DATA PROTECTION AND PRIVACY PROTECTION OF ADVERTISING BASED ON CLOUD COMPUTING PLATFORM

被引:0
|
作者
Chen, Zhishe [1 ]
机构
[1] Wuchang Shouyi Univ, Sch Informat Sci & Engn, Wuhan 430064, Hubei, Peoples R China
来源
关键词
Privacy-preserving deep learning; Precise advertising; Secure computing; Privacy protection; Data mining; HEALTH-CARE; INNOVATION; SYSTEMS; SECURE;
D O I
10.12694/scpe.v25i5.3034
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
This paper uses the hybrid leapfrog algorithm to mine user information in encrypted advertisements effectively and intelligently. This method handles the nonlinearity of the original data by mapping it into kernel space. The representation of the original ciphertext in the kernel space is obtained by sparsely reconstructing the encrypted original advertising data. Build a corresponding scoring mechanism and select the best advertising data characteristics. The selected data were clustered using the data fuzzy clustering method based on the improved hybrid leapfrog. Set the adjustment coefficient to improve the local optimization performance of hybrid frog leaping. This algorithm uses the tightness and separation in genetic algorithms and constructs a fitness function to determine the clustering critical value. This enables the practical, intelligent mining of homomorphic passwords with privacy protection. Experimental results show that the method proposed in this article can effectively improve the convergence speed and accuracy of clustering. Improve Blowfish by combining multi-threading, sharing encryption and other methods. This enables encryption and decryption of large amounts of model data. The research of this project has very important research value in improving the security performance and effectiveness of cryptographic algorithms.
引用
收藏
页码:3484 / 3488
页数:7
相关论文
共 50 条
  • [21] Privacy and data protection in mobile cloud computing: A systematic mapping study
    Alnajrani, Hussain Mutlaq
    Norman, Azah Anir
    Ahmed, Babiker Hussien
    PLOS ONE, 2020, 15 (06):
  • [22] Designing of Privacy Protection Platform Based on Data Mining
    Zhou Bing
    Zeng Zhihua
    PROCEEDINGS OF THE 2015 INTERNATIONAL INDUSTRIAL INFORMATICS AND COMPUTER ENGINEERING CONFERENCE, 2015, : 1251 - 1254
  • [23] Protection of Privacy Data in a Cloud Environment
    Chen, Jeang-Kuo
    Chang, Fang-Sheng
    INTELLIGENT SYSTEMS AND APPLICATIONS (ICS 2014), 2015, 274 : 964 - 971
  • [24] Data Privacy Protection Mechanisms in Cloud
    Singh N.
    Singh A.K.
    Data Science and Engineering, 2018, 3 (1) : 24 - 39
  • [25] Privacy and data protection in cloud scenarios
    Samarati, Pirengila
    PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS, 2012, : 8 - 8
  • [26] Privacy data protection in the public cloud
    Zhan, Xueqiu
    Energy Education Science and Technology Part A: Energy Science and Research, 2012, 30 (SUPPL.2): : 195 - 200
  • [27] Time-based and privacy protection revocable and traceable data sharing scheme in cloud computing
    Zhang J.
    Ma J.
    Ma Z.
    Li T.
    Tongxin Xuebao/Journal on Communications, 2021, 42 (10): : 81 - 94
  • [28] Research on Core Data Protection Based on Cloud Computing
    Deng, Guoru
    Hu, Shuai
    Yuan, Hui
    Dong, Liang
    Zhuang, Yan
    Yang, Shan
    Luo, Xuan
    Wang, Yixi
    CYBER SECURITY INTELLIGENCE AND ANALYTICS, 2020, 928 : 1167 - 1174
  • [29] SecEDMO: Enabling Efficient Data Mining with Strong Privacy Protection in Cloud Computing
    Wu, Jiahui
    Mu, Nankun
    Lei, Xinyu
    Le, Junqing
    Zhang, Di
    Liao, Xiaofeng
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2022, 10 (01) : 691 - 705
  • [30] Dynamic searchable encryption with privacy protection for cloud computing
    Ocansey, Selasi Kwame
    Ametepe, Wolali
    Li, Xiao Wei
    Wang, Changda
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2018, 31 (01)