CN114491650B - Method and system for desensitizing encryption of geographic spatial information - Google Patents
Method and system for desensitizing encryption of geographic spatial information Download PDFInfo
- Publication number
- CN114491650B CN114491650B CN202210385958.1A CN202210385958A CN114491650B CN 114491650 B CN114491650 B CN 114491650B CN 202210385958 A CN202210385958 A CN 202210385958A CN 114491650 B CN114491650 B CN 114491650B
- Authority
- CN
- China
- Prior art keywords
- data
- attribute
- space
- land
- encryption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/29—Geographical information databases
Abstract
The invention provides a method and a system for desensitizing encryption of geospatial information, wherein the method comprises the following steps: carrying out statistical classification on the geographic space information data according to the time-space attribute, the ownership attribute and the land class attribute; respectively carrying out desensitization encryption on the time-space attribute data based on a time-space coordinate conversion method, the weight attribute data based on a longitudinal weight attribute feature exchange recombination method and the ground attribute data based on a ground feature normalization processing method; carrying out data recombination on the desensitized encrypted geospatial data to form geostatistical data; and carrying out data verification on the geographic statistical data and the geospatial information data. The invention carries out desensitization encryption on the space-time attribute data, the weight attribute data and the ground class attribute data by a space-time coordinate conversion method, a longitudinal weight attribute feature exchange recombination method and a ground class feature normalization processing method respectively, thereby improving the speed of data desensitization encryption and meeting the reliability of data encryption.
Description
Technical Field
The invention relates to the field of data security, in particular to a method and a system for desensitizing encryption of geospatial information.
Background
With the rapid development of the upstream and downstream industry chains of the geographic information industry, data governance technologies have been derived from the traditional big data industries of finance, medical treatment, party administration, education and the like to the geographic information industry. Meanwhile, impact is brought to the safety problem of geographic information big data privacy, and effective desensitization encryption of geographic space information data plays a vital role in development of the geographic information industry. Most of the traditional industry data types are text data, image data and voice data, the data characteristic information is single, the data structure is regular, and the data encryption is mainly carried out in a hardware isolation mode at present, but the data circulation is also blocked; the software layer mainly adopts the technologies of distributed learning, federal learning, dynamic database updating and the like to carry out privacy desensitization encryption. The geospatial information data mainly comprises sensitive information such as spatio-temporal position information, ownership information, land feature information and the like, the data space hierarchy is more complex, and the traditional data management means obviously cannot meet the requirements.
The homeland space information data contains a large amount of personal privacy information and national strategic deployment information, the sensitive attribute of the data can be kept by the traditional data cleaning, counting and analyzing means, the public circulation of the data cannot be realized, and the requirement on cross cooperation management of multiple departments is difficult to meet. The geographic spatial information desensitization encryption method based on multi-element separation sequentially performs interpretation, layered encryption, cleaning, statistics and verification on data, ensures effectiveness and mobility of the encrypted data, promotes development of a data industrial chain in the geographic information industry, and creates a chance for combining a remote sensing mapping technology and geographic information privacy security calculation.
Disclosure of Invention
Aiming at the technical problems in the prior art, the invention provides a method and a system for desensitizing encryption of geospatial information, which can improve the speed of desensitizing encryption of data and ensure the reliability of data encryption.
According to a first aspect of the present invention, there is provided a geospatial information desensitization encryption method, comprising:
step 3, performing data recombination on the desensitized encrypted geospatial data to form geographic statistical data;
and 4, performing data verification on the geographic statistical data and the geospatial information data.
On the basis of the technical scheme, the invention can be improved as follows.
Optionally, the desensitizing encryption of the spatio-temporal attribute data based on a spatio-temporal coordinate transformation method in step 2 includes:
slicing the spatio-temporal attribute data twice;
calculating the rotation angle and the size after coordinate conversion of each piece of slice data based on the size and the coordinate of each piece of slice data after twice slicing;
and performing desensitization encryption processing on each piece of slice data after twice slicing based on the rotation angle and the size of the coordinate converted data.
