首页 | 本学科首页   官方微博 | 高级检索  
     

协同优化决策中数据水平分区的隐私保护算法研究
引用本文:刘智慧,刘洪伟,詹明君,肖祺,陈晓旋.协同优化决策中数据水平分区的隐私保护算法研究[J].广东工业大学学报,2016,33(5):15-21.
作者姓名:刘智慧  刘洪伟  詹明君  肖祺  陈晓旋
作者单位:广东工业大学 管理学院,广东 广州 510520
基金项目:国家自然科学基金资助项目(70971027);广东省普通高校人文社会科学重点研究项目(12ZS0112)
摘    要:在跨组织协同优化决策问题中的参数来源于不同主体的数据.在缺乏可信第三方时难以完成全局优化问题的求解.本文运用随机矩阵转换和加密技术方法来解决约束条件中数据水平分区优化问题的协同计算,克服了扰动或差分算法对问题结构以及解结构潜在的不稳定影响.提出的安全协议一方面可以保证在保护各方隐私信息的前提下得到计算结果与集中式的结果具有一致性,另一方面也具备良好的防推理攻击能力.该研究可广泛应用于供应链系统或企业联盟间的决策优化问题的协同安全计算问题.

关 键 词:数据水平分区    安全协议    推理攻击  
收稿时间:2016-03-09

Privacy-Preserving Algorithm Research on Horizontally Partitioned Data of Collaborative Optimization Decisions
LIU Zhi-hui,LIU Hong-wei,ZHAN Ming-jun,XIAO Qi,CHEN Xiao-xuan.Privacy-Preserving Algorithm Research on Horizontally Partitioned Data of Collaborative Optimization Decisions[J].Journal of Guangdong University of Technology,2016,33(5):15-21.
Authors:LIU Zhi-hui  LIU Hong-wei  ZHAN Ming-jun  XIAO Qi  CHEN Xiao-xuan
Affiliation:School of Management, Guangdong University of Technology, Guangzhou 510520, China
Abstract:In the cross-organizational collaborative optimal decision-making, the parameters of optimization usually originate from different subject data. It is difficult to solve the global optimization problems due to the lack of a trusted third party. A method combining the random matrix transformation and encryption technology is put forward to solve the collaborative optimization of the horizontally partitioned data. This method also overcomes the potential destabilizing impact of structural problems and structural solutions when using disturbance or difference algorithm. On one hand, the security protocol can ensure the consistency of calculation results with privacy-preserving and centralized results. On the other side, it can prevent the potential inference attack. The study can be widely used in collaborative computing security issues of optimization decision problems among enterprise alliance or supply chain.
Keywords:data horizontally partitioned  security protocol  inference attack  
点击此处可从《广东工业大学学报》浏览原始摘要信息
点击此处可从《广东工业大学学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号