DATA PROTECTION AND PRIVACY PROTECTION OF ADVERTISING BASED ON CLOUD COMPUTING PLATFORM

被引:0
|
作者
Chen, Zhishe [1 ]
机构
[1] Wuchang Shouyi Univ, Sch Informat Sci & Engn, Wuhan 430064, Hubei, Peoples R China
来源
关键词
Privacy-preserving deep learning; Precise advertising; Secure computing; Privacy protection; Data mining; HEALTH-CARE; INNOVATION; SYSTEMS; SECURE;
D O I
10.12694/scpe.v25i5.3034
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
This paper uses the hybrid leapfrog algorithm to mine user information in encrypted advertisements effectively and intelligently. This method handles the nonlinearity of the original data by mapping it into kernel space. The representation of the original ciphertext in the kernel space is obtained by sparsely reconstructing the encrypted original advertising data. Build a corresponding scoring mechanism and select the best advertising data characteristics. The selected data were clustered using the data fuzzy clustering method based on the improved hybrid leapfrog. Set the adjustment coefficient to improve the local optimization performance of hybrid frog leaping. This algorithm uses the tightness and separation in genetic algorithms and constructs a fitness function to determine the clustering critical value. This enables the practical, intelligent mining of homomorphic passwords with privacy protection. Experimental results show that the method proposed in this article can effectively improve the convergence speed and accuracy of clustering. Improve Blowfish by combining multi-threading, sharing encryption and other methods. This enables encryption and decryption of large amounts of model data. The research of this project has very important research value in improving the security performance and effectiveness of cryptographic algorithms.
引用
收藏
页码:3484 / 3488
页数:7
相关论文
共 50 条
  • [11] WEB Protection Scheme Based on A Cloud Computing Platform
    Liao Rongzhou
    Xiao Nanfeng
    2020 5TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA ANALYTICS (IEEE ICBDA 2020), 2020, : 323 - 328
  • [12] A threshold-based model for privacy protection in cloud computing
    Ren X.-Y.
    Chen L.-J.
    Zhang J.-F.
    Ma X.-D.
    Advances in Information Sciences and Service Sciences, 2011, 3 (03): : 163 - 168
  • [13] Marketing data security and privacy protection based on federated gamma in cloud computing environment
    Zhang C.
    Pan Z.
    Hou C.
    International Journal of Intelligent Networks, 2023, 4 : 261 - 271
  • [14] Kernel interpolation-based technique for privacy protection of pluggable data in cloud computing
    Bangare M.L.
    Joshi S.A.
    International Journal of Cloud Computing, 2020, 9 (2-3) : 355 - 374
  • [15] Cloud computing and data protection
    Miralles, Ramon
    IDP-INTERNET LAW AND POLITICS, 2010, (11):
  • [16] ROBUST AND PRIVACY PROTECTION AUTHENTICATION IN CLOUD COMPUTING
    Huang, Jheng-Jia
    Juang, Wen-Shenq
    Fan, Chun-I
    Liaw, Horng-Twu
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2013, 9 (11): : 4247 - 4261
  • [17] A full lifecycle privacy protection scheme for sensitive data in cloud computing
    Jinbo Xiong
    Fenghua Li
    Jianfeng Ma
    Ximeng Liu
    Zhiqiang Yao
    Patrick S. Chen
    Peer-to-Peer Networking and Applications, 2015, 8 : 1025 - 1037
  • [18] A full lifecycle privacy protection scheme for sensitive data in cloud computing
    Xiong, Jinbo
    Li, Fenghua
    Ma, Jianfeng
    Liu, Ximeng
    Yao, Zhiqiang
    Chen, Patrick S.
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2015, 8 (06) : 1025 - 1037
  • [19] Privacy Protection and Data Security in Cloud Computing: A Survey, Challenges, and Solutions
    Sun, Pan Jun
    IEEE ACCESS, 2019, 7 : 147420 - 147452
  • [20] A User-Centric Method for Data Privacy Protection in Cloud Computing
    Li, Xiaohui
    He, Jingsha
    2011 INTERNATIONAL CONFERENCE ON COMPUTER, ELECTRICAL, AND SYSTEMS SCIENCES, AND ENGINEERING (CESSE 2011), 2011, : 355 - +