Disclosure of Invention
The application provides a dynamic desensitization method of large electric power data based on an isomorphic encryption algorithm, which aims to solve the problem of poor desensitization quality of the electric power data, and adopts the following technical scheme:
one embodiment of the application provides a dynamic desensitization method for big electric power data based on an isomorphic encryption algorithm, which comprises the following steps:
acquiring a large data set of power transaction;
Dividing the data of each power data sample in the power transaction big data set into a data set to be concealed and a privacy protection data set; calculating a hiding protection enhancement coefficient according to the difference between a to-be-hidden data set and a privacy protection data set among different power data samples in the power transaction big data set;
Constructing a disturbance neighbor matrix of each power data sample according to the hidden protection enhancement coefficients among different power data samples in the power transaction big data set; calculating a data disturbance sensitivity coefficient according to a disturbance neighbor matrix of each power data sample in the power transaction big data set;
Constructing a disturbance sensitive management quadtree according to data disturbance sensitivity coefficients among different power data samples in the power transaction big data set, and calculating a noise sensitive management coefficient according to the disturbance sensitive management quadtree;
and acquiring the noise sensitivity of the power data according to the noise sensitivity management coefficient, and finishing the desensitization processing of the power data based on the noise sensitivity of the power data.
Preferably, the method for dividing the data of each power data sample in the large data set of the power transaction into the data set to be concealed and the privacy protection data set comprises the following steps:
The name, contact telephone and ammeter user number information of each power data sample in the power transaction big data set are used as to-be-concealed processing data information, and a set formed by all to-be-concealed processing data information corresponding to each power data sample is used as to-be-concealed data set of each power data sample; the method comprises the steps of taking age, electricity consumption and account balance information of each power data sample in a power transaction big data set as data information to be privacy protected, and taking a set formed by all data information to be privacy protected corresponding to each power data sample as a privacy protection data set of each power data sample.
Preferably, the method for calculating the concealment protection enhancement coefficient according to the difference between the to-be-concealed data set and the privacy protection data set among different power data samples in the power transaction big data set comprises the following steps:
For any two power data samples in the power transaction big data set, taking the Jaccard coefficient of the data set to be concealed between the two power data samples as the concealment enhancement coefficient of the two power data samples; taking the Jacquard coefficient of the privacy-preserving data set between the two power data samples as the privacy-preserving coefficient between the two power data samples;
The concealment enhancement coefficient between two power data samples is used as a numerator, the sum of the privacy protection coefficient between the two data samples and 0.01 is used as a denominator, and the ratio of the numerator to the denominator is used as the concealment protection enhancement coefficient of the two data samples.
Preferably, the method for constructing the disturbance neighbor matrix of each power data sample according to the hidden protection enhancement coefficient among different power data samples in the power transaction big data set comprises the following steps:
Taking a power transaction big data set as input, acquiring a preset number of neighbor samples of each power data sample in the power transaction big data set by adopting a neighbor algorithm, and taking a set formed by each power data sample and a corresponding preset number of neighbor samples as a neighbor sample set of each power data sample; and acquiring a disturbance neighbor sequence according to a neighbor sample set of each power data sample in the power transaction big data set, and acquiring a disturbance neighbor matrix of each power data sample based on the disturbance neighbor sequence.
Preferably, the method for obtaining the disturbance neighbor sequence according to the neighbor sample set of each power data sample in the power transaction big data set and obtaining the disturbance neighbor matrix of each power data sample based on the disturbance neighbor sequence comprises the following steps:
For a neighbor sample set corresponding to each power data sample in the power transaction big data set, taking a hidden protection enhancement coefficient between each element and other elements in a neighbor sample set as a disturbance neighbor sequence of each element in the neighbor sample set according to a sequence consisting of a small order to a large order, taking the disturbance neighbor sequence as one row of elements in a matrix, and taking a matrix consisting of all disturbance neighbor sequences corresponding to the neighbor sample set as a disturbance neighbor matrix of each power data sample.
