Computer Science ›› 2025, Vol. 52 ›› Issue (11A): 241200047-8.doi: 10.11896/jsjkx.241200047

• Information Security • Previous Articles     Next Articles

Information Level Inference Method for Data Aggregation Based on Granular Association

LI Jinhui1, CAO Lifeng2, WANG Xiaoqin2, BAI Jinlong2, CHEN Yang2   

  1. 1 Henan Provincial Key Laboratory of Information Security,Zhengzhou 450000,China
    2 China Electronics Technology Group Corporation Seventh Research Institute,Guangzhou 510277,China
  • Online:2025-11-15 Published:2025-11-10

Abstract: To address the issue of sensitive information leakage through the existence of big data aggregation,this study analyzes the correlation between data deeply and proposes an information level inference method for data aggregation based on granular association.The method mines highly associated data objects based on the dependencies of data attributes,and then deduces the possibility of inferring highly sensitive information from data aggregation when users access the multi-information system based on the fuzzy set possibility measurement of the sensitivity level of the associated attributes of the data objects.This approach aids in establishing access policies for users,controlling the control the analysis of associated data,and reducing the risk of information leakage.

Key words: Data analysis, Granular association, Association rules, Aggregation inference, Information leakage

CLC Number: 

  • TP309
[1]WENBO Z,XIAOTONG H,ZHENSHAN B.A secure and efficient multi-domain data sharing model on consortium chain[J].The Journal of Supercomputing,2022,79(8):8538-8582.
[2]SALEHI A S,RUDOLPH C,GROBLERM.A Dynamic Cross-Domain Access Control Model for Collaborative Healthcare Application[C]//2019 IFIP/IEEE Symposium on Integrated Network and Service Management.2019:643-638.
[3]POLTAVTSEV A A,KHABAROV R A,SELYANKINO A.Inference Attacks and Information Security in Databases[J].Automatic Control and Computer Sciences,2021,54(8):829-833.
[4]POLTAVTSEV A A,KHABAROV R A,SELYANKINO A.Comparative Analysis of Methods for Protection against Logical Inference[J].Automatic Control and Computer Sciences,2022,55(8):984-990.
[5]CAO L F,CHEN X Y,DU X H,et al.A Level Inference Method for Aggregated Information of Objects Based on Associated Attributes[J].ACTA Electronica Sinca,2013,41(7):1442-1447.
[6]CAO L F,CHEN X Y,DU X H,et al.A Level Inference Method for Aggregated Information of Objects Based on Clustering Analysis[J].Journal of Electronics & Information Technology,2012,34(6):1432-1437.
[7]LIU T,WANG Z J,LIU Y,et al.Data inference:data leakage paradigms and defense methods in cyber-physical systems[J].Scientia SincaInformationis,2023,53(11):2152-2179.
[8]HAO L,WANG T,GUO C.Research on parallel associationrule mining of big data based on an improved K-means clustering algorithm[J].International Journal of Autonomous and Adaptive Communications Systems,2023,16(3):233-247.
[9]LIU X,ZHANG Z,ZHANG G.Using improved feature extraction combined with RF-KNN classifier to predict coal and gas outburst[J].Journal of Intelligent & Fuzzy Systems,2023,44(1):237-250.
[10]LU B,FAN Q,ZHOU X L,et al.A multimodal multi-label classification method based on hypergraph[J].Computer Enginee-ring & Science,2024,46(9):1667-1674.