Optionally, the slicing the spatiotemporal attribute data twice includes:
performing first slicing on the spatio-temporal attribute data according to the size of M x N;
performing second slicing on each slice data after the first slicing according to the X-Y size;
correspondingly, the calculating the rotation angle and the projection coordinate converted size of each slice data based on the size and the coordinate of each slice data after twice slicing includes:
assuming that the coordinates of the slice data after the two slices are (x, y), the rotation angle θ of the slice data is:
the size of the slice data after projection coordinate conversion is as follows:
wherein, Xt、YtRepresenting the size of the slice data after the projection coordinate conversion;
and performing projection coordinate conversion on each piece of slice data subjected to secondary slicing based on the rotation angle of each piece of slice data and the size of the projection coordinate converted to obtain desensitized and encrypted space-time attribute data.
Optionally, the desensitizing encryption of the ownership attribute data based on the longitudinal ownership feature exchange and recombination method includes:
the data A comprises data characteristics P, the data B comprises data characteristics Q and label characteristics M, and when the data A and the data B are used as sample data and the label M are used together to construct an algorithm model, the characteristics P and partial characteristics in the characteristics Q are exchanged to form new attribute characteristics PtAnd Qt。
Optionally, the new attribute feature P is formed by exchanging partial features in the features P and QtAnd QtThe method comprises the following steps:
let initial feature atlas of data AInitial feature atlas of data BI and j are characteristic numbersA subscript thereof;
for the last column of the initial feature set PUsing the last column of the initial feature set QInstead of, and adding a column to the initial feature set PObtaining a new ownership feature Pt;
Last column for initial feature set QUsing the last column of the initial feature set PInstead, a new ownership feature Q is obtainedt。
Optionally, the desensitization encryption of the geographical attribute data based on the geographical feature normalization processing method includes:
and for the land attribute data, unifying the land attributes based on five land types of agricultural land, construction land, forest land, water area and unused land, and integrating the land attribute data into five land attribute data.
According to a second aspect of the present invention, there is provided a geospatial information desensitization encryption system comprising:
the statistical classification module is used for carrying out spatial constraint mask processing on the geographic spatial information data and carrying out statistical classification on the geographic spatial information data according to the time-space attribute, the ownership attribute and the land attribute to obtain time-space attribute data, ownership attribute data and land attribute data;
the desensitization encryption module is used for desensitizing and encrypting the space-time attribute data based on a space-time coordinate transformation method, the ownership attribute data based on a longitudinal ownership feature exchange recombination method and the land-type attribute data based on a land-type feature normalization processing method;
the data recombination module is used for carrying out data recombination on the desensitized encrypted geospatial data to form geographic statistical data;
and the data verification module is used for performing data verification on the geographic statistical data and the geographic spatial information data.
According to a third aspect of the invention, there is provided an electronic device comprising a memory, a processor for implementing the steps of the geospatial information desensitization encryption method when executing a computer management class program stored in the memory.
According to a fourth aspect of the present invention, there is provided a computer readable storage medium having stored thereon a computer management class program, which when executed by a processor implements the steps of a geospatial information desensitization encryption method.
The invention provides a geographical space information desensitization encryption method and a system, which are characterized in that firstly, geographical space information data attributes are interpreted and analyzed, and the data attributes are classified and sorted according to time-space attributes, weight attributes and ground attributes to obtain a primary data source; then, respectively adopting space-time coordinate conversion, longitudinal ownership feature exchange recombination and land feature normalization to encrypt space-time attributes, ownership attributes and land attributes, and carrying out statistics and classification on desensitized encrypted data to obtain geographical statistical data; in order to ensure the consistency of the recombined geographic statistical data and the key information of the geospatial information data source, the two groups of data are compared and verified at last, so that important information is prevented from being lost in the desensitization process, the speed of desensitization and encryption of the data is increased, and the reliability of data encryption is met.
