Aggregation Encryption Method of Social Network Privacy Data Based on Matrix Decomposition Algorithm

被引:4
作者
Bi, Hongjing [1 ]
机构
[1] Tangshan Normal Univ, Dept Comp Sci, Tangshan 063000, Peoples R China
关键词
Matrix decomposition; Social network; Privacy data; Aggregate encryption; Shamir threshold segmentation;
D O I
10.1007/s11277-021-08268-8
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Currently, there are some defects in data aggregation encryption methods, such as low accuracy and efficiency. In this regard, this paper proposes an aggregation encryption method of social network privacy data based on matrix decomposition. Shamir threshold segmentation scheme was used to improve the security of matrix decomposition results, and then re-encrypted network user attributes. For codomain and non-codomain users, private file and key generation technology were used to improve the privacy of users in common domain and non-common domain. Considering the results of matrix decomposition, privacy security and efficient user matching in social networks were implemented. The node information was embedded in the process of data encryption and signature, and the interference factors were classified by cluster as a unit, which can resist the internal attack and improve the operation efficiency. The experimental results show that this method has excellent encryption effect and high privacy data protection processing efficiency.
引用
收藏
页码:369 / 383
页数:15
相关论文
共 15 条
[1]   Reducing the Required Time and Power for Data Encryption and Decryption Using K-NN Machine Learning [J].
Bokhari, Mohammad Ubaidullah ;
Shallal, Qahtan Makki ;
Tamandani, Yahya Kord .
IETE JOURNAL OF RESEARCH, 2019, 65 (02) :227-235
[2]  
Cao LC, 2020, CHINA COMMUN, V17, P153, DOI 10.23919/JCC.2020.06.013
[3]   A Blockchain-Based Searchable Public-Key Encryption With Forward and Backward Privacy for Cloud-Assisted Vehicular Social Networks [J].
Chen, Biwen ;
Wu, Libing ;
Wang, Huaqun ;
Zhou, Lu ;
He, Debiao .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (06) :5813-5825
[4]   Polynomial matrix decompositions and semi-blind channel estimation for MIMO frequency-selective channels [J].
Hassan, Diyari ;
Redif, Soydan ;
Lambotharan, Sangarapillai .
IET SIGNAL PROCESSING, 2019, 13 (03) :356-366
[5]   A combined public-key scheme in the case of attribute-based for wireless body area networks [J].
Hong, Jiaojiao ;
Liu, Bo ;
Sun, Qianyuan ;
Li, Fagen .
WIRELESS NETWORKS, 2019, 25 (02) :845-859
[6]   Semi-quantum noise randomized data encryption based on an amplified spontaneous emission light source [J].
Jiao, Haisong ;
Pu, Tao ;
Zheng, Jilin ;
Zhou, Hua ;
Lu, Lin ;
Xiang, Peng ;
Zhao, Jiyong ;
Wang, Weiwei .
OPTICS EXPRESS, 2018, 26 (09) :11587-11598
[7]   Implementing efficient data compression and encryption in a persistent key-value store for HPC [J].
Kim, Jungwon ;
Vetter, Jeffrey S. .
INTERNATIONAL JOURNAL OF HIGH PERFORMANCE COMPUTING APPLICATIONS, 2019, 33 (06) :1098-1112
[8]   MULKASE: a novel approach for key-aggregate searchable encryption formulti-owner data [J].
Padhya, Mukti ;
Jinwala, Devesh C. .
FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING, 2019, 20 (12) :1717-1748
[9]   RETRACTED: Inverse Matrix Auto-Search Technique for the RTS MIMO OTA Test-Part II: Validations (Retracted Article) [J].
Shen, Penghui ;
Qi, Yihong ;
Yu, Wei ;
Li, Fuhai .
IEEE TRANSACTIONS ON ELECTROMAGNETIC COMPATIBILITY, 2018, 60 (05) :1288-1295
[10]   On the operational meaning and practical aspects of using the security parameter in quantum key distribution [J].
Trushechkin, A. S. .
QUANTUM ELECTRONICS, 2020, 50 (05) :426-439