Computer Science ›› 2019, Vol. 46 ›› Issue (10): 148-153.doi: 10.11896/jsjkx.190100050

• Information Security • Previous Articles     Next Articles

Big Data Oriented Privacy Disclosure Detection Method for Information Release

KE Chang-bo1,2, HUANG Zhi-qiu2, WU Jia-yu1   

  1. (School of Computer Science,Nanjing University of Posts and Telecommunications,Nanjing 210003,China)1
    (College of Computer Science and Technology,Nanjing University of Aeronautics and Astronautics,Nanjing 210016 China)2
  • Received:2019-01-07 Revised:2019-04-09 Online:2019-10-15 Published:2019-10-21

Abstract: In order to prevent cloud services from illegally acquiring user’s personal sensitive privacy information,this paper proposed a privacy information publishing detection and protection method for big data.Firstly,the user’s privacy data are classified,and the similarity and the disclosure cost of privacy data are measured respectively.Secondly,accor-ding to the similarity and the disclosure cost,this method detectes whether privacy data required by cloud services contain disclosure chain and key privacy data.Thirdly,continuous privacy datasets,including disclosure chains and key privacy data are decomposed.At the same time,discrete datasets are prevented from being composed into continuous datasets,which do not contain disclosure chains and key privacy data.At last,privacy data chains between discrete privacy datasets and original privacy datasets are discovered by experiment.In terms of precision and recall,the precision of Exact filter is 57% lower than that of non-discrete data sets,while the recall rate is less than 17%.Therefore,the proposed method achieves the purpose of protecting user’s sensitivity privacy information.

Key words: Big data, Key privacy data, Privacy disclosure chain, Privacy enhancement, Privacy release detection

CLC Number: 