Drawings
FIG. 1 is a flow chart of a method for desensitizing encryption of geospatial information according to the present invention;
FIG. 2 is a schematic diagram of the overall processing procedure of a geospatial information desensitization encryption method;
FIG. 3 is a schematic diagram of projection coordinate transformation of spatio-temporal attribute data based on a spatio-temporal coordinate transformation method;
FIG. 4 is a schematic representation of the recombination of feature P and feature Q;
FIG. 5 is a schematic diagram of a normalization process for the terrain attribute data;
FIG. 6 is a schematic structural diagram of a geospatial information desensitization encryption system according to the present invention;
FIG. 7 is a schematic diagram of a hardware structure of a possible electronic device according to the present invention;
fig. 8 is a schematic diagram of a hardware structure of a possible computer-readable storage medium according to the present invention.
Detailed Description
The following detailed description of embodiments of the present invention is provided in connection with the accompanying drawings and examples. The following examples are intended to illustrate the invention but are not intended to limit the scope of the invention.
The invention provides a geographic space information desensitization encryption method and system based on multi-factor separation, wherein geographic space information data mainly comprise land survey data, agricultural channel right data, homeland space planning data, land utilization status data and the like, the attributes of the geographic space information data are interpreted and analyzed, and the data attributes are classified and sorted according to time-space attributes, right attributes and land attributes to obtain a primary data source. And then, respectively adopting space-time coordinate conversion, longitudinal ownership feature exchange recombination and land feature normalization to encrypt the space-time attribute, the ownership attribute and the land attribute, and carrying out statistics and classification on the desensitized and encrypted data to obtain geographic statistical data. In order to ensure the consistency of the key information of the recombined geographic statistical data and the geographic spatial information data source, the two groups of data are finally compared and verified, so that important information is prevented from being lost in the desensitization process.
Example one
A method for desensitizing encryption of geospatial information, as shown in fig. 1 and 2, the desensitizing encryption method comprising the steps of:
It can be understood that the geospatial information data mainly comprises land survey data, agricultural and economic right data, territorial space planning data, land utilization status data and the like, and the geospatial information data is subjected to spatial constraint masking to ensure the unified registration of geographic coordinates. Then, the geospatial information data features are statistically classified according to the spatio-temporal attributes, the ownership attributes and the land attributes, and the integrity and the effectiveness of the data features after the classification statistics are checked in a sampling inspection mode.
And 2, desensitizing and encrypting the space-time attribute data based on a space-time coordinate transformation method, the ownership attribute data based on a longitudinal ownership feature exchange recombination method and the territorial attribute data based on a territorial feature normalization processing method respectively.
Specifically, as shown in fig. 3, the projection coordinate conversion is performed on the time-space attribute data, the data after the spatial constraint mask is firstly sliced according to the size of M × N, then each slice is sliced twice according to the size of X × Y and numbered, and after the two slices are performed, the time-space attribute of each slice data is subjected to the coordinate conversion. The projection coordinate conversion of the space-time attribute data is divided into a plurality of operation steps, including twice slicing and coordinate conversion operation, so that on one hand, the requirement of computer parallel computation can be met, namely, the operation steps can be simultaneously carried out, and the data encryption efficiency is improved; on the other hand, the reliability of data encryption is ensured, and the data is difficult to decrypt simply. Let the coordinate of the first slice data in the upper left corner after the secondary slicing be (1, 1), and sequentially be (2, 1. (1, 2.). that is, each slice data has one coordinate (x, y), the rotation angle θ of each slice data is calculated as follows:
wherein k is1、k2And k3Is a coordinate offset constant, k1、k2And k3Can be obtained according to the data size of the geospatial information dataAnd setting to ensure that the data volume after the projection coordinate transformation is not increased too much, wherein the value range of theta is (0, 90).
The rotation angle of the coordinate transformation of each slice data is calculated according to the coordinates of the slice data, and the rotation angle of each slice data is different, so that the safety of data desensitization encryption can be improved.
