[1]邓海生,刘啸,李军怀,等.基于时间约束的隐私保护数据查询方法研究[J].计算机技术与发展,2013,(10):119-122.
 DENG Hai-sheng[],LIU Xiao[],LI Jun-huai[],et al.Research on Privacy Preserving Data Query Method Based on Time-constrained[J].,2013,(10):119-122.
点击复制

基于时间约束的隐私保护数据查询方法研究()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
期数:
2013年10期
页码:
119-122
栏目:
安全与防范
出版日期:
1900-01-01

文章信息/Info

Title:
Research on Privacy Preserving Data Query Method Based on Time-constrained
文章编号:
1673-629X(2013)10-0119-04
作者:
邓海生1刘啸2李军怀2王珊歌2
[1]西京学院 教务处;[2]西安理工大学 计算机科学与工程学院
Author(s):
DENG Hai-sheng[1]LIU Xiao[2]LI Jun-huai[2]WANG Shan-ge[2]
关键词:
隐私保护时间约束数据共享数据查询
Keywords:
privacy preservingtime-constraineddata sharingdata query
文献标志码:
A
摘要:
很多学者和机构在研究隐私保护的分布数据挖掘方法时,通过挖掘全局数据以保护各站点数据的隐私和安全。但是这些方法假设数据集成已经完成,隐私保护数据挖掘处理的是集成问题解决后的知识获取问题。因此,在隐私保护数据处理之前的数据集成中,如何保护来源数据的隐私信息,是一个必须解决的问题。文章在考虑数据的时效性因素下,提出了一种采用Shamir's秘密共享方法的时间约束隐私保护数据查询方法,重点介绍了时间约束下隐私保护数据集成与共享中的聚集操作方法。实验结果表明文中方法可以有效提高隐私保护数据查询的效率,大大降低隐私保护数据查询的响应时间
Abstract:
Many scholars and institutions protect the site data privacy and security through the global data mining in the research of distrib-uted data privacy protection. But these methods assume that the data integration has been completed,processing of privacy preserving data mining is the problem of obtaining knowledge after the integrated problem solving. Therefore,before the privacy preserving data process-ing in data integration,how to protect the privacy information of data sources is a problem that must be solved. Propose a privacy-preser-ving data sharing method applied the Shamir's secret sharing method with time-constrained. Some basic operations utilized this method for the privacy preserving and data integration and sharing,such as intersection,join and aggregation,are emphatically illustrated. The ex-perimental results demonstrate that this method is effective and greatly improves the efficiency and significantly reduce response time of the privacy-preserving data query

相似文献/References:

[1]李秋敬 刘广亮 谢圣献 张沙沙 段海霞 许宏伟.基于时间约束的角色访问控制模型研究[J].计算机技术与发展,2009,(08):162.
 LI Qiu-jing,LIU Gang-liang,XIE Sheng-xian,et al.Temporal Role- Based Access Control Model[J].,2009,(10):162.
[2]耿波 仲红 徐杰 闫娜娜.隐私保护的关联规则挖掘研究[J].计算机技术与发展,2009,(02):81.
 GENG Bo,ZHONG Hong,XU Jie,et al.Study on Privacy- Preserving Association Rule Mining[J].,2009,(10):81.
[3]张瑞 郑诚 陈娟娟.关联规则挖掘中的隐私保护研究[J].计算机技术与发展,2008,(10):13.
 ZHANG Rui,ZHENG Cheng,CFIEN Juan-juan.Research on Privacy Preserving in Association Rules Mining[J].,2008,(10):13.
[4]张新华 陈军冰.时间约束的RBAC模型及应用[J].计算机技术与发展,2007,(06):246.
 ZHANG Xin-hua,CHEN Jun-bing.Time- Constraint RBAC Model and Its Application[J].,2007,(10):246.
[5]杨晶 张永胜 孙翠翠 王莹.基于时间约束和上下文的访问控制模型研究[J].计算机技术与发展,2011,(01):143.
 YANG Jing,ZHANG Yong-sheng,SUN Cui-cui,et al.Access Control Model Based on Time-constraint and Context[J].,2011,(10):143.
[6]李玲娟 郑少飞.基于数据处理的数据挖掘隐私保护技术分析[J].计算机技术与发展,2011,(03):94.
 LI Ling-juan,ZHENG Shao-fei.Analysis of Data Mining Privacy Preserving Technology Based on Data Processing[J].,2011,(10):94.
[7]杜定宇 王茜.一种基于中间代理的个性化推荐系统[J].计算机技术与发展,2011,(09):66.
 DU Ding-yu,WANG Qian.An Agent-Based Personalized Recommendation System[J].,2011,(10):66.
[8]杨宸 薛丹 周健.带空间特性的访问控制在汽车终端上的应用[J].计算机技术与发展,2012,(01):225.
 YANG Chen,XUE Dan,ZHOU Jian.Application of Role-Based Access Control with Spatial Character in Automobile Terminal[J].,2012,(10):225.
[9]黄妮 吴晓军.基于时间约束的软件工程资源配置Petri网检测模型[J].计算机技术与发展,2012,(04):21.
 HUANG Ni,WU xiao-jun.Petri Net Detecting Model of Software Engineering Resource Configuration Based on Time Constraint[J].,2012,(10):21.
[10]韦琳 许峰.医疗网格隐私保护技术研究[J].计算机技术与发展,2012,(05):254.
 WEI Lin,XU Feng.Privacy Preservation in Heaithgrid:A Survey[J].,2012,(10):254.

更新日期/Last Update: 1900-01-01