CN114491650B - Method and system for desensitizing encryption of geographic spatial information - Google Patents

Method and system for desensitizing encryption of geographic spatial information Download PDF

Info

Publication number
CN114491650B
CN114491650B CN202210385958.1A CN202210385958A CN114491650B CN 114491650 B CN114491650 B CN 114491650B CN 202210385958 A CN202210385958 A CN 202210385958A CN 114491650 B CN114491650 B CN 114491650B
Authority
CN
China
Prior art keywords
data
attribute
space
land
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210385958.1A
Other languages
Chinese (zh)
Other versions
CN114491650A (en
Inventor
洪勇
罗冷坤
谢田晋
刘琛
姜益民
董朝阳
李纯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan Optics Valley Information Technology Co ltd
Original Assignee
Wuhan Optics Valley Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Optics Valley Information Technology Co ltd filed Critical Wuhan Optics Valley Information Technology Co ltd
Priority to CN202210385958.1A priority Critical patent/CN114491650B/en
Publication of CN114491650A publication Critical patent/CN114491650A/en
Application granted granted Critical
Publication of CN114491650B publication Critical patent/CN114491650B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/29Geographical information databases

Abstract

The invention provides a method and a system for desensitizing encryption of geospatial information, wherein the method comprises the following steps: carrying out statistical classification on the geographic space information data according to the time-space attribute, the ownership attribute and the land class attribute; respectively carrying out desensitization encryption on the time-space attribute data based on a time-space coordinate conversion method, the weight attribute data based on a longitudinal weight attribute feature exchange recombination method and the ground attribute data based on a ground feature normalization processing method; carrying out data recombination on the desensitized encrypted geospatial data to form geostatistical data; and carrying out data verification on the geographic statistical data and the geospatial information data. The invention carries out desensitization encryption on the space-time attribute data, the weight attribute data and the ground class attribute data by a space-time coordinate conversion method, a longitudinal weight attribute feature exchange recombination method and a ground class feature normalization processing method respectively, thereby improving the speed of data desensitization encryption and meeting the reliability of data encryption.

