Customer Data Privacy Protection Method Based On Singular Value Decomposition Clustering Algorithm

被引:0
|
作者
Zhao, Tao [1 ]
Zhu, Hongbin [1 ]
Liu, Shenglong [1 ]
Wang, Heng [1 ]
Yang, Ruxia [2 ,3 ]
Gao, Xianzhou [2 ,3 ]
机构
[1] State Grid Corp China, Big Data Ctr, Beijing, Peoples R China
[2] Global Energy Interconnect Res Inst Co Ltd, Nanjing, Peoples R China
[3] State Grid Key Lab Informat & Network Secur, Nanjing, Peoples R China
来源
INTERNATIONAL SYMPOSIUM ON ARTIFICIAL INTELLIGENCE AND ROBOTICS 2021 | 2021年 / 11884卷
关键词
Singular value decomposition clustering algorithm; Privacy protection; Dynamic update; Sensitive properties;
D O I
10.1117/12.2604864
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
As the information technology develops rapidly, the large-scale personal data such as sensors or IoT (Internet of Things) equipment is kept in the cloud or data centers. Sometimes, the data owner in cloud center needs to publish the data. Therefore, in the face of the risk of personal information leakage, how to take full advantage of data has become a hot research topic. When data is published many times, personal privacy is also disclosed. Thus, this paper puts forward a new clustering algorithm based on singular value decomposition to finish the clustering process. The ideas of distance and information entropy are considered to flexibly adjust data availability and privacy protection in this way. Secondly, this paper also puts forward a dynamic update mechanism to ensure that personal data will not be leaked after multiple releases and minimize information loss. Finally, the effectiveness and superiority of this method are verified by experiments.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Singular value decomposition based data distortion strategy for privacy protection
    Xu, Shuting
    Zhang, Jun
    Han, Dianwei
    Wang, Jie
    KNOWLEDGE AND INFORMATION SYSTEMS, 2006, 10 (03) : 383 - 397
  • [2] Singular value decomposition based data distortion strategy for privacy protection
    Shuting Xu
    Jun Zhang
    Dianwei Han
    Jie Wang
    Knowledge and Information Systems, 2006, 10 : 383 - 397
  • [3] Differential Privacy Data Protection Method Based on Clustering
    Li Li-xin
    Ding Yong-shan
    Wang Jia-yan
    2017 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2017, : 11 - 16
  • [4] Data Incremental Clustering Algorithm based on Differential Privacy
    Gao, Qing
    Wang, Xiujun
    Gao, Yan
    Tao, Tao
    2023 IEEE 9TH WORLD FORUM ON INTERNET OF THINGS, WF-IOT, 2023,
  • [5] Privacy Protection Method for K-modes Clustering Data with Local Differential Privacy
    Zhang S.-B.
    Yuan L.-J.
    Mao X.-J.
    Zhu G.-M.
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2022, 50 (09): : 2181 - 2188
  • [6] Knowledge transfer clustering algorithm with privacy protection
    Chen A.
    Wang S.
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2016, 38 (03): : 523 - 531
  • [7] Power Industry Big Data Privacy Protection Processing Method Based on Fuzzy Logic and Intelligent Clustering
    Hang, Feilu
    Xie, Linjiang
    Zhang, Zhenhong
    Guo, Wei
    Li, Hanruo
    Distributed Generation and Alternative Energy Journal, 2022, 37 (05) : 1461 - 1492
  • [8] A clustering-based differential privacy protection algorithm for weighted social networks
    Zhang L.
    Ge L.
    Mathematical Biosciences and Engineering, 2024, 21 (03) : 3755 - 3773
  • [9] A New Privacy-Preserving Data Mining Method Using Non-negative Matrix Factorization and Singular Value Decomposition
    Li, Guang
    Xue, Rui
    WIRELESS PERSONAL COMMUNICATIONS, 2018, 102 (02) : 1799 - 1808
  • [10] A New Privacy-Preserving Data Mining Method Using Non-negative Matrix Factorization and Singular Value Decomposition
    Guang Li
    Rui Xue
    Wireless Personal Communications, 2018, 102 : 1799 - 1808