[11]GAO Y,ZHANG Z,LIN H,et al.Hypergraph learning:Methods and practices[J].IEEE Transactions on Pattern Analysis and Machine Intelligence,2020,44(5):2548-2566.
[12]WANG Y,ZHAO E,WANG W.A Knowledge Graph Completion Method Based on Fusing Association Information[J].IEEE Access,2022,10:50500-50507.
[13]HU X C,LI Y,CHEN Z J,et al.Review of research of granular fuzzy rule-based modeling[J].CAAI Transactions on Intelligent Systems,2024,19(1):22-35.
[14]LIN A J,ZHANG M T.Differential privacy protection based on multi-granularity data[J].Journal of Soochow University(Philosophy and Social Sciences),2024,45(2):182-192.
[15]CAO L,LU X,GAO Z,et al.An Information Sensitivity Infe-rence Method for Big Data Aggregation Based on Granular Analysis[C]//2019 Big Data.2019.
[1] ZHAO Yining, WANG Xiaoning, NIU Tie, ZHAO Yi, XIAO Haili. Node Failure and Anomaly Prediction Method for Supercomputing Systems [J]. Computer Science, 2025, 52(9): 128-136.
[2] LI Ruiyang, LI Shuyi, YANG Yuexi, PENG Chuhan, XING Jingyu, QIAO Gaoxiu. Research on Portfolio Construction Based on Topological Structure Features [J]. Computer Science, 2025, 52(10): 13-21.
[3] MAO Xin, LEI Zhanyao, QI Zhengwei. Automated Kaomoji Extraction Based on Large-scale Danmaku Texts [J]. Computer Science, 2024, 51(1): 284-294.
[4] YANG Heng, ZHU Yan. Analysis of Academic Network Based on Graph OLAP [J]. Computer Science, 2023, 50(6A): 220100237-5.
[5] XU Xia, ZHANG Hui, YANG Chunming, LI Bo, ZHAO Xujian. Fair Method for Spectral Clustering to Improve Intra-cluster Fairness [J]. Computer Science, 2023, 50(2): 158-165.
[6] SHA Yuji, WANG Xin, HE Yanxiao, ZHONG Xueyan, FANG Yu. Mining and Application of Frequent Patterns with Counting Quantifiers [J]. Computer Science, 2023, 50(11A): 230100041-12.
[7] XU Ming-yue. Study on Information Sharing and Channel Strategy of Platform in Consideration ofInformation Leakage and Information Investing Cost [J]. Computer Science, 2022, 49(6A): 744-752.
[8] CAO Yang-chen, ZHU Guo-sheng, SUN Wen-he, WU Shan-chao. Study on Key Technologies of Unknown Network Attack Identification [J]. Computer Science, 2022, 49(6A): 581-587.
[9] CONG Ying-nan, WANG Zhao-yu, ZHU Jin-qing. Insights into Dataset and Algorithm Related Problems in Artificial Intelligence for Law [J]. Computer Science, 2022, 49(4): 74-79.
[10] DONG Yun-xin, LIN Geng, ZHANG Qing-wei, CHEN Ying-ting. Recommendation Algorithm Based on Apriori Algorithm and Improved Similarity [J]. Computer Science, 2022, 49(11A): 211000005-5.
[11] JIANG Hao-chen, WEI Zi-qi, LIU Lin, CHEN Jun. Imbalanced Data Classification:A Survey and Experiments in Medical Domain [J]. Computer Science, 2022, 49(1): 80-88.
[12] YU Yue-zhang, XIA Tian-yu, JING Yi-nan, HE Zhen-ying, WANG Xiao-yang. Smart Interactive Guide System for Big Data Analytics [J]. Computer Science, 2021, 48(9): 110-117.
[13] WU Guang-zhi, GUO Bin, DING Ya-san, CHENG Jia-hui, YU Zhi-wen. Cognitive Mechanisms of Fake News [J]. Computer Science, 2021, 48(6): 306-314.
[14] XU Hui-hui, YAN Hua. Relative Risk Degree Based Risk Factor Analysis Algorithm for Congenital Heart Disease in Children [J]. Computer Science, 2021, 48(6): 210-214.
[15] SHEN Xia-jiong, YANG Ji-yong, ZHANG Lei. Attribute Exploration Algorithm Based on Unrelated Attribute Set [J]. Computer Science, 2021, 48(4): 54-62.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!