Description

Method and system for desensitizing encryption of geographic spatial information
Technical Field
The invention relates to the field of data security, in particular to a method and a system for desensitizing encryption of geospatial information.
Background
With the rapid development of the upstream and downstream industry chains of the geographic information industry, data governance technologies have been derived from the traditional big data industries of finance, medical treatment, party administration, education and the like to the geographic information industry. Meanwhile, impact is brought to the safety problem of geographic information big data privacy, and effective desensitization encryption of geographic space information data plays a vital role in development of the geographic information industry. Most of the traditional industry data types are text data, image data and voice data, the data characteristic information is single, the data structure is regular, and the data encryption is mainly carried out in a hardware isolation mode at present, but the data circulation is also blocked; the software layer mainly adopts the technologies of distributed learning, federal learning, dynamic database updating and the like to carry out privacy desensitization encryption. The geospatial information data mainly comprises sensitive information such as spatio-temporal position information, ownership information, land feature information and the like, the data space hierarchy is more complex, and the traditional data management means obviously cannot meet the requirements.
The homeland space information data contains a large amount of personal privacy information and national strategic deployment information, the sensitive attribute of the data can be kept by the traditional data cleaning, counting and analyzing means, the public circulation of the data cannot be realized, and the requirement on cross cooperation management of multiple departments is difficult to meet. The geographic spatial information desensitization encryption method based on multi-element separation sequentially performs interpretation, layered encryption, cleaning, statistics and verification on data, ensures effectiveness and mobility of the encrypted data, promotes development of a data industrial chain in the geographic information industry, and creates a chance for combining a remote sensing mapping technology and geographic information privacy security calculation.
Disclosure of Invention
Aiming at the technical problems in the prior art, the invention provides a method and a system for desensitizing encryption of geospatial information, which can improve the speed of desensitizing encryption of data and ensure the reliability of data encryption.
According to a first aspect of the present invention, there is provided a geospatial information desensitization encryption method, comprising:
step 1, carrying out space constraint mask processing on geographic space information data, and carrying out statistical classification on the geographic space information data according to a space-time attribute, an ownership attribute and a land attribute to obtain space-time attribute data, ownership attribute data and land attribute data;
step 2, desensitizing and encrypting the space-time attribute data based on a space-time coordinate transformation method, the ownership attribute data based on a longitudinal ownership feature exchange recombination method and the territorial attribute data based on a territorial feature normalization processing method;
step 3, performing data recombination on the desensitized encrypted geospatial data to form geographic statistical data;
and 4, performing data verification on the geographic statistical data and the geospatial information data.
On the basis of the technical scheme, the invention can be improved as follows.
Optionally, the desensitizing encryption of the spatio-temporal attribute data based on a spatio-temporal coordinate transformation method in step 2 includes:
slicing the spatio-temporal attribute data twice;
calculating the rotation angle and the size after coordinate conversion of each piece of slice data based on the size and the coordinate of each piece of slice data after twice slicing;
and performing desensitization encryption processing on each piece of slice data after twice slicing based on the rotation angle and the size of the coordinate converted data.
Optionally, the slicing the spatiotemporal attribute data twice includes:
performing first slicing on the spatio-temporal attribute data according to the size of M x N;
performing second slicing on each slice data after the first slicing according to the X-Y size;
correspondingly, the calculating the rotation angle and the projection coordinate converted size of each slice data based on the size and the coordinate of each slice data after twice slicing includes:
assuming that the coordinates of the slice data after the two slices are (x, y), the rotation angle θ of the slice data is:
Figure 734357DEST_PATH_IMAGE001
wherein k is1、k2And k3In order to be a coordinate-shift constant,
Figure 260016DEST_PATH_IMAGE002
the value range of (1) is (0, 90);
the size of the slice data after projection coordinate conversion is as follows:
Figure 948617DEST_PATH_IMAGE003
Figure 508912DEST_PATH_IMAGE004
wherein, Xt、YtRepresenting the size of the slice data after the projection coordinate conversion;
and performing projection coordinate conversion on each piece of slice data subjected to secondary slicing based on the rotation angle of each piece of slice data and the size of the projection coordinate converted to obtain desensitized and encrypted space-time attribute data.
Optionally, the desensitizing encryption of the ownership attribute data based on the longitudinal ownership feature exchange and recombination method includes:
the data A comprises data characteristics P, the data B comprises data characteristics Q and label characteristics M, and when the data A and the data B are used as sample data and the label M are used together to construct an algorithm model, the characteristics P and partial characteristics in the characteristics Q are exchanged to form new attribute characteristics PtAnd Qt
Optionally, the new attribute feature P is formed by exchanging partial features in the features P and QtAnd QtThe method comprises the following steps:
let initial feature atlas of data A
Figure 562449DEST_PATH_IMAGE005
Initial feature atlas of data B
Figure 122875DEST_PATH_IMAGE006
I and j are characteristic numbersA subscript thereof;
for the last column of the initial feature set P
Figure 67697DEST_PATH_IMAGE007
Using the last column of the initial feature set Q
Figure 427704DEST_PATH_IMAGE008
Instead of, and adding a column to the initial feature set P
Figure 793088DEST_PATH_IMAGE009
Obtaining a new ownership feature Pt
Last column for initial feature set Q
Figure 558919DEST_PATH_IMAGE010
Using the last column of the initial feature set P
Figure 524076DEST_PATH_IMAGE011
Instead, a new ownership feature Q is obtainedt