Each slice data after projection coordinate conversion is as follows in terms of size calculation:
wherein, Xt、YtThe coordinate-converted secondary slice data size is indicated, and L indicates the radius of the rotational azimuth circle. And calculating the size after coordinate transformation according to the coordinate of each piece of slice data, wherein the size after coordinate transformation corresponding to each piece of slice data is different, and the reliability of data encryption is improved.
Rotating each slice data after the secondary cutting according to the rotation angle and the size of each slice data calculated above, and changing the size to (X)t、Yt)。
As an embodiment, the desensitization encryption of the ownership attribute data based on the longitudinal ownership feature exchange reorganization method includes: the data A comprises data characteristics P, the data B comprises data characteristics Q and label characteristics M, and when the data A and the data B are used as sample data and the label M are used together to construct an algorithm model, the characteristics P and partial characteristics in the characteristics Q are exchanged to form new attribute characteristics PtAnd Qt。
Wherein, the exchange of partial characteristics in the characteristics P and Q forms new attribute characteristicsPtAnd QtThe method comprises the following steps: let initial feature atlas of data AInitial feature atlas of data BI and j are subscripts of the feature data;
for the last column of the initial feature set PUsing the last column of the initial feature set QInstead of, and adding a column to the initial feature set PObtaining a new ownership feature Pt(ii) a Last column for initial feature set QUsing the last column of the initial feature set PInstead, a new ownership feature Q is obtainedt。
Specifically, longitudinal ownership feature exchange reorganization is performed on ownership attribute data, as shown in fig. 4, it is assumed that data a includes a data feature P, data B includes a data feature Q and a label feature M, when the data a and the data B are used as sample data and the label M to construct an algorithm model together, an image is not formed by training the model under the condition that the data a and the data B partially exchange each other and the weight is shared during training, so that a feature group is formedAnd feature setExchanging to form new rights characteristics PtAnd Qt. The algorithm flow is as follows:
respectively inputting initial feature atlasAnd initial feature atlasThe feature map set P and the feature map set Q are both multidimensional matrices, as shown in fig. 4.
as an embodiment, the method for performing desensitization encryption on the land type attribute data based on the land type feature normalization processing includes: and for the land attribute data, unifying the land attributes based on five land types of agricultural land, construction land, forest land, water area and unused land, and integrating the land attribute data into five land attribute data.
Specifically, the land attribute data in the multiple geographic spatial information data is normalized, as shown in fig. 5, the current land utilization data includes wetland, cultivated land, forest land, commercial service land, industrial and mining land, residential land, water area, grassland, other land and the like, the homeland space planning data includes building planning land, agricultural planning land, mountain land, water area, forest land, lake, grassland and the like, the data is poor in data circulation due to the fact that the data belongs to sensitive information, and the land attribute naming modes of each geographic spatial data are inconsistent.
And 3, performing data recombination on the desensitized and encrypted geospatial data to form geostatistical data.
The method can be understood that the desensitized encrypted spatio-temporal attributes, the right attributes and the ground attributes are subjected to data recombination to construct geographic statistical data, so that desensitized encryption of sensitive information is ensured, and attribute retrieval and query can be supported.
And 4, performing data verification on the geographic statistical data and the geographic spatial information data.
It can be understood that the geospatial information data is desensitized and encrypted, and then is subjected to data reconstruction, so that geostatistical data is obtained. In the step 4, data verification is carried out on the geographic statistical data and the geospatial information data, firstly, statistical verification is carried out to check the integrity of characteristics, then, the reliability of data sampling is checked by utilizing field investigation, and finally, data compression and decompression, data transmission and test sharing are carried out to check the data liquidity.
In order to verify the performance of the method, the present invention selects the local land utilization status data in Jingzhou city to perform experimental verification, and the experimental parameter settings are shown in the following table 1:
TABLE 1 Experimental parameters
And respectively carrying out statistical verification on the land types in the local land utilization current data and the desensitized encrypted geographic statistical data in Jingzhou city, simultaneously testing the compression, decompression, transmission and sharing functions of the desensitized encrypted geographic statistical data, and carrying out data format size conversion after the desensitized encryption of the statistical data. The results of the experiment are shown in table 2 below:
TABLE 2 results of the experiment
Experimental results show that the total area of the ground class is not changed after the data is desensitized and encrypted, the data can be compressed, transmitted and decompressed after desensitization and encryption, and the size of the data is increased within a reliable range.
