Differential Privacy Technology of Big Data Information Security based on ACA-DMLP

被引:0
|
作者
Han, Yubiao [1 ]
Wang, Lei [1 ]
He, Dianhong [1 ]
机构
[1] Shandong Informat Technol Ind Dev, Res Inst, Jinan 250014, Shandong, Peoples R China
关键词
-Big data; cloud computing; information security; distributed machine learning; differential privacy algorithms; CLOUD; PROTOCOL;
D O I
10.14569/IJACSA.2022.0130905
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
computing and artificial intelligence have a deeper and closer connection with daily life. To ensure information security, most companies or individuals choose to pay a simple fee to store a large amount of data on cloud servers and hand over a large number of complex calculations of machine learning to cloud servers. To eliminate the security risks of data stored in the cloud and ensure that private data is not leaked, this paper proposes a collusion-resistant distributed machine learning scheme. Through homomorphic encryption algorithm and differential privacy algorithm, the security of data and model in machine learning framework is guaranteed. The distributed machine learning framework is adopted to reduce the data computing time and improve the data training efficiency. The simulation results show that the computational efficiency is improved while the user privacy security is guaranteed. The accuracy of model training is not reduced due to the improvement of privacy data security and computational efficiency. Through this study, we can further propose effective measures for the privacy protection of outsourced data and the data integrity of machine learning, which is of great significance to the security research of cloud intelligent big data.
引用
收藏
页码:45 / 52
页数:8
相关论文
共 50 条
  • [21] The Study of Privacy Preserving Data Mining Technology for Information Security
    Li, Heng
    Wu, Xuefang
    MECHATRONICS ENGINEERING, COMPUTING AND INFORMATION TECHNOLOGY, 2014, 556-562 : 3532 - 3535
  • [22] Big Data Security and Privacy Protection
    Zhang, Dongpo
    PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON MANAGEMENT AND COMPUTER SCIENCE (ICMCS 2018), 2018, 77 : 275 - 278
  • [23] Big Data security and privacy: A review
    Bardi, Matturdi
    Zhou Xianwei
    Li Shuai
    Lin Fuhong
    CHINA COMMUNICATIONS, 2014, 11 (02) : 135 - 145
  • [24] Clouding Big Data: Information Privacy Considerations
    Gathegi, John N.
    CHALLENGES OF INFORMATION MANAGEMENT BEYOND THE CLOUD, 2014, 423 : 64 - 69
  • [25] Clouding big data: Information privacy considerations
    Gathegi, John N.
    Communications in Computer and Information Science, 2014, 423 : 64 - 69
  • [26] Privacy and security in the big data paradigm
    Sun, Zhaohao
    Strang, Kenneth David
    Pambel, Francisca
    JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2020, 60 (02) : 146 - 155
  • [27] Big Data security and privacy techniques
    El Haourani, Lamia
    Kalam, Anas Abou El
    Ouahman, Abdellah Ait
    3RD INTERNATIONAL CONFERENCE ON NETWORKING, INFORMATION SYSTEM & SECURITY (NISS'20), 2020,
  • [28] Challenges and techniques in Big data security and privacy: A review
    Bao, Rongxin
    Chen, Zhikui
    Obaidat, Mohammad S.
    SECURITY AND PRIVACY, 2018, 1 (04):
  • [29] Analysis of security and privacy issues of information management of big data in B2B based healthcare systems
    Gupta, Brij B.
    Gaurav, Akshat
    Panigrahi, Prabin Kumar
    JOURNAL OF BUSINESS RESEARCH, 2023, 162
  • [30] Research On Solutions To Privacy Security Problems Based On Big Data
    Liu Hongling
    2019 11TH INTERNATIONAL CONFERENCE ON MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION (ICMTMA 2019), 2019, : 585 - 588