Optionally, the desensitization encryption of the geographical attribute data based on the geographical feature normalization processing method includes:
and for the land attribute data, unifying the land attributes based on five land types of agricultural land, construction land, forest land, water area and unused land, and integrating the land attribute data into five land attribute data.
According to a second aspect of the present invention, there is provided a geospatial information desensitization encryption system comprising:
the statistical classification module is used for carrying out spatial constraint mask processing on the geographic spatial information data and carrying out statistical classification on the geographic spatial information data according to the time-space attribute, the ownership attribute and the land attribute to obtain time-space attribute data, ownership attribute data and land attribute data;
the desensitization encryption module is used for desensitizing and encrypting the space-time attribute data based on a space-time coordinate transformation method, the ownership attribute data based on a longitudinal ownership feature exchange recombination method and the land-type attribute data based on a land-type feature normalization processing method;
the data recombination module is used for carrying out data recombination on the desensitized encrypted geospatial data to form geographic statistical data;
and the data verification module is used for performing data verification on the geographic statistical data and the geographic spatial information data.
According to a third aspect of the invention, there is provided an electronic device comprising a memory, a processor for implementing the steps of the geospatial information desensitization encryption method when executing a computer management class program stored in the memory.
According to a fourth aspect of the present invention, there is provided a computer readable storage medium having stored thereon a computer management class program, which when executed by a processor implements the steps of a geospatial information desensitization encryption method.
The invention provides a geographical space information desensitization encryption method and a system, which are characterized in that firstly, geographical space information data attributes are interpreted and analyzed, and the data attributes are classified and sorted according to time-space attributes, weight attributes and ground attributes to obtain a primary data source; then, respectively adopting space-time coordinate conversion, longitudinal ownership feature exchange recombination and land feature normalization to encrypt space-time attributes, ownership attributes and land attributes, and carrying out statistics and classification on desensitized encrypted data to obtain geographical statistical data; in order to ensure the consistency of the recombined geographic statistical data and the key information of the geospatial information data source, the two groups of data are compared and verified at last, so that important information is prevented from being lost in the desensitization process, the speed of desensitization and encryption of the data is increased, and the reliability of data encryption is met.
Drawings
FIG. 1 is a flow chart of a method for desensitizing encryption of geospatial information according to the present invention;
FIG. 2 is a schematic diagram of the overall processing procedure of a geospatial information desensitization encryption method;
FIG. 3 is a schematic diagram of projection coordinate transformation of spatio-temporal attribute data based on a spatio-temporal coordinate transformation method;
FIG. 4 is a schematic representation of the recombination of feature P and feature Q;
FIG. 5 is a schematic diagram of a normalization process for the terrain attribute data;
FIG. 6 is a schematic structural diagram of a geospatial information desensitization encryption system according to the present invention;
FIG. 7 is a schematic diagram of a hardware structure of a possible electronic device according to the present invention;
fig. 8 is a schematic diagram of a hardware structure of a possible computer-readable storage medium according to the present invention.
Detailed Description
The following detailed description of embodiments of the present invention is provided in connection with the accompanying drawings and examples. The following examples are intended to illustrate the invention but are not intended to limit the scope of the invention.
The invention provides a geographic space information desensitization encryption method and system based on multi-factor separation, wherein geographic space information data mainly comprise land survey data, agricultural channel right data, homeland space planning data, land utilization status data and the like, the attributes of the geographic space information data are interpreted and analyzed, and the data attributes are classified and sorted according to time-space attributes, right attributes and land attributes to obtain a primary data source. And then, respectively adopting space-time coordinate conversion, longitudinal ownership feature exchange recombination and land feature normalization to encrypt the space-time attribute, the ownership attribute and the land attribute, and carrying out statistics and classification on the desensitized and encrypted data to obtain geographic statistical data. In order to ensure the consistency of the key information of the recombined geographic statistical data and the geographic spatial information data source, the two groups of data are finally compared and verified, so that important information is prevented from being lost in the desensitization process.
Example one
A method for desensitizing encryption of geospatial information, as shown in fig. 1 and 2, the desensitizing encryption method comprising the steps of:
step 1, carrying out space constraint mask processing on the geographic space information data, and carrying out statistical classification on the geographic space information data according to the spatio-temporal attribute, the ownership attribute and the land attribute to obtain spatio-temporal attribute data, the ownership attribute data and the land attribute data.
It can be understood that the geospatial information data mainly comprises land survey data, agricultural and economic right data, territorial space planning data, land utilization status data and the like, and the geospatial information data is subjected to spatial constraint masking to ensure the unified registration of geographic coordinates. Then, the geospatial information data features are statistically classified according to the spatio-temporal attributes, the ownership attributes and the land attributes, and the integrity and the effectiveness of the data features after the classification statistics are checked in a sampling inspection mode.
And 2, desensitizing and encrypting the space-time attribute data based on a space-time coordinate transformation method, the ownership attribute data based on a longitudinal ownership feature exchange recombination method and the territorial attribute data based on a territorial feature normalization processing method respectively.