Example two
A geospatial information desensitization encryption system, see fig. 6, comprising a statistical classification module 61, a desensitization encryption module 62, a data reassembly module 63, and a data verification module 64, wherein:
and the statistical classification module 61 is used for performing spatial constraint masking processing on the geographic spatial information data, and performing statistical classification on the geographic spatial information data according to the time-space attribute, the ownership attribute and the land attribute to obtain time-space attribute data, ownership attribute data and land attribute data.
And the desensitization encryption module 62 is configured to perform desensitization encryption on the spatio-temporal attribute data based on a spatio-temporal coordinate transformation method, the ownership attribute data based on a longitudinal ownership feature exchange recombination method, and the geographical attribute data based on a geographical feature normalization processing method, respectively.
And the data recombination module 63 is used for performing data recombination on the desensitized encrypted geospatial data to form geographic statistical data.
And a data checking module 64, configured to perform data checking on the geographic statistical data and the geospatial information data.
It can be understood that the geospatial information desensitization encryption system provided by the present invention corresponds to the geospatial information desensitization encryption method provided by each of the foregoing embodiments, and the related technical features of the geospatial information desensitization encryption system may refer to the related technical features of the geospatial information desensitization encryption method, and are not described herein again.
EXAMPLE III
Referring to fig. 7, fig. 7 is a schematic view of an embodiment of an electronic device according to an embodiment of the invention. As shown in fig. 7, an embodiment of the present invention provides an electronic device 700, which includes a memory 710, a processor 720, and a computer program 711 stored in the memory 710 and executable on the processor 720, wherein the processor 720 implements the geospatial information desensitization encryption method of the first embodiment when executing the computer program 711.
Example four
Referring to fig. 8, fig. 8 is a schematic diagram of an embodiment of a computer-readable storage medium according to the present invention. As shown in fig. 8, the present embodiment provides a computer-readable storage medium 800, on which a computer program 811 is stored, and when executed by a processor, the computer program 811 implements the method for desensitizing encryption of geospatial information according to the first embodiment.
The method and the system for desensitizing encryption of geospatial information provided by the embodiment of the invention have the following advantages:
(1) the invention provides a method for converting the spatio-temporal attributes of geospatial information data, which refines the data hierarchy by projection coordinate conversion after secondary data slicing, improves the data desensitization encryption speed on one hand, meets the requirement of computer parallel computation, and provides a new idea for the treatment and cleaning of geospatial data; on the other hand, the rotation angle calculation mode provided by the method meets the reliability of data encryption, greatly reduces the data space after encryption, and ensures the timeliness of data storage and operation.
(2) The invention provides a longitudinal exchange and recombination method for right characters of geospatial information data, which performs character recombination on the geospatial data by using the idea of federal learning, ensures the secrecy of the data from the perspective of single data by recombined right characters, and does not cause loss to the reliability of a model from the perspective of an algorithm model. The longitudinal weight feature exchange enriches the feature complexity to a certain extent, and avoids poor generalization effect of the model caused by subsequent data modeling.
(3) The invention provides a method for normalizing the land attributes in various geographic spatial information data, which establishes five categories of agricultural land, building land, forest land, water area and unused land to unify the land attributes, opens up the circulation among data from the aspect of the data land attributes, and simultaneously carries out desensitization encryption on the land attributes. The ground standard is set for the subsequent privacy security calculation with the satellite remote sensing data, and a new thought of the privacy security calculation of the geospatial information data is provided.
It should be noted that, in the foregoing embodiments, the descriptions of the respective embodiments have respective emphasis, and reference may be made to relevant descriptions of other embodiments for parts that are not described in detail in a certain embodiment.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While preferred embodiments of the present invention have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all such alterations and modifications as fall within the scope of the invention.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.
