首页 | 本学科首页   官方微博 | 高级检索  
     

基于属性分类的分布式大数据隐私保护加密控制模型设计
引用本文:姜春峰. 基于属性分类的分布式大数据隐私保护加密控制模型设计[J]. 计算机测量与控制, 2023, 31(11): 221-227
作者姓名:姜春峰
作者单位:西北大学现代学院
基金项目:陕西教师发展研究计划项目,陕西省教育厅,青年项目:基于学生行为数据的深度学习模型研究与应用,项目编号:2022JSQ020
摘    要:在分布式大数据的存储和传输过程中,数据极易被恶意用户攻击,造成数据的泄露和丢失。为提高分布式大数据的存储和传输安全性,设计了基于属性分类的分布式大数据隐私保护加密控制模型。挖掘用户隐私数据,以分布式结构存储。根据分布式隐私数据特征,判断数据的属性类型。利用Logistic混沌映射,迭代生成数据隐私保护密钥,通过匿名化、混沌映射、同态加密等步骤,实现对隐私数据的加密处理。利用属性分类技术,控制隐私保护数据访问进程,在传输协议的约束下,实现分布式大数据隐私保护加密控制。实验结果表明,设计模型的明文和密文相似度较低,访问撤销控制准确率高达98.9%,在有、无攻击工况下,隐私数据损失量较少,具有较好的加密、控制性能和隐私保护效果,有效降低了隐私数据的泄露风险,提高了分布式大数据的存储和传输安全性。

关 键 词:属性分类  分布式大数据  隐私保护  加密控制模型  Logistic混沌映射  
收稿时间:2023-04-23
修稿时间:2023-05-29

Design of distributed big data privacy protection encryption control model based on attribute classification
Abstract:In the storage and transmission process of distributed big data, data is highly susceptible to malicious user attacks, resulting in data leakage and loss. To improve the storage and transmission security of distributed big data, a distributed big data privacy protection encryption control model based on attribute classification was designed. Mining user privacy data and storing it in a distributed structure. Determine the attribute type of the distributed privacy data based on its characteristics. Using Logistic chaotic mapping, the data privacy protection key is generated iteratively, and the encryption of private data is realized through anonymization, chaotic mapping, homomorphic encryption and other steps. Utilize attribute classification technology to control the access process of privacy protection data, and achieve distributed big data privacy protection encryption control under the constraints of transmission protocols. The experimental results show that the similarity between plaintext and ciphertext in the designed model is low, and the accuracy of access revocation control is as high as 98.9%. Under both attack and no attack conditions, the loss of privacy data is relatively small, and it has good encryption, control performance, and privacy protection effects. It effectively reduces the risk of privacy data leakage and improves the storage and transmission security of distributed big data.
Keywords:Attribute classification   Distributed big data   Privacy protection   Encryption control model   Logistic Chaotic Mapping  
点击此处可从《计算机测量与控制》浏览原始摘要信息
点击此处可从《计算机测量与控制》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号