Specifically, as shown in fig. 3, the projection coordinate conversion is performed on the time-space attribute data, the data after the spatial constraint mask is firstly sliced according to the size of M × N, then each slice is sliced twice according to the size of X × Y and numbered, and after the two slices are performed, the time-space attribute of each slice data is subjected to the coordinate conversion. The projection coordinate conversion of the space-time attribute data is divided into a plurality of operation steps, including twice slicing and coordinate conversion operation, so that on one hand, the requirement of computer parallel computation can be met, namely, the operation steps can be simultaneously carried out, and the data encryption efficiency is improved; on the other hand, the reliability of data encryption is ensured, and the data is difficult to decrypt simply. Let the coordinate of the first slice data in the upper left corner after the secondary slicing be (1, 1), and sequentially be (2, 1. (1, 2.). that is, each slice data has one coordinate (x, y), the rotation angle θ of each slice data is calculated as follows:
Figure 58963DEST_PATH_IMAGE001
wherein k is1、k2And k3Is a coordinate offset constant, k1、k2And k3Can be obtained according to the data size of the geospatial information dataAnd setting to ensure that the data volume after the projection coordinate transformation is not increased too much, wherein the value range of theta is (0, 90).
The rotation angle of the coordinate transformation of each slice data is calculated according to the coordinates of the slice data, and the rotation angle of each slice data is different, so that the safety of data desensitization encryption can be improved.
Each slice data after projection coordinate conversion is as follows in terms of size calculation:
Figure 516620DEST_PATH_IMAGE012
;
Figure 395845DEST_PATH_IMAGE013
;
Figure 29608DEST_PATH_IMAGE004
;
wherein, Xt、YtThe coordinate-converted secondary slice data size is indicated, and L indicates the radius of the rotational azimuth circle. And calculating the size after coordinate transformation according to the coordinate of each piece of slice data, wherein the size after coordinate transformation corresponding to each piece of slice data is different, and the reliability of data encryption is improved.
Rotating each slice data after the secondary cutting according to the rotation angle and the size of each slice data calculated above, and changing the size to (X)t、Yt)。
As an embodiment, the desensitization encryption of the ownership attribute data based on the longitudinal ownership feature exchange reorganization method includes: the data A comprises data characteristics P, the data B comprises data characteristics Q and label characteristics M, and when the data A and the data B are used as sample data and the label M are used together to construct an algorithm model, the characteristics P and partial characteristics in the characteristics Q are exchanged to form new attribute characteristics PtAnd Qt
Wherein, the exchange of partial characteristics in the characteristics P and Q forms new attribute characteristicsPtAnd QtThe method comprises the following steps: let initial feature atlas of data A
Figure 419001DEST_PATH_IMAGE005
Initial feature atlas of data B
Figure 516401DEST_PATH_IMAGE006
I and j are subscripts of the feature data;
for the last column of the initial feature set P
Figure 991245DEST_PATH_IMAGE007
Using the last column of the initial feature set Q
Figure 566714DEST_PATH_IMAGE008
Instead of, and adding a column to the initial feature set P
Figure 810613DEST_PATH_IMAGE009
Obtaining a new ownership feature Pt(ii) a Last column for initial feature set Q
Figure 78915DEST_PATH_IMAGE010
Using the last column of the initial feature set P
Figure 306634DEST_PATH_IMAGE011
Instead, a new ownership feature Q is obtainedt
Specifically, longitudinal ownership feature exchange reorganization is performed on ownership attribute data, as shown in fig. 4, it is assumed that data a includes a data feature P, data B includes a data feature Q and a label feature M, when the data a and the data B are used as sample data and the label M to construct an algorithm model together, an image is not formed by training the model under the condition that the data a and the data B partially exchange each other and the weight is shared during training, so that a feature group is formed
Figure 682864DEST_PATH_IMAGE014
And feature set
Figure 984532DEST_PATH_IMAGE015
Exchanging to form new rights characteristics PtAnd Qt. The algorithm flow is as follows:
respectively inputting initial feature atlas
Figure 423735DEST_PATH_IMAGE016
And initial feature atlas
Figure 669908DEST_PATH_IMAGE017
The feature map set P and the feature map set Q are both multidimensional matrices, as shown in fig. 4.
Figure 790442DEST_PATH_IMAGE018
And the specific algorithm for replacing the same bit by both P and Q each time is as follows:
Figure 8934DEST_PATH_IMAGE019
Figure 619038DEST_PATH_IMAGE020
Figure 290191DEST_PATH_IMAGE021
Figure 103881DEST_PATH_IMAGE022
Figure 973617DEST_PATH_IMAGE023
Figure 754622DEST_PATH_IMAGE024
Figure 913071DEST_PATH_IMAGE025
Figure 172145DEST_PATH_IMAGE026
Figure 99650DEST_PATH_IMAGE027
Figure 189572DEST_PATH_IMAGE028
as an embodiment, the method for performing desensitization encryption on the land type attribute data based on the land type feature normalization processing includes: and for the land attribute data, unifying the land attributes based on five land types of agricultural land, construction land, forest land, water area and unused land, and integrating the land attribute data into five land attribute data.
Specifically, the land attribute data in the multiple geographic spatial information data is normalized, as shown in fig. 5, the current land utilization data includes wetland, cultivated land, forest land, commercial service land, industrial and mining land, residential land, water area, grassland, other land and the like, the homeland space planning data includes building planning land, agricultural planning land, mountain land, water area, forest land, lake, grassland and the like, the data is poor in data circulation due to the fact that the data belongs to sensitive information, and the land attribute naming modes of each geographic spatial data are inconsistent.
And 3, performing data recombination on the desensitized and encrypted geospatial data to form geostatistical data.
The method can be understood that the desensitized encrypted spatio-temporal attributes, the right attributes and the ground attributes are subjected to data recombination to construct geographic statistical data, so that desensitized encryption of sensitive information is ensured, and attribute retrieval and query can be supported.
And 4, performing data verification on the geographic statistical data and the geographic spatial information data.
