Customer Data Privacy Protection Method Based On Singular Value Decomposition Clustering Algorithm

被引:0
|
作者
Zhao, Tao [1 ]
Zhu, Hongbin [1 ]
Liu, Shenglong [1 ]
Wang, Heng [1 ]
Yang, Ruxia [2 ,3 ]
Gao, Xianzhou [2 ,3 ]
机构
[1] State Grid Corp China, Big Data Ctr, Beijing, Peoples R China
[2] Global Energy Interconnect Res Inst Co Ltd, Nanjing, Peoples R China
[3] State Grid Key Lab Informat & Network Secur, Nanjing, Peoples R China
来源
INTERNATIONAL SYMPOSIUM ON ARTIFICIAL INTELLIGENCE AND ROBOTICS 2021 | 2021年 / 11884卷
关键词
Singular value decomposition clustering algorithm; Privacy protection; Dynamic update; Sensitive properties;
D O I
10.1117/12.2604864
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
As the information technology develops rapidly, the large-scale personal data such as sensors or IoT (Internet of Things) equipment is kept in the cloud or data centers. Sometimes, the data owner in cloud center needs to publish the data. Therefore, in the face of the risk of personal information leakage, how to take full advantage of data has become a hot research topic. When data is published many times, personal privacy is also disclosed. Thus, this paper puts forward a new clustering algorithm based on singular value decomposition to finish the clustering process. The ideas of distance and information entropy are considered to flexibly adjust data availability and privacy protection in this way. Secondly, this paper also puts forward a dynamic update mechanism to ensure that personal data will not be leaked after multiple releases and minimize information loss. Finally, the effectiveness and superiority of this method are verified by experiments.
引用
收藏
页数:6
相关论文
共 50 条
  • [31] Data Privacy Protection Algorithm Based on Redundant Slice Technology in Wireless Sensor Networks
    Li, Peng
    Xu, Chao
    Xu, He
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2021, 15 (01) : 190 - 212
  • [32] Data aggregation algorithm based on privacy-protection and integrity in wireless sensor networks
    Feng, Juan
    Huang, Haiping
    Zhou, Xuan
    Hu, Kangheng
    Yin, Zhengwei
    Journal of Computational Information Systems, 2014, 10 (20): : 8963 - 8971
  • [33] DATA PRIVACY PROTECTION BY KERNEL SUBSPACE PROJECTION AND GENERALIZED EIGENVALUE DECOMPOSITION
    Diamantaras, Konstantinos
    Kung, Sun-Yuan
    2016 IEEE 26TH INTERNATIONAL WORKSHOP ON MACHINE LEARNING FOR SIGNAL PROCESSING (MLSP), 2016,
  • [34] PPM: Privacy Protection Method for Outsourcing Data Entry
    Li, Fengqi
    Shang, Chunli
    Liu, Kemeng
    Pang, Aidi
    Huang, Sikai
    IEEE ACCESS, 2019, 7 : 29745 - 29753
  • [35] Privacy Protection Oriented Video Data Hiding Method
    Liu, Si
    Liu, Yunxia
    Wang, Zipei
    Feng, Cong
    Zhao, Hongguo
    2019 IEEE 5TH INTL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY) / IEEE INTL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING (HPSC) / IEEE INTL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2019, : 90 - 95
  • [36] Privacy-protection method for purchasing multimedia data
    Soma, H
    Tanaka, H
    DIGITAL CONVERGENCE FOR CREATIVE DIVERGENCE, VOL 2: TECHNICAL INTERACTIVE SESSIONS, 1999, : 516 - 521
  • [37] Legal Privacy Protection Machine Learning Method Based on Word2Vec Algorithm
    Wang, Rongrong
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2025, 19 (01)
  • [38] Hierarchical differential privacy hybrid decomposition algorithm for location big data
    Yan, Yan
    Hao, Xiaohong
    Zhang, Lianxiu
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 4): : S9269 - S9280
  • [39] Hierarchical differential privacy hybrid decomposition algorithm for location big data
    Yan Yan
    Xiaohong Hao
    Lianxiu Zhang
    Cluster Computing, 2019, 22 : 9269 - 9280
  • [40] DATA PROTECTION AND PRIVACY PROTECTION OF ADVERTISING BASED ON CLOUD COMPUTING PLATFORM
    Chen, Zhishe
    SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2024, 25 (05): : 3484 - 3488