Privacy protection method for contingency table data dissemination

A technology for data publishing and privacy protection, applied in digital data protection, electronic digital data processing, special data processing applications, etc., can solve problems such as low flexibility, low accuracy, and inability to guarantee data consistency, and achieve flexibility The effect of high, high precision and usability

Active Publication Date: 2014-12-17
HUAZHONG UNIV OF SCI & TECH
View PDF3 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The method of directly adding noise cannot guarantee data consistency, and the accuracy is low; the algorithm speed is a bottleneck in the linear conversion of reversible deformation
And these methods are not very flexible, once the query function or query conditions change, the algorithm needs to be redesigned

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privacy protection method for contingency table data dissemination
  • Privacy protection method for contingency table data dissemination
  • Privacy protection method for contingency table data dissemination

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention. In addition, the technical features involved in the various embodiments of the present invention described below can be combined with each other as long as they do not constitute a conflict with each other.

[0032] figure 1 Shown is the overall flow chart of the privacy protection method for publishing contingency table data of the present invention, including the following steps:

[0033] Step 1: Input the contingency table T (m rows×n columns) and parameter ε (indicating user-defined security parameters, ε≥0), and determine the replacement base of each group T(a,i) of the contingency table T Φ(a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a privacy protection method for contingency table data dissemination and belongs to the field of privacy protection of computer data. The privacy protection method comprises the following steps: determining an initial replacement base number and a final replacement base number of each group in a contingency table; recording random replacement of a sensitive value based on an index mechanism; repeatedly calculating each replaced group and outputting a new contingency table. According to the privacy protection method, the processed contingency table meets safety requirements of epsilon-difference privacy; meanwhile, inquires supported by any meta-data are supported; processed data errors are small and the accuracy is high so that the data availability is stronger.

Description

technical field [0001] The invention belongs to the technical field of computer data privacy protection, and more specifically relates to a privacy protection method for publishing contingency table data. Background technique [0002] The privacy protection technology of data publishing is a research hotspot in the field of data mining in recent years. With the advent of the era of big data, more and more data are being collected and analyzed by some statistical agencies. Sometimes, these agencies will release some data for use by third parties, and these data may contain some sensitive information of the data collected, such as a patient suffering from a certain disease. Therefore, publishing these data directly will cause the privacy of the data collectors to leak. In order to protect the privacy of the data collectors, the data issuer must take privacy protection measures. [0003] Contingency Table refers to a frequency table listed when data is classified by two or m...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F17/30G06F21/60
CPCG06F16/35G06F21/6245
Inventor 丁晓锋金海欧洋伶
Owner HUAZHONG UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products