Claims (7)
1. A method for desensitizing encryption of geospatial information, comprising:
step 1, carrying out space constraint mask processing on geographic space information data, and carrying out statistical classification on the geographic space information data according to a space-time attribute, an ownership attribute and a land attribute to obtain space-time attribute data, ownership attribute data and land attribute data;
step 2, desensitizing and encrypting the space-time attribute data based on a space-time coordinate transformation method, the ownership attribute data based on a longitudinal ownership feature exchange recombination method and the territorial attribute data based on a territorial feature normalization processing method;
step 3, performing data recombination on the desensitized encrypted geospatial data to form geographic statistical data;
step 4, carrying out data verification on the geographic statistical data and the geospatial information data;
in the step 2, desensitization encryption is performed on the space-time attribute data based on a space-time coordinate transformation method, and the desensitization encryption method comprises the following steps:
slicing the spatio-temporal attribute data twice;
calculating the rotation angle of each slice data and the size of the projection coordinate after conversion based on the size and the coordinate of each slice data after twice slicing;
desensitizing and encrypting each piece of sliced data for two times based on the rotation angle of each piece of sliced data and the size of the projection coordinate after conversion;
the desensitization encryption of the ownership attribute data based on the longitudinal ownership feature exchange recombination method comprises the following steps:
the data A comprises data characteristics P, the data B comprises data characteristics Q and label characteristics M, and when the data A and the data B are used as sample data and the label M are used together to construct an algorithm model, the characteristics P and partial characteristics in the characteristics Q are exchanged to form new attribute characteristics PtAnd Qt。
2. The desensitized encryption method of claim 1, wherein said slicing said spatiotemporal attribute data twice comprises:
performing first slicing on the spatio-temporal attribute data according to the size of M x N;
performing second slicing on each slice data after the first slicing according to the X-Y size;
correspondingly, the calculating the rotation angle and the projection coordinate converted size of each slice data based on the size and the coordinate of each slice data after twice slicing includes:
assuming that the coordinates of the slice data after the two slices are (x, y), the rotation angle θ of the slice data is:
the size of the slice data after projection coordinate conversion is as follows:
wherein, Xt、YtRepresenting the size of the slice data after the projection coordinate conversion;
and performing projection coordinate conversion on each piece of slice data subjected to secondary slicing based on the rotation angle of each piece of slice data and the size of the projection coordinate converted to obtain desensitized and encrypted space-time attribute data.
3. Desensitization encryption method according to claim 1, characterized in that said exchange of part of features P and Q constitutes a new property feature PtAnd QtThe method comprises the following steps:
let initial feature atlas of data AInitial feature atlas of data BI and j are subscripts of the feature data;
for the last column of the initial feature set PUsing the last column of the initial feature set QInstead of, and adding a column to the initial feature set PObtaining a new ownership feature Pt;
4. The desensitization encryption method according to claim 1, wherein said desensitization encryption of said locale attribute data based on a locale feature normalization processing method comprises:
and for the land attribute data, unifying the land attributes based on five land types of agricultural land, construction land, forest land, water area and unused land, and integrating the land attribute data into five land attribute data.