Preferably, the method for calculating the data disturbance sensitivity coefficient according to the disturbance neighbor matrix of each power data sample in the power transaction big data set comprises the following steps:
In the method, in the process of the invention,representing the/>, in a big dataset of power transactionsSum/>data disturbance sensitivity coefficients between the individual power data samples; /(I)And/>respectively represent the/>, in the big data set of the electric power transactionPerson, 5/>The/>, in the perturbed neighbor matrix of the individual power data samplesLine/>A vector of row elements; /(I)Representation/>And/>Cosine similarity between them; /(I)And/>respectively represent the/>, in the big data set of the electric power transactionPerson, 5/>rank of the disturbance neighbor matrix of the individual power data samples; /(I)An exponential function based on a natural constant; /(I)representing the/>, in a big dataset of power transactionsPerson, 5/>The number of rows of the perturbed neighbor matrix for each power data sample.
Preferably, the method for constructing the disturbance sensitive management quadtree according to the data disturbance sensitivity coefficient among different power data samples in the power transaction big data set and calculating the noise sensitive management coefficient according to the disturbance sensitive management quadtree comprises the following steps:
Taking each electric power data sample in the electric power transaction big data set as a node, taking a data disturbance sensitivity coefficient among different electric power data samples in the electric power transaction big data set as a weight of a connecting line among the corresponding different nodes, taking a weighted undirected graph formed by the weights of the nodes corresponding to all the electric power data samples in the electric power transaction big data set and the connecting line as a disturbance sensitive weighted undirected graph of the electric power transaction big data set, taking the disturbance sensitive weighted undirected graph as an input, acquiring a clustering result of the disturbance weighted undirected graph by adopting a clustering algorithm, and constructing a disturbance sensitive management quadtree according to the clustering result of the disturbance sensitive weighted undirected graph of the electric power transaction big data set;
for the disturbance sensitive management quadtree of each disturbance sensitive management sample set, taking a sequence consisting of the statistical quantity corresponding to all root nodes in the disturbance sensitive management quadtree as a disturbance sensitive management basic quantity sequence, and taking a sequence consisting of the quantity of all leaf nodes corresponding to each root node as a disturbance sensitive management quantity sequence; and determining the noise sensitivity management coefficient of each disturbance sensitivity management sample set according to the disturbance sensitivity management basic quantity sequence and the analysis result of the noise sensitivity influence degree of the disturbance sensitivity management quantity sequence on each disturbance sensitivity management sample set.
Preferably, the method for constructing the disturbance sensitive management quadtree according to the clustering result of the disturbance sensitive weighted undirected graph of the large data set of the electric power transaction comprises the following steps:
For each cluster in the clustering result of the disturbance sensitive weighted undirected graph of the large data set of the power transaction, taking a set formed by power data samples corresponding to all nodes in each cluster as a disturbance sensitive management sample set; for any two power data samples in each disturbance management sample set, performing exclusive or operation on elements at the same position in disturbance neighbor matrixes corresponding to the two power data samples, and taking the result matrixes of the exclusive or operation as disturbance neighbor judgment matrixes of the two power data samples in each disturbance sensitive management sample set;
For the disturbance neighbor judgment matrix of any two power data samples in each disturbance sensitive management sample set, uniformly dividing each column of elements in the disturbance neighbor judgment matrix, converting each group of uniformly divided values into decimal numbers, mapping decimal conversion results of each column of elements in the disturbance neighbor judgment matrix into a quadtree, mapping results of all columns of elements in the disturbance neighbor judgment matrix into the quadtree as a group of quadtree mapping results, and mapping results of all disturbance neighbor judgment matrices corresponding to each disturbance sensitive management sample set on the quadtree as disturbance sensitive management quadtree of each disturbance sensitive management sample set.
preferably, the method for analyzing the noise sensitivity influence degree of each disturbance sensitivity management sample set according to the corresponding relation between the disturbance sensitivity management basic quantity sequence and the disturbance sensitivity management quantity sequence and calculating the noise sensitivity management coefficient according to the analysis result comprises the following steps:
In the method, in the process of the invention,representing disturbance sensitive management basis quantity sequence/>Middle/>Noise sensitivity influence coefficients of the individual elements; /(I)representing disturbance sensitive management basis quantity sequence/>Middle/>Disturbance sensitive management quantity sequence corresponding to each element,/>Representation/>Maximum value of (2); /(I)Middle/>The values of the individual elements; /(I)Representation/>The number of data in (a);
Disturbance sensitive weighted undirected graph representing large data sets of power transactionsnoise sensitivity management coefficient of each disturbance sensitivity management sample set,/>Disturbance sensitive weighted undirected graph representing large data sets of power transactionsdisturbance-sensitive management base quantity sequence of a disturbance-sensitive management sample set,/>Representation/>Maximum value of (2); /(I)representing disturbance sensitive management basis quantity sequence/>the number of elements in (a).
preferably, the method for obtaining the noise sensitivity of the power data according to the noise sensitivity management coefficient and completing the desensitization processing of the power data based on the noise sensitivity of the power data comprises the following steps:
Taking all power data samples of each disturbance sensitive management sample set corresponding to a disturbance sensitive weighted undirected graph of the power transaction big data set as a group of dynamic encryption data, taking a set formed by noise sensitive management coefficients of all disturbance sensitive management sample sets corresponding to the power transaction big data set as a noise sensitive management quantization set, acquiring a normalization result of the noise sensitive management quantization set by adopting a normalization algorithm, and taking a value corresponding to a normalization result of the noise sensitive management coefficient of each disturbance sensitive management sample set in the noise sensitive management quantization set as the power data noise sensitivity of each disturbance sensitive management sample set;
And taking all groups of dynamic encryption data of the large electric power transaction data set and the corresponding electric power noise sensitivity as inputs of an homomorphic encryption algorithm to obtain the homomorphic encryption result of the large electric power transaction data set.
The beneficial effects of the application are as follows: the method has the advantages that the electric power data with the same data disturbance sensitivity degree are divided into a group by considering the disturbance sensitivity degree of different user data in the electric power transaction big data for full homomorphic encryption protection, noise sensitivity management coefficients are constructed by analyzing the distribution situation of the disturbance sensitivity degree of the data of each group of electric power data, the noise addition degree in the full homomorphic encryption process is quantized based on the noise sensitivity management coefficients, the accuracy of the electric power data encryption is prevented from being reduced due to overlarge noise parameters in the full homomorphic encryption process, and the accuracy of dynamic desensitization of the electric power transaction data is improved due to the full homomorphic encryption.
Detailed Description
The following description of the embodiments of the present application will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present application, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
Referring to fig. 1, a flowchart of a method for dynamically desensitizing large power data based on an isomorphic encryption algorithm according to an embodiment of the application is shown, the method comprises the following steps:
Step S001, acquiring a large data set of the power transaction.
The method and the system collect and arrange the information of each user in the electric power big database, specifically, the method and the system collect and arrange the information of each user, including the name, age, contact telephone, electricity consumption and account balance information of each user, and it is to be noted that the collected and arranged data implementer can adjust according to the content to be protected, and arrange the user electric power data table according to the information corresponding to each user, wherein the name, age, contact telephone and electricity consumption of each user belong to sensitive information, the electricity consumption and account balance information of each user are the data to be disclosed, the sensitive data are required to be encrypted to be hidden, the data to be disclosed are required to be subjected to differential privacy protection to be subjected to privacy protection, and the specific differential privacy protection calculation process is known technology and is not repeated.
Further, each piece of data in the user power data table corresponds to the name, age, contact telephone, electricity meter user number, electricity consumption and account balance information of a user, the name, contact telephone and electricity meter user number information in each piece of data are used as data information to be concealed, and the age, electricity consumption and account balance information in each piece of data are used as data information to be privacy protected. And taking each piece of data in the user power data table as a power data sample, and taking a set formed by all power data samples corresponding to the user power data table as a power transaction big data set.
thus, a large data set of the power transaction is obtained.
Step S002, respectively obtaining a hidden enhancement coefficient and a privacy protection coefficient according to the data characteristics of different power data samples in the power transaction big data set, obtaining and constructing a disturbance neighbor matrix according to the hidden enhancement coefficient and the privacy protection coefficient, and calculating a data disturbance sensitivity coefficient based on the disturbance neighbor matrix.
In the process of sharing the electric power big data, encryption processing is required to be carried out on sensitive information in the electric power big data, differential privacy protection is carried out on data with private information, specifically, for example, an owner of the electric power big data needs to send the data to a third party platform for sharing or carrying out data analysis, but the original data of the electric power big data cannot be directly sent to the third party platform, so that the encrypted ciphertext can be sent to the third party platform through a full homomorphic encryption algorithm, the third party platform can still carry out homomorphic operation on the ciphertext to obtain an analysis result of the electric power big data, and when the encrypted ciphertext is transmitted to the third party platform for carrying out data analysis processing, the probability that the accuracy of decrypting the data after the full homomorphic encryption processing is lower is higher as the sensitivity of the plaintext composed of the electric power big data is higher.
Furthermore, since the ciphertext after isomorphic encryption can perform homomorphic operation of addition and multiplication, noise is increased while the homomorphic operation of multiplication is realized. Therefore, noise parameters in the homomorphic encryption algorithm are adjusted according to the analysis result of the characteristics of the electric power big data, and the reduction of the accuracy of the electric power big data encryption caused by overlarge noise parameters is avoided. Specifically, a set of to-be-concealed processed data information corresponding to each power data sample in the power transaction big data set is used as a to-be-concealed data set of each power data sample, and a set of to-be-privacy-protected data corresponding to each power data sample is used as a privacy-protected data set.
Further, for any two electric power data samples in the electric power transaction big data set, using the Jacaded coefficient of the to-be-concealed data set between the two electric power data samples as the concealment enhancement coefficient of the two electric power data samples, wherein the greater the concealment enhancement coefficient is, the closer the to-be-concealed data information between the two electric power data samples is, and the degree of concealment processing needs to be enhanced; the Jaccard coefficient of the privacy protection data set between two electric power data samples is used as the privacy protection coefficient between the two electric power data samples, and the privacy protection data is the age, the electricity consumption and the account balance data of the user, so that the closer the privacy protection data are, the lower the degree of distinction between the data is, namely the greater the privacy protection coefficient is, the lower the sensitivity degree of the privacy protection data is; the method comprises the steps of taking a hiding enhancement coefficient between two electric power data samples as a numerator, taking the sum of a privacy protection coefficient between the two data samples and 0.01 as a denominator, taking the ratio of the numerator to the denominator as the hiding protection enhancement coefficient of the two data samples, wherein the larger the hiding protection enhancement coefficient is, the information to be hidden between the two data samples is close, the information difference to be privacy protected is larger, and the specific calculation process of the Jacard coefficient is a known technology and is not repeated.
Further, the input is a power transaction big data set, K (the size of which is checked to be 12) neighbor samples of each power data sample in the power transaction big data set are obtained by adopting a K neighbor algorithm, and a set formed by each power data sample and the corresponding K neighbor samples is used as a neighbor sample set of each power data sample. According to the method, a disturbance neighbor matrix is built according to a neighbor sample set of each power data sample in a power transaction big data set, specifically, for the neighbor sample set corresponding to each power data sample in the power transaction big data set, a hidden protection enhancement coefficient between each element and other elements in the neighbor sample set is used as a disturbance neighbor sequence of each element in the neighbor sample set according to a sequence formed by a small-to-big order, the disturbance neighbor sequence is used as one row of elements in the matrix, the matrix formed by all disturbance neighbor sequences corresponding to the neighbor sample set is used as a disturbance neighbor matrix of each power data sample, and the specific calculation process of a K neighbor algorithm is a known technology and is not repeated.
Further, the disturbance neighbor matrix of each power data sample in the power transaction big data set represents the sensitivity change degree of each power data sample between the data needing to be hidden and the data needing to be privacy protected, so that the data disturbance sensitivity coefficient between different power data samples is calculated according to the disturbance neighbor matrix of each power data sample in the power transaction big data set, and a specific calculation formula is as follows:
In the method, in the process of the invention,representing the/>, in a big dataset of power transactionsSum/>data disturbance sensitivity coefficients between the individual power data samples; /(I)And/>respectively represent the/>, in the big data set of the electric power transactionPerson, 5/>The/>, in the perturbed neighbor matrix of the individual power data samplesLine/>A vector of row elements; /(I)Representation/>And/>Cosine similarity between them; /(I)And/>respectively represent the/>, in the big data set of the electric power transactionPerson, 5/>rank of the disturbance neighbor matrix of the individual power data samples; /(I)An exponential function based on a natural constant; /(I)representing the/>, in a big dataset of power transactionsPerson, 5/>The number of rows of the perturbed neighbor matrix for each power data sample.
If the electric power trade is in the big data setSum/>The line element difference between the disturbance neighbor matrixes corresponding to the electric power data samples is larger, and the calculated/>The smaller the value of (2); at the same time, the first/>, in the big data set of the electric power transactionSum/>the distribution difference of the elements in the disturbance neighbor matrix corresponding to each power data sample is larger, and the distribution difference is calculatedthe larger the value of (1), namely the calculated power transaction big data set is the/>Sum/>Data disturbance sensitivity coefficient/>, between individual power data samplesthe larger the value of (c) represents the greater the value of (c) in the data set by power transactionSum/>Analysis of contrast of perturbed neighbor matrix corresponding to individual power data samples, first/>Sum/>the individual power data samples are close in terms of power data disturbance sensitivity.
So far, the data disturbance sensitivity coefficient is obtained.
and step S003, constructing a disturbance sensitive management quadtree according to the data disturbance sensitive coefficient, and calculating a noise sensitive management coefficient based on the disturbance sensitive management quadtree.
Taking each electric power data sample in the electric power transaction big data set as a node, taking a data disturbance sensitivity coefficient between different electric power data samples in the electric power transaction big data set as a weight of a connecting line between the corresponding different nodes, taking a weighted undirected graph formed by the weights of the nodes corresponding to all the electric power data samples in the electric power transaction big data set and the connecting line as a disturbance sensitivity weighted undirected graph of the electric power transaction big data set, inputting the disturbance sensitivity weighted undirected graph as the disturbance sensitivity weighted undirected graph, acquiring a clustering result of the disturbance sensitivity weighted undirected graph by adopting a Markov clustering algorithm, wherein each clustering cluster in the clustering result represents a node with similar data disturbance sensitivity degree, and the specific calculation process of the Markov clustering algorithm is a known technology and is not repeated.
Further, for each cluster in the clustering result of the disturbance sensitive weighted undirected graph of the large data set of the power transaction, a set formed by power data samples corresponding to all nodes in each cluster is used as a disturbance sensitive management sample set, and a disturbance sensitive management quadtree is constructed according to the disturbance management sample set. Specifically, for any two power data samples in the disturbance management sample set, performing exclusive or operation on elements at the same position in a disturbance neighbor matrix corresponding to the two power data samples, taking the result matrix of the exclusive or operation as a disturbance neighbor judgment matrix of the two power data samples, and constructing a quadtree according to the disturbance neighbor matrix.
Specifically, for example, the first column element in the disturbance neighbor judgment matrix of two power data samples isdividing every two elements, and converting the divided result into decimal numbers, wherein the divided result of the first column element is/>The result of the conversion is/>、/>、/>、/>、/>、/>According to the value of each element in the conversion result, nodes with the same value are sequentially searched in a quadtree, and each forked node in the quadtree is/>、/>、/>、then/>、/>、/>、/>、/>、/>The mapping result in the quadtree is the value/>, from the root nodeThe nodes of (a) start to grow downwards in sequence, and the final corresponding leaf node is the numerical value/>In the specific process of building the quadtree according to the first column element, as shown in fig. 2, all column elements in the perturbed neighbor judgment matrix are mapped into the quadtree, and statistics is performed on the starting point and the ending point of mapping each column element, for example, the conversion results of the two column elements in the perturbed neighbor judgment matrix are the same, and the data of the starting point and the ending point are/>At the corresponding root node/>Statistical quantity of places is/>Corresponding leaf node/>Statistical quantity of places is/>The counted number is sequentially increased according to the mapping number; and taking the mapping results of all column elements in the corresponding disturbance neighbor judgment matrix in the disturbance sensitive management sample set in the quadtree as a disturbance sensitive management quadtree of the disturbance sensitive management sample set, and reflecting the distribution condition of disturbance sensitivity degree of data of the disturbance sensitive management sample set through the disturbance sensitive management quadtree.
further, for the disturbance sensitivity management quadtree of each disturbance sensitivity management sample set corresponding to the disturbance sensitivity weighted undirected graph of the large data set of the electric power transaction, taking a sequence consisting of the statistical quantity corresponding to all root nodes in the disturbance sensitivity management quadtree as a disturbance sensitivity management basic quantity sequenceIf the distribution difference of the disturbance sensitive management basic quantity sequence is larger, the disturbance generated in the disturbance sensitive management data in the sample set is larger, and further, the sequence consisting of the quantity of all leaf nodes corresponding to each root node is taken as a disturbance sensitive management quantity sequence/>If the number of elements in the disturbance sensitive management number sequence is larger, the sensitivity distribution difference of the disturbance sensitive management sample set is larger; based on the analysis disturbance sensitive management basic quantity sequence/>Each element of the list corresponds to a disturbance sensitive management quantity sequence/>。
Further, the basic quantity sequence is managed according to disturbance sensitivityand disturbance sensitive management quantity sequence/>The corresponding relation between the noise sensitivity management sample sets analyzes the noise sensitivity influence degree of each disturbance sensitivity management sample set, and a noise sensitivity management coefficient is calculated according to the analysis result, wherein the specific calculation process of the noise sensitivity management coefficient is as follows:
In the method, in the process of the invention,representing disturbance sensitive management basis quantity sequence/>Middle/>Noise sensitivity influence coefficients of the individual elements; /(I)representing disturbance sensitive management basis quantity sequence/>Middle/>Disturbance sensitive management quantity sequence corresponding to each element,/>Representation/>Maximum value of (2); /(I)Middle/>The values of the individual elements; /(I)Representation/>The number of data in (a);
Disturbance sensitive weighted undirected graph representing large data sets of power transactionsnoise sensitivity management coefficient of each disturbance sensitivity management sample set,/>Disturbance sensitive weighted undirected graph representing large data sets of power transactionsdisturbance-sensitive management base quantity sequence of a disturbance-sensitive management sample set,/>Representation/>Maximum value of (2); /(I)Representation/>the number of elements in (a).
if the disturbance sensitive weighted undirected graph of the large data set of the electric power transaction corresponds to the firstThe disturbance sensitive management quadtree of each disturbance sensitive management sample set is in local divergence distribution, and the calculated/>And/>The larger the value of (2), i.e. disturbance-sensitive management base quantity sequence/>Middle/>noise sensitivity influence coefficient of individual element/>At the same time/>the disturbance sensitive management quadtrees of the disturbance sensitive management sample sets are integrally and intensively distributed, and the calculated/>The larger the value of (2), namely the calculated disturbance sensitive management basic quantity sequence/>Middle/>noise sensitivity influence coefficient of individual element/>The larger the value of (c) represents the disturbance-sensitive weighted undirected graph corresponding to the large dataset of power transactionsThe data disturbance sensitivity of each disturbance sensitive management sample set is close, but the distribution difference of the whole sensitivity is larger, and the noise adding degree needs to be properly increased.
The method has the advantages that the disturbance sensitivity degree analysis accuracy of the disturbance sensitivity weighted undirected graph clustering result of the electric power transaction large data set for adding noise to the data is accurately reflected by considering the disturbance sensitivity degree of different data in the electric power transaction large data set.
Thus, the noise sensitivity management coefficient is obtained.
step S004, the noise sensitivity of the power data is obtained according to the noise sensitivity management coefficient, and the fully homomorphic encryption result of the power data is obtained based on the noise sensitivity of the power data.
All power data samples of each disturbance sensitive management sample set corresponding to the disturbance sensitive weighted undirected graph of the power transaction big data set are used as a group of dynamic encryption data, a set formed by noise sensitive management coefficients of all disturbance sensitive management sample sets corresponding to the power transaction big data set is used as a noise sensitive management quantization set, the noise sensitive management quantization set is input as the noise sensitive management quantization set, a normalization result of the noise sensitive management quantization set is obtained by adopting a maximum minimum normalization algorithm, a value corresponding to the normalization result of the noise sensitive management coefficients of each disturbance sensitive management sample set in the noise sensitive management quantization set is used as the power data noise sensitivity of each disturbance sensitive management sample set, namely, each group of dynamic encryption data of the power transaction big data set has the corresponding power data noise sensitivity, and the detailed calculation process of the maximum minimum normalization algorithm is known technology and is not repeated.
Further, noise is added to the data in the power transaction large data set according to the power noise sensitivity of each group of dynamically encrypted data in the power transaction large data set. Specifically, all groups of dynamic encryption data of the large electric power transaction data set and corresponding electric power noise sensitivity are used as inputs of an isomorphic encryption algorithm, an isomorphic encryption result of the large electric power transaction data set is obtained, the isomorphic encryption result is transmitted to a third party platform, leakage of sensitive information of a user in the large electric power transaction data set is avoided, and a specific calculation process of the isomorphic encryption algorithm is a known technology and is not repeated.
In this specification, each embodiment is described in a progressive manner, and identical and similar parts of each embodiment are all referred to each other, and each embodiment mainly describes differences from other embodiments. The above description is only of the preferred embodiments of the present application and is not intended to limit the application, but any modifications, equivalent substitutions, improvements, etc. within the principles of the present application should be included in the scope of the present application.