It can be understood that the geospatial information data is desensitized and encrypted, and then is subjected to data reconstruction, so that geostatistical data is obtained. In the step 4, data verification is carried out on the geographic statistical data and the geospatial information data, firstly, statistical verification is carried out to check the integrity of characteristics, then, the reliability of data sampling is checked by utilizing field investigation, and finally, data compression and decompression, data transmission and test sharing are carried out to check the data liquidity.
In order to verify the performance of the method, the present invention selects the local land utilization status data in Jingzhou city to perform experimental verification, and the experimental parameter settings are shown in the following table 1:
TABLE 1 Experimental parameters
Figure 835317DEST_PATH_IMAGE029
And respectively carrying out statistical verification on the land types in the local land utilization current data and the desensitized encrypted geographic statistical data in Jingzhou city, simultaneously testing the compression, decompression, transmission and sharing functions of the desensitized encrypted geographic statistical data, and carrying out data format size conversion after the desensitized encryption of the statistical data. The results of the experiment are shown in table 2 below:
TABLE 2 results of the experiment
Figure 898082DEST_PATH_IMAGE030
Experimental results show that the total area of the ground class is not changed after the data is desensitized and encrypted, the data can be compressed, transmitted and decompressed after desensitization and encryption, and the size of the data is increased within a reliable range.
Example two
A geospatial information desensitization encryption system, see fig. 6, comprising a statistical classification module 61, a desensitization encryption module 62, a data reassembly module 63, and a data verification module 64, wherein:
and the statistical classification module 61 is used for performing spatial constraint masking processing on the geographic spatial information data, and performing statistical classification on the geographic spatial information data according to the time-space attribute, the ownership attribute and the land attribute to obtain time-space attribute data, ownership attribute data and land attribute data.
And the desensitization encryption module 62 is configured to perform desensitization encryption on the spatio-temporal attribute data based on a spatio-temporal coordinate transformation method, the ownership attribute data based on a longitudinal ownership feature exchange recombination method, and the geographical attribute data based on a geographical feature normalization processing method, respectively.
And the data recombination module 63 is used for performing data recombination on the desensitized encrypted geospatial data to form geographic statistical data.
And a data checking module 64, configured to perform data checking on the geographic statistical data and the geospatial information data.
It can be understood that the geospatial information desensitization encryption system provided by the present invention corresponds to the geospatial information desensitization encryption method provided by each of the foregoing embodiments, and the related technical features of the geospatial information desensitization encryption system may refer to the related technical features of the geospatial information desensitization encryption method, and are not described herein again.
EXAMPLE III
Referring to fig. 7, fig. 7 is a schematic view of an embodiment of an electronic device according to an embodiment of the invention. As shown in fig. 7, an embodiment of the present invention provides an electronic device 700, which includes a memory 710, a processor 720, and a computer program 711 stored in the memory 710 and executable on the processor 720, wherein the processor 720 implements the geospatial information desensitization encryption method of the first embodiment when executing the computer program 711.
Example four
Referring to fig. 8, fig. 8 is a schematic diagram of an embodiment of a computer-readable storage medium according to the present invention. As shown in fig. 8, the present embodiment provides a computer-readable storage medium 800, on which a computer program 811 is stored, and when executed by a processor, the computer program 811 implements the method for desensitizing encryption of geospatial information according to the first embodiment.
The method and the system for desensitizing encryption of geospatial information provided by the embodiment of the invention have the following advantages:
(1) the invention provides a method for converting the spatio-temporal attributes of geospatial information data, which refines the data hierarchy by projection coordinate conversion after secondary data slicing, improves the data desensitization encryption speed on one hand, meets the requirement of computer parallel computation, and provides a new idea for the treatment and cleaning of geospatial data; on the other hand, the rotation angle calculation mode provided by the method meets the reliability of data encryption, greatly reduces the data space after encryption, and ensures the timeliness of data storage and operation.
(2) The invention provides a longitudinal exchange and recombination method for right characters of geospatial information data, which performs character recombination on the geospatial data by using the idea of federal learning, ensures the secrecy of the data from the perspective of single data by recombined right characters, and does not cause loss to the reliability of a model from the perspective of an algorithm model. The longitudinal weight feature exchange enriches the feature complexity to a certain extent, and avoids poor generalization effect of the model caused by subsequent data modeling.
(3) The invention provides a method for normalizing the land attributes in various geographic spatial information data, which establishes five categories of agricultural land, building land, forest land, water area and unused land to unify the land attributes, opens up the circulation among data from the aspect of the data land attributes, and simultaneously carries out desensitization encryption on the land attributes. The ground standard is set for the subsequent privacy security calculation with the satellite remote sensing data, and a new thought of the privacy security calculation of the geospatial information data is provided.
It should be noted that, in the foregoing embodiments, the descriptions of the respective embodiments have respective emphasis, and reference may be made to relevant descriptions of other embodiments for parts that are not described in detail in a certain embodiment.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While preferred embodiments of the present invention have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all such alterations and modifications as fall within the scope of the invention.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.

Claims (7)

1. A method for desensitizing encryption of geospatial information, comprising:
step 1, carrying out space constraint mask processing on geographic space information data, and carrying out statistical classification on the geographic space information data according to a space-time attribute, an ownership attribute and a land attribute to obtain space-time attribute data, ownership attribute data and land attribute data;
step 2, desensitizing and encrypting the space-time attribute data based on a space-time coordinate transformation method, the ownership attribute data based on a longitudinal ownership feature exchange recombination method and the territorial attribute data based on a territorial feature normalization processing method;
step 3, performing data recombination on the desensitized encrypted geospatial data to form geographic statistical data;
step 4, carrying out data verification on the geographic statistical data and the geospatial information data;
in the step 2, desensitization encryption is performed on the space-time attribute data based on a space-time coordinate transformation method, and the desensitization encryption method comprises the following steps:
slicing the spatio-temporal attribute data twice;
calculating the rotation angle of each slice data and the size of the projection coordinate after conversion based on the size and the coordinate of each slice data after twice slicing;
desensitizing and encrypting each piece of sliced data for two times based on the rotation angle of each piece of sliced data and the size of the projection coordinate after conversion;
the desensitization encryption of the ownership attribute data based on the longitudinal ownership feature exchange recombination method comprises the following steps:
the data A comprises data characteristics P, the data B comprises data characteristics Q and label characteristics M, and when the data A and the data B are used as sample data and the label M are used together to construct an algorithm model, the characteristics P and partial characteristics in the characteristics Q are exchanged to form new attribute characteristics PtAnd Qt
2. The desensitized encryption method of claim 1, wherein said slicing said spatiotemporal attribute data twice comprises:
performing first slicing on the spatio-temporal attribute data according to the size of M x N;
performing second slicing on each slice data after the first slicing according to the X-Y size;
correspondingly, the calculating the rotation angle and the projection coordinate converted size of each slice data based on the size and the coordinate of each slice data after twice slicing includes:
assuming that the coordinates of the slice data after the two slices are (x, y), the rotation angle θ of the slice data is:
Figure 980001DEST_PATH_IMAGE001
wherein k is1、k2And k3In order to be a coordinate-shift constant,
Figure 247035DEST_PATH_IMAGE002
the value range of (2) is (0, 90);
the size of the slice data after projection coordinate conversion is as follows:
Figure 445935DEST_PATH_IMAGE003
Figure 318076DEST_PATH_IMAGE004
wherein, Xt、YtRepresenting the size of the slice data after the projection coordinate conversion;
and performing projection coordinate conversion on each piece of slice data subjected to secondary slicing based on the rotation angle of each piece of slice data and the size of the projection coordinate converted to obtain desensitized and encrypted space-time attribute data.
3. Desensitization encryption method according to claim 1, characterized in that said exchange of part of features P and Q constitutes a new property feature PtAnd QtThe method comprises the following steps:
let initial feature atlas of data A
Figure 311440DEST_PATH_IMAGE005
Initial feature atlas of data B
Figure 65769DEST_PATH_IMAGE006
I and j are subscripts of the feature data;
for the last column of the initial feature set P
Figure 474885DEST_PATH_IMAGE007
Using the last column of the initial feature set Q
Figure 998270DEST_PATH_IMAGE008
Instead of, and adding a column to the initial feature set P
Figure 428114DEST_PATH_IMAGE009
Obtaining a new ownership feature Pt
Last column for initial feature set Q
Figure 669740DEST_PATH_IMAGE010
Using the last column of the initial feature set P
Figure 646661DEST_PATH_IMAGE011
Instead, a new ownership feature Q is obtainedt
4. The desensitization encryption method according to claim 1, wherein said desensitization encryption of said locale attribute data based on a locale feature normalization processing method comprises:
and for the land attribute data, unifying the land attributes based on five land types of agricultural land, construction land, forest land, water area and unused land, and integrating the land attribute data into five land attribute data.
5. A geospatial information desensitization encryption system, comprising:
the statistical classification module is used for carrying out spatial constraint mask processing on the geographic spatial information data and carrying out statistical classification on the geographic spatial information data according to the time-space attribute, the ownership attribute and the land attribute to obtain time-space attribute data, ownership attribute data and land attribute data;
the desensitization encryption module is used for desensitizing and encrypting the space-time attribute data based on a space-time coordinate transformation method, the ownership attribute data based on a longitudinal ownership feature exchange recombination method and the land-type attribute data based on a land-type feature normalization processing method;
the data recombination module is used for carrying out data recombination on the desensitized encrypted geospatial data to form geographic statistical data;
the data verification module is used for performing data verification on the geographic statistical data and the geographic spatial information data;
the desensitization encryption of the space-time attribute data based on the space-time coordinate transformation method comprises the following steps:
slicing the spatio-temporal attribute data twice;
calculating the rotation angle of each slice data and the size of the projection coordinate after conversion based on the size and the coordinate of each slice data after twice slicing;
desensitizing and encrypting each piece of sliced data for two times based on the rotation angle of each piece of sliced data and the size of the projection coordinate after conversion;
the desensitization encryption of the ownership attribute data based on the longitudinal ownership feature exchange recombination method comprises the following steps:
the data A comprises data characteristics P, the data B comprises data characteristics Q and label characteristics M, and when the data A and the data B are used as sample data and the label M are used together to construct an algorithm model, part of characteristics in the characteristics P and the characteristics Q are exchanged to form new attribute characteristics PtAnd Qt
6. An electronic device comprising a memory, a processor for implementing the steps of the geospatial information desensitization encryption method according to any of claims 1-4 when executing a computer management class program stored in the memory.
7. A computer-readable storage medium, having stored thereon a computer management like program, which when executed by a processor, carries out the steps of the method of desensitizing encryption of geospatial information according to any of claims 1-4.
CN202210385958.1A 2022-04-13 2022-04-13 Method and system for desensitizing encryption of geographic spatial information Active CN114491650B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210385958.1A CN114491650B (en) 2022-04-13 2022-04-13 Method and system for desensitizing encryption of geographic spatial information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210385958.1A CN114491650B (en) 2022-04-13 2022-04-13 Method and system for desensitizing encryption of geographic spatial information

Publications (2)

Publication Number Publication Date
CN114491650A CN114491650A (en) 2022-05-13
CN114491650B true CN114491650B (en) 2022-07-01

Family

ID=81488769

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210385958.1A Active CN114491650B (en) 2022-04-13 2022-04-13 Method and system for desensitizing encryption of geographic spatial information

Country Status (1)

Country Link
CN (1) CN114491650B (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101645078A (en) * 2009-09-11 2010-02-10 中南大学 System and method for integration of change information collection and spatiotemporal data update]
KR20130025980A (en) * 2010-12-16 2013-03-13 부경대학교 산학협력단 Geographic information reding apparatus and method encrypted of compressing vector map data for geographic information
CN104751065A (en) * 2015-03-09 2015-07-01 哈尔滨工程大学 Encryption method for geographic information product file
KR20150125850A (en) * 2014-04-30 2015-11-10 부경대학교 산학협력단 The methode of selesctive encryption scheme for geographic information system vector map data
CN105069371A (en) * 2015-07-28 2015-11-18 武汉大学 Geospatial data based user privacy protection method and system
CN106713245A (en) * 2015-11-17 2017-05-24 星际空间(天津)科技发展有限公司 Safety transmission method for geographic data
CN109918462A (en) * 2019-01-18 2019-06-21 杭州志远科技有限公司 A kind of processing method of GIS-Geographic Information System
CN111600712A (en) * 2020-04-14 2020-08-28 陕西天泽中孚实业有限公司 Safety encryption processing system for geographic information data
CN112231745A (en) * 2020-09-03 2021-01-15 中国电子科技集团公司第三十研究所 Big data security and privacy protection method based on geometric deformation and storage medium

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9460175B1 (en) * 2015-06-03 2016-10-04 Palantir Technologies Inc. Server implemented geographic information system with graphical interface

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101645078A (en) * 2009-09-11 2010-02-10 中南大学 System and method for integration of change information collection and spatiotemporal data update]
KR20130025980A (en) * 2010-12-16 2013-03-13 부경대학교 산학협력단 Geographic information reding apparatus and method encrypted of compressing vector map data for geographic information
KR20150125850A (en) * 2014-04-30 2015-11-10 부경대학교 산학협력단 The methode of selesctive encryption scheme for geographic information system vector map data
CN104751065A (en) * 2015-03-09 2015-07-01 哈尔滨工程大学 Encryption method for geographic information product file
CN105069371A (en) * 2015-07-28 2015-11-18 武汉大学 Geospatial data based user privacy protection method and system
CN106713245A (en) * 2015-11-17 2017-05-24 星际空间(天津)科技发展有限公司 Safety transmission method for geographic data
CN109918462A (en) * 2019-01-18 2019-06-21 杭州志远科技有限公司 A kind of processing method of GIS-Geographic Information System
CN111600712A (en) * 2020-04-14 2020-08-28 陕西天泽中孚实业有限公司 Safety encryption processing system for geographic information data
CN112231745A (en) * 2020-09-03 2021-01-15 中国电子科技集团公司第三十研究所 Big data security and privacy protection method based on geometric deformation and storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
一种基于三维Arnold变换的矢量地理数据置乱加密方法;张毅等;《信息科学辑》;20211025;全文 *

Also Published As

Publication number Publication date
CN114491650A (en) 2022-05-13

Similar Documents

Publication Publication Date Title
US9910993B2 (en) Simulation and virtual reality based cyber behavioral systems
EP3965023A1 (en) Method and device for constructing decision trees
Zacarias Global bioclimatic suitability for the fall armyworm, Spodoptera frugiperda (Lepidoptera: Noctuidae), and potential co-occurrence with major host crops under climate change scenarios
Devaraj et al. An efficient framework for secure image archival and retrieval system using multiple secret share creation scheme
CN105320613A (en) Systems and methods for dynamic data storage
Chen et al. Geo-defakehop: High-performance geographic fake image detection
Hanmanthu et al. SQL Injection Attack prevention based on decision tree classification
Fang et al. A service-oriented collaborative approach to disaster decision support by integrating geospatial resources and task chain
EP2674895A2 (en) Identification of marker features in multi-dimensional data
Vázquez‐Patiño et al. A causal flow approach for the evaluation of global climate models
CN111460043A (en) Three-dimensional space image block chain storage method and page display method
CN114491650B (en) Method and system for desensitizing encryption of geographic spatial information
CN116451279B (en) Data processing method, device, equipment and readable storage medium
CN110610098A (en) Data set generation method and device
CN112989394A (en) Vector geographic data encryption and decryption method and system
Jacquez et al. Geospatial cryptography: enabling researchers to access private, spatially referenced, human subjects data for cancer control and prevention
CN112540989A (en) Data authority confirming and managing method based on data exchange log
CN115792505A (en) Rail transit power supply management method and system
CN110457934A (en) A kind of high emulation data desensitization algorithm based on hash algorithm
CN116186755A (en) Privacy calculating method, device, terminal equipment and storage medium
Lv et al. Edge-fog-cloud secure storage with deep-learning-assisted digital twins
Liu et al. Subverting privacy-preserving gans: Hiding secrets in sanitized images
de Oliveira et al. Time Series Compression for IoT: A Systematic Literature Review
Panchbhai et al. Enhanced block based progressive visual secret sharing scheme for grayscale and color image
Kyriakopoulos et al. The dbMark: A benchmarking system for watermarking methods for relational databases

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
PE01 Entry into force of the registration of the contract for pledge of patent right
PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: A Desensitization and Encryption Method and System for Geospatial Information

Effective date of registration: 20230615

Granted publication date: 20220701

Pledgee: Guanggu Branch of Wuhan Rural Commercial Bank Co.,Ltd.

Pledgor: WUHAN OPTICS VALLEY INFORMATION TECHNOLOGY CO.,LTD.

Registration number: Y2023420000234