5. A geospatial information desensitization encryption system, comprising:
the statistical classification module is used for carrying out spatial constraint mask processing on the geographic spatial information data and carrying out statistical classification on the geographic spatial information data according to the time-space attribute, the ownership attribute and the land attribute to obtain time-space attribute data, ownership attribute data and land attribute data;
the desensitization encryption module is used for desensitizing and encrypting the space-time attribute data based on a space-time coordinate transformation method, the ownership attribute data based on a longitudinal ownership feature exchange recombination method and the land-type attribute data based on a land-type feature normalization processing method;
the data recombination module is used for carrying out data recombination on the desensitized encrypted geospatial data to form geographic statistical data;
the data verification module is used for performing data verification on the geographic statistical data and the geographic spatial information data;
the desensitization encryption of the space-time attribute data based on the space-time coordinate transformation method comprises the following steps:
slicing the spatio-temporal attribute data twice;
calculating the rotation angle of each slice data and the size of the projection coordinate after conversion based on the size and the coordinate of each slice data after twice slicing;
desensitizing and encrypting each piece of sliced data for two times based on the rotation angle of each piece of sliced data and the size of the projection coordinate after conversion;
the desensitization encryption of the ownership attribute data based on the longitudinal ownership feature exchange recombination method comprises the following steps:
the data A comprises data characteristics P, the data B comprises data characteristics Q and label characteristics M, and when the data A and the data B are used as sample data and the label M are used together to construct an algorithm model, part of characteristics in the characteristics P and the characteristics Q are exchanged to form new attribute characteristics PtAnd Qt。
6. An electronic device comprising a memory, a processor for implementing the steps of the geospatial information desensitization encryption method according to any of claims 1-4 when executing a computer management class program stored in the memory.
7. A computer-readable storage medium, having stored thereon a computer management like program, which when executed by a processor, carries out the steps of the method of desensitizing encryption of geospatial information according to any of claims 1-4.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210385958.1A CN114491650B (en) | 2022-04-13 | 2022-04-13 | Method and system for desensitizing encryption of geographic spatial information |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210385958.1A CN114491650B (en) | 2022-04-13 | 2022-04-13 | Method and system for desensitizing encryption of geographic spatial information |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114491650A CN114491650A (en) | 2022-05-13 |
CN114491650B true CN114491650B (en) | 2022-07-01 |
Family
ID=81488769
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210385958.1A Active CN114491650B (en) | 2022-04-13 | 2022-04-13 | Method and system for desensitizing encryption of geographic spatial information |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114491650B (en) |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101645078A (en) * | 2009-09-11 | 2010-02-10 | 中南大学 | System and method for integration of change information collection and spatiotemporal data update] |
KR20130025980A (en) * | 2010-12-16 | 2013-03-13 | 부경대학교 산학협력단 | Geographic information reding apparatus and method encrypted of compressing vector map data for geographic information |
CN104751065A (en) * | 2015-03-09 | 2015-07-01 | 哈尔滨工程大学 | Encryption method for geographic information product file |
KR20150125850A (en) * | 2014-04-30 | 2015-11-10 | 부경대학교 산학협력단 | The methode of selesctive encryption scheme for geographic information system vector map data |
CN105069371A (en) * | 2015-07-28 | 2015-11-18 | 武汉大学 | Geospatial data based user privacy protection method and system |
CN106713245A (en) * | 2015-11-17 | 2017-05-24 | 星际空间(天津)科技发展有限公司 | Safety transmission method for geographic data |
CN109918462A (en) * | 2019-01-18 | 2019-06-21 | 杭州志远科技有限公司 | A kind of processing method of GIS-Geographic Information System |
CN111600712A (en) * | 2020-04-14 | 2020-08-28 | 陕西天泽中孚实业有限公司 | Safety encryption processing system for geographic information data |
CN112231745A (en) * | 2020-09-03 | 2021-01-15 | 中国电子科技集团公司第三十研究所 | Big data security and privacy protection method based on geometric deformation and storage medium |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9460175B1 (en) * | 2015-06-03 | 2016-10-04 | Palantir Technologies Inc. | Server implemented geographic information system with graphical interface |
-
2022
- 2022-04-13 CN CN202210385958.1A patent/CN114491650B/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101645078A (en) * | 2009-09-11 | 2010-02-10 | 中南大学 | System and method for integration of change information collection and spatiotemporal data update] |
KR20130025980A (en) * | 2010-12-16 | 2013-03-13 | 부경대학교 산학협력단 | Geographic information reding apparatus and method encrypted of compressing vector map data for geographic information |
KR20150125850A (en) * | 2014-04-30 | 2015-11-10 | 부경대학교 산학협력단 | The methode of selesctive encryption scheme for geographic information system vector map data |
CN104751065A (en) * | 2015-03-09 | 2015-07-01 | 哈尔滨工程大学 | Encryption method for geographic information product file |
CN105069371A (en) * | 2015-07-28 | 2015-11-18 | 武汉大学 | Geospatial data based user privacy protection method and system |
CN106713245A (en) * | 2015-11-17 | 2017-05-24 | 星际空间(天津)科技发展有限公司 | Safety transmission method for geographic data |
CN109918462A (en) * | 2019-01-18 | 2019-06-21 | 杭州志远科技有限公司 | A kind of processing method of GIS-Geographic Information System |
CN111600712A (en) * | 2020-04-14 | 2020-08-28 | 陕西天泽中孚实业有限公司 | Safety encryption processing system for geographic information data |
CN112231745A (en) * | 2020-09-03 | 2021-01-15 | 中国电子科技集团公司第三十研究所 | Big data security and privacy protection method based on geometric deformation and storage medium |
Non-Patent Citations (1)
Title |
---|
一种基于三维Arnold变换的矢量地理数据置乱加密方法;张毅等;《信息科学辑》;20211025;全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN114491650A (en) | 2022-05-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9910993B2 (en) | Simulation and virtual reality based cyber behavioral systems | |
EP3965023A1 (en) | Method and device for constructing decision trees | |
Zacarias | Global bioclimatic suitability for the fall armyworm, Spodoptera frugiperda (Lepidoptera: Noctuidae), and potential co-occurrence with major host crops under climate change scenarios | |
Devaraj et al. | An efficient framework for secure image archival and retrieval system using multiple secret share creation scheme | |
CN105320613A (en) | Systems and methods for dynamic data storage | |
Chen et al. | Geo-defakehop: High-performance geographic fake image detection | |
Hanmanthu et al. | SQL Injection Attack prevention based on decision tree classification | |
Fang et al. | A service-oriented collaborative approach to disaster decision support by integrating geospatial resources and task chain | |
EP2674895A2 (en) | Identification of marker features in multi-dimensional data | |
Vázquez‐Patiño et al. | A causal flow approach for the evaluation of global climate models | |
CN111460043A (en) | Three-dimensional space image block chain storage method and page display method | |
CN114491650B (en) | Method and system for desensitizing encryption of geographic spatial information | |
CN116451279B (en) | Data processing method, device, equipment and readable storage medium | |
CN110610098A (en) | Data set generation method and device | |
CN112989394A (en) | Vector geographic data encryption and decryption method and system | |
Jacquez et al. | Geospatial cryptography: enabling researchers to access private, spatially referenced, human subjects data for cancer control and prevention | |
CN112540989A (en) | Data authority confirming and managing method based on data exchange log | |
CN115792505A (en) | Rail transit power supply management method and system | |
CN110457934A (en) | A kind of high emulation data desensitization algorithm based on hash algorithm | |
CN116186755A (en) | Privacy calculating method, device, terminal equipment and storage medium | |
Lv et al. | Edge-fog-cloud secure storage with deep-learning-assisted digital twins | |
Liu et al. | Subverting privacy-preserving gans: Hiding secrets in sanitized images | |
de Oliveira et al. | Time Series Compression for IoT: A Systematic Literature Review | |
Panchbhai et al. | Enhanced block based progressive visual secret sharing scheme for grayscale and color image | |
Kyriakopoulos et al. | The dbMark: A benchmarking system for watermarking methods for relational databases |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
PE01 | Entry into force of the registration of the contract for pledge of patent right | ||
PE01 | Entry into force of the registration of the contract for pledge of patent right |
Denomination of invention: A Desensitization and Encryption Method and System for Geospatial Information Effective date of registration: 20230615 Granted publication date: 20220701 Pledgee: Guanggu Branch of Wuhan Rural Commercial Bank Co.,Ltd. Pledgor: WUHAN OPTICS VALLEY INFORMATION TECHNOLOGY CO.,LTD. Registration number: Y2023420000234 |