according to local data owned by the cloud tenant and publishes the maximum entropy value for comparison, each party selects the attribute with the maximum global entropy value in the current round, the owner of the attribute performs refinement division on the attribute based on the data division result in the previous round, if the division result does not violate the anonymity constraint of the data, the division result is published, otherwise, the next round is directly performed until no attribute performance contributes to the refinement division of the data on the premise of meeting the anonymity constraint.
3. The method for protecting data privacy and safely searching in the cloud environment according to claim 1, wherein: step one, a cloud tenant sets a credit level for a cloud service provider, and for the cloud service provider with a semi-trusted credit level, the incidence relation between data is hidden, and through a grouping equalization mode, the value range balanced distribution of attributes is ensured, and the cloud service provider is prevented from revealing the data privacy of the cloud tenant; and (4) providing a classification index tree data structure for the cloud service provider with the completely untrusted reputation level, and verifying the correctness and integrity of data returned by the cloud service provider.
4. The method for protecting data privacy and safely searching in the cloud environment according to claim 1, wherein: in the second step, when the authorization inquiry authority is carried out on the private user, different grades can be divided according to the role of the private user, the data access granularity and the payment capacity of the private user, the high-grade authorized user can access more data information, and otherwise, the low-grade authorized user can access limited data information.
5. The method for protecting data privacy and safely searching in the cloud environment according to claim 1, wherein: the public cloud end queries corresponding data according to the search task J and performs data query according to a white lift method, wherein the white lift method comprises the following steps: step A, setting a user search request under a Hadoop architecture as a triple Q (Op, D, rho), wherein Op represents search operation of a user on a target data set D, and rho is a search precision lower limit value set by the user; b, extracting an initial sample S from the data set D, and then performing m times of repeated sampling { S1., Sm } by taking S as a domain of discourse;
step C, performing approximate calculation on m results { Op (S1) }, Op (Sm) } generated by implementing operation Op (D) in the step B to obtain a relative error value of the variation coefficient; and step four, evaluating according to the relative error of the variation coefficient in the step C to obtain a search result meeting the approximate precision of the user.
6. The method for protecting data privacy and safely searching in the cloud environment according to claim 1, wherein: when an attacker directly accesses the public cloud, fuzzy query logic is adopted, and a search domain space and a semantic space of keywords are expanded through a search index based on granularity, so that the attacker cannot accurately deduce the file content.
7. The method for protecting data privacy and safely searching in the cloud environment according to claim 1, wherein: the search engine Hermes comprises a search evaluation module, an approximate search module and a search maintenance module.
8. The method for data privacy protection and secure search in the cloud environment according to claim 7, wherein: the search evaluation module is responsible for bridging the user and the data platform, waiting for the search request of the user and analyzing the required resources; intermittently collecting state information of a data platform to finally form a feasible search plan, wherein the approximate search module comprises a sampling layer, an acceleration layer and an operation layer, the operation layer consists of a plurality of basic operation components, and for a given operation Op, if an unbiased estimation that corresponding statistics formed based on a specific data sampling algorithm are Op exists, the Op can be brought into the operation layer in the form of the components; the acceleration layer provides a quick response mechanism, and records related information of historical search by constructing a search record TLB table so as to accelerate the received isomorphic search; the sampling layer provides various sampling technologies, the various sampling technologies comprise Bernoulli sampling, a bootstrap method and a cutting method, the search maintenance module introduces an increment sampling strategy, for isomorphic search with variable precision, time overhead is greatly reduced by effectively multiplexing historical results, and for the characteristic of incremental release of large data, the search maintenance module starts from the granularity of privacy protection and the stability of the historical results and provides the applicability of the historical results relative to isomorphic search of new version data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111654194.3A CN114297714A (en) | 2021-12-30 | 2021-12-30 | Method for data privacy protection and safe search in cloud environment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111654194.3A CN114297714A (en) | 2021-12-30 | 2021-12-30 | Method for data privacy protection and safe search in cloud environment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN114297714A true CN114297714A (en) | 2022-04-08 |