  • TP399
[1]SNIJDERS C,MATZAT U,REIPS U D.“Big Data”:big gaps of knowledge in the field of internet science[J].International Journal of Internet Science,2012,7(1):1-5.
[2]DU J,JIANG C,CHEN K C,et al.Community-structured evolutionary game for privacy protection in social networks[J].IEEE Transactions on Information Forensics and Security,2018,13(3):574-589.
[3]HUGUENIN K,BILOGREVIC I,MACHADO J S,et al.A predictive model for user motivation and utility implications of privacy-protection mechanisms in location check-ins[J].IEEE Transactions on Mobile Computing,2018,17(4):760-774.
[4]PENG H F,HUANG Z Q,FAN D J,et al.Specification and Verification of User Privacy Requirements for Service Composition[J].Journal of Software,2016,27(8):1948-1963.(in Chinese)
彭焕峰,黄志球,范大娟,等.面向服务组合的用户隐私需求规约与验证方法[J].软件学报,2016,27(8):1948-1963.
[5]LIU X Y,WANG B,YANG X C.Survey on Privacy Preserving Techniques for Publishing Social Network Data[J].Journal of Software,2014,25(3):576-590.(in Chinese)
刘向宇,王斌,杨晓春.社会网络数据发布隐私保护技术综述[J].软件学报,2014,25(3):576-590.
[6]ZHANG Y X,HE J S,ZHAO B, et al.A Privacy Protection Model Base on Game Theory [J].Chinese Journal of Compu-ters,2016,39(3):615-627.(in Chinese)
张伊璇,何泾沙,赵斌,等.一个基于博弈理论的隐私保护模型[J].计算机学报,2016,39(3):615-627.
[7]WU D,SI S,WU S,et al.Dynamic trust relationships aware data privacy protection in mobile crowd-sensing[J].IEEE Internet of Things Journal,2018,5(4):2958-2970.
[8]XIAO Z,YANG J J,HUANG M,et al.QLDS:A Novel Design Scheme for Trajectory Privacy Protection with Utility Guarantee in Participatory Sensing[J].IEEE Transactions on Mobile Computing,2018,17(6):1397-1410.
[9]KE C B,HUANG Z,LI W,et al.Service Outsourcing Character Oriented Privacy Conflict Detection Method in Cloud Computing[J].Journal of Applied Mathematics,2014,2014:1-11.
[10]GU L,CHEUNG S C.Constructing and testing privacy aware services in cloud computing environment:Challenges and opportunities[C]//Proceedings of the 1st Asia-Pacific Symposium on Internet ware.New York:ACM,2009:1-10.
[11]NI W W,CHONG Z H.Clustering-oriented privacy-preserving data publishing[J].Knowledge-Based Systems,2012,35: 264-270.
[12]POLATIDIS N,GEORGIADIS C K,PIMENIDIS E,et al.Priva-cy-preserving collaborative recommendations based on random perturbations[J].Expert Systems with Applications,2017,71:18-25.
[13]YE M,WU X,HU X,et al.Anonymizing classification data using rough set theory[J].Knowledge-Based Systems,2013,43:82-94.
[14]LI S,ZHANG X,QIAN Z,et al.Key based Artificial Fingerprint Generation for Privacy Protection[J].IEEE Transactions on Dependable and Secure Computing,2018,PP(99):1-1.
[15]GAI K,CHOO K K R,QIU M,et al.Privacy-preserving con-tent-oriented wireless communication in internet-of-things[J].IEEE Internet of Things Journal,2018,5(4):3059-3067.
[1] CHEN Jing, WU Ling-ling. Mixed Attribute Feature Detection Method of Internet of Vehicles Big Datain Multi-source Heterogeneous Environment [J]. Computer Science, 2022, 49(8): 108-112.
[2] HE Qiang, YIN Zhen-yu, HUANG Min, WANG Xing-wei, WANG Yuan-tian, CUI Shuo, ZHAO Yong. Survey of Influence Analysis of Evolutionary Network Based on Big Data [J]. Computer Science, 2022, 49(8): 1-11.
[3] SUN Xuan, WANG Huan-xiao. Capability Building for Government Big Data Safety Protection:Discussions from Technologicaland Management Perspectives [J]. Computer Science, 2022, 49(4): 67-73.
[4] WANG Mei-shan, YAO Lan, GAO Fu-xiang, XU Jun-can. Study on Differential Privacy Protection for Medical Set-Valued Data [J]. Computer Science, 2022, 49(4): 362-368.
[5] WANG Jun, WANG Xiu-lai, PANG Wei, ZHAO Hong-fei. Research on Big Data Governance for Science and Technology Forecast [J]. Computer Science, 2021, 48(9): 36-42.
[6] YU Yue-zhang, XIA Tian-yu, JING Yi-nan, HE Zhen-ying, WANG Xiao-yang. Smart Interactive Guide System for Big Data Analytics [J]. Computer Science, 2021, 48(9): 110-117.
[7] WANG Li-mei, ZHU Xu-guang, WANG De-jia, ZHANG Yong, XING Chun-xiao. Study on Judicial Data Classification Method Based on Natural Language Processing Technologies [J]. Computer Science, 2021, 48(8): 80-85.
[8] WANG Xue-cen, ZHANG Yu, LIU Ying-jie, YU Ge. Evaluation of Quality of Interaction in Online Learning Based on Representation Learning [J]. Computer Science, 2021, 48(2): 207-211.
[9] TENG Jian, TENG Fei, LI Tian-rui. Travel Demand Forecasting Based on 3D Convolution and LSTM Encoder-Decoder [J]. Computer Science, 2021, 48(12): 195-203.
[10] ZHANG Yu-long, WANG Qiang, CHEN Ming-kang, SUN Jing-tao. Survey of Intelligent Rain Removal Algorithms for Cloud-IoT Systems [J]. Computer Science, 2021, 48(12): 231-242.
[11] LIU Ya-chen, HUANG Xue-ying. Research on Creep Feature Extraction and Early Warning Algorithm Based on Satellite MonitoringSpatial-Temporal Big Data [J]. Computer Science, 2021, 48(11A): 258-264.
[12] ZHANG Guang-jun, ZHANG Xiang. Mechanism and Path of Optimizing Institution of Legislative Evaluation by Applying “Big Data+Blockchain” [J]. Computer Science, 2021, 48(10): 324-333.
[13] YE Ya-zhen, LIU Guo-hua, ZHU Yang-yong. Two-step Authorization Pattern of Data Product Circulation [J]. Computer Science, 2021, 48(1): 119-124.
[14] ZHAO Hui-qun, WU Kai-feng. Big Data Valuation Algorithm [J]. Computer Science, 2020, 47(9): 110-116.
[15] MA Meng-yu, WU Ye, CHEN Luo, WU Jiang-jiang, LI Jun, JING Ning. Display-oriented Data Visualization Technique for Large-scale Geographic Vector Data [J]. Computer Science, 2020, 47(9): 117-122.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!