Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A personalized privacy-preserving method for multi-view clustering mining

A technology of cluster mining and privacy protection, applied in the field of information security, can solve problems such as the degree of personalization needs to be improved, privacy security issues not involved in cluster mining, and large information loss

Active Publication Date: 2020-11-20
HARBIN ENG UNIV
View PDF12 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] (1) Existing algorithms are almost designed for the needs of data release, and have not been involved in privacy and security issues that may be caused by cluster mining;
[0008] (2) The existing personalized privacy protection algorithm does not comprehensively consider the differences in the privacy awareness of users and the importance of different attributes, the degree of personalization needs to be improved, and the information loss is relatively large

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A personalized privacy-preserving method for multi-view clustering mining
  • A personalized privacy-preserving method for multi-view clustering mining
  • A personalized privacy-preserving method for multi-view clustering mining

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] For the original data model A=(A 1 ,A 2 ,...,A n ) under a piece of data is expressed as d=(a 1 ,a 2 ,...,a n ), where a i is the attribute of the data, if i exists, (i=1,2,...,n) makes a i If it is sensitive and does not want others to know, then this record d is called a piece of private data, and the quantitative expression of the sensitivity of the data producer to the private data item is called the degree of privacy. Given the original data pattern A=(A 1 ,A 2 ,...,A n ), the corresponding privacy mode is S=(S 1 ,S 2 ,...,S n ), then the privacy data model is defined as sequence pair , and a piece of privacy data under this model is expressed as n recombination d=(d 1 , d 2 ,...,d n ), where d i =i ,s i > is an ordered binary group, a i for attribute A i Corresponding to a raw data value, s i for a i corresponding degree of privacy. another note d j =(a j1 ,a j2 ,...,a jn ) is the original data mode A=(A 1 ,A 2 ,...,A n ) of the jth tup...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a personalized privacy protection method for multi-view cluster mining, which belongs to the technical field of information security. The present invention proposes a privacy partial order topology classification algorithm (PT, Privacy Topology). Aiming at the sensitivity difference representation problem of different privacy data, first define the privacy relationship and construct a privacy partial order set, and then design a topology classification algorithm for privacy data to solve the privacy line Prologue. For multiple views of privacy data, multi-view clustering is performed on views such as raw data, privacy degree, tuple sensitivity, and privacy line sequence set. A clustering-oriented personalized anonymous algorithm (PPOC, Personal Privacy Oriented Classtering) is proposed, through the variable k-anonymous strategy, using the privacy protection algorithm oriented to multi-view clustering to meet the individual needs, to realize the classification of different clusters and the same Different tuples within the cluster impose different degrees of personalized protection operations.

Description

technical field [0001] The invention relates to a personalized privacy protection method for multi-view cluster mining, and relates to the technical field of information security. Background technique [0002] With the development of digital technologies such as the Internet, the Internet of Things, and smart cities, various data collection devices such as sensors and mobile terminals store various information about human clothing, food, housing, and transportation in digital form, thus giving birth to the era of big data. For the first time, data, as a resource, has received great attention from social entities such as governments, enterprises, and academia. [0003] However, in the process of data use, personal privacy information may be leaked. In the process of discovering the potential value of data, how to protect the privacy of individuals, especially how to avoid privacy leakage caused by data mining, is a key issue that data science needs to solve urgently. Privat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/62G06K9/62
CPCG06F21/6254G06F18/23G06F18/24
Inventor 徐东李贤张子迎孟宇龙张朦朦姬少培王岩俊吕骏方一成王杰
Owner HARBIN ENG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products