Family
ID=80973666
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111654194.3A Pending CN114297714A (en) | 2021-12-30 | 2021-12-30 | Method for data privacy protection and safe search in cloud environment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114297714A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114996763A (en) * | 2022-07-28 | 2022-09-02 | 北京锘崴信息科技有限公司 | Private data security analysis method and device based on trusted execution environment |
CN115310122A (en) * | 2022-07-13 | 2022-11-08 | 广州大学 | Privacy parameter optimization method in multi-mode data fusion training |
CN115473630A (en) * | 2022-08-11 | 2022-12-13 | 湖北工业大学 | Internet of things privacy query method and system based on quantum computing |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2019153813A1 (en) * | 2018-02-07 | 2019-08-15 | 华南理工大学 | Full-text fuzzy retrieval method for similar chinese characters in ciphertext domain |
CN110866276A (en) * | 2019-11-13 | 2020-03-06 | 电子科技大学广东电子信息工程研究院 | Privacy protection method for data in hybrid cloud environment |
CN110866275A (en) * | 2019-11-13 | 2020-03-06 | 哈尔滨工业大学 | Approximate retrieval method of big data with privacy protection |
CN110866277A (en) * | 2019-11-13 | 2020-03-06 | 电子科技大学广东电子信息工程研究院 | Privacy protection method for data integration of DaaS application |
-
2021
- 2021-12-30 CN CN202111654194.3A patent/CN114297714A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2019153813A1 (en) * | 2018-02-07 | 2019-08-15 | 华南理工大学 | Full-text fuzzy retrieval method for similar chinese characters in ciphertext domain |
CN110866276A (en) * | 2019-11-13 | 2020-03-06 | 电子科技大学广东电子信息工程研究院 | Privacy protection method for data in hybrid cloud environment |
CN110866275A (en) * | 2019-11-13 | 2020-03-06 | 哈尔滨工业大学 | Approximate retrieval method of big data with privacy protection |
CN110866277A (en) * | 2019-11-13 | 2020-03-06 | 电子科技大学广东电子信息工程研究院 | Privacy protection method for data integration of DaaS application |
Non-Patent Citations (2)
Title |
---|
周志刚: "云环境下数据隐私保护与安全搜索技术研究", 《中国博士学位论文全文数据库信息科技辑》, no. 1, 15 January 2019 (2019-01-15), pages 2 - 5 * |
李尚;周志刚;张宏莉;余翔湛;: "大数据安全高效搜索与隐私保护机制展望", 网络与信息安全学报, no. 04, 15 April 2016 (2016-04-15) * |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115310122A (en) * | 2022-07-13 | 2022-11-08 | 广州大学 | Privacy parameter optimization method in multi-mode data fusion training |
CN114996763A (en) * | 2022-07-28 | 2022-09-02 | 北京锘崴信息科技有限公司 | Private data security analysis method and device based on trusted execution environment |
CN114996763B (en) * | 2022-07-28 | 2022-11-15 | 北京锘崴信息科技有限公司 | Private data security analysis method and device based on trusted execution environment |
CN115473630A (en) * | 2022-08-11 | 2022-12-13 | 湖北工业大学 | Internet of things privacy query method and system based on quantum computing |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN114297714A (en) | Method for data privacy protection and safe search in cloud environment | |
Fung et al. | Service-oriented architecture for high-dimensional private data mashup | |
US8909669B2 (en) | System and method for locating and retrieving private information on a network | |
CN109117669B (en) | Privacy protection method and system for MapReduce similar connection query | |
CN114611145B (en) | Data security sharing platform based on internet online document | |
US11442789B2 (en) | Method and system for secure distributed software-service | |
CN110727663A (en) | Data cleaning method, device, equipment and medium | |
US20090265314A1 (en) | Secure file searching | |
CN110727957A (en) | Differential privacy protection method and system based on sampling | |
CN110704698B (en) | Correlation and query method for unstructured massive network security data | |
CN116628360A (en) | Social network histogram issuing method and device based on differential privacy | |
CN113377876B (en) | Data database processing method, device and platform based on Domino platform | |
Tzouramanis et al. | Secure reverse k-nearest neighbours search over encrypted multi-dimensional databases | |
CN116910651A (en) | Data security treatment method and device based on hierarchical classification and readable medium | |
US20230065765A1 (en) | Dynamic identity attribution | |
CN117349875A (en) | Management method of enterprise credit information data based on authority level | |
CN115599345A (en) | Application security requirement analysis recommendation method based on knowledge graph | |
CN109299598A (en) | Data managing method and device | |
Liu | Research on Human Resource Management Information System Based on Big Data Blockchain Architecture | |
CN104063385A (en) | Intra-enterprise information searching system and method | |
Zhang et al. | How do you interact with your old friends on a new site: Understanding social ties among different social network sites | |
CN111984947A (en) | Comprehensive management method and system based on intelligent legal platform | |
Ma et al. | Preserving privacy on the searchable internet | |
Kabwe et al. | Identity attributes metric modelling based on mathematical distance metrics models | |
CN103246944A (en) | Multiple-level engine management method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |