DATA PROTECTION AND PRIVACY PROTECTION OF ADVERTISING BASED ON CLOUD COMPUTING PLATFORM

被引:0
|
作者
Chen, Zhishe [1 ]
机构
[1] Wuchang Shouyi Univ, Sch Informat Sci & Engn, Wuhan 430064, Hubei, Peoples R China
来源
关键词
Privacy-preserving deep learning; Precise advertising; Secure computing; Privacy protection; Data mining; HEALTH-CARE; INNOVATION; SYSTEMS; SECURE;
D O I
10.12694/scpe.v25i5.3034
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
This paper uses the hybrid leapfrog algorithm to mine user information in encrypted advertisements effectively and intelligently. This method handles the nonlinearity of the original data by mapping it into kernel space. The representation of the original ciphertext in the kernel space is obtained by sparsely reconstructing the encrypted original advertising data. Build a corresponding scoring mechanism and select the best advertising data characteristics. The selected data were clustered using the data fuzzy clustering method based on the improved hybrid leapfrog. Set the adjustment coefficient to improve the local optimization performance of hybrid frog leaping. This algorithm uses the tightness and separation in genetic algorithms and constructs a fitness function to determine the clustering critical value. This enables the practical, intelligent mining of homomorphic passwords with privacy protection. Experimental results show that the method proposed in this article can effectively improve the convergence speed and accuracy of clustering. Improve Blowfish by combining multi-threading, sharing encryption and other methods. This enables encryption and decryption of large amounts of model data. The research of this project has very important research value in improving the security performance and effectiveness of cryptographic algorithms.
引用
收藏
页码:3484 / 3488
页数:7
相关论文
共 50 条
  • [31] Privacy Protection Smartcard Authentication Scheme in Cloud Computing
    FAN Kai
    DENG Hai
    LI Hui
    YANG Yintang
    ChineseJournalofElectronics, 2018, 27 (01) : 41 - 45
  • [32] A Scheme of Memory Privacy Protection in Cloud Computing Environment
    LIU Kehao
    CAO Ming
    FU Nan
    MA Jing
    Wuhan University Journal of Natural Sciences, 2015, 20 (04) : 307 - 312
  • [33] Security and privacy protection in cloud computing: Discussions and challenges
    Sun, PanJun
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2020, 160
  • [34] Research on Privacy Protection Approach for Cloud Computing Environments
    Li, Xiaohui
    Liang, Hongxing
    Jia, Dan
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (03): : 113 - 119
  • [35] Data Privacy Protection based on Feature Dilution in Cloud Services
    Wu, Feng
    Cui, Lei
    Feng, Jianan
    Wu, Liwen
    Yao, Saowen
    Yu, Shui
    2021 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2021,
  • [36] Privacy protection based on encrypting sensitive attribute for cloud data
    Zhang, Lifen
    Dai, Jun
    Journal of Computational Information Systems, 2014, 10 (03): : 1085 - 1092
  • [37] An Effective Data Privacy Protection Algorithm Based on Differential Privacy in Edge Computing
    Qiao, Yi
    Liu, Zhaobin
    Lv, Haoze
    Li, Minghui
    Huang, Zhiyi
    Li, Zhiyang
    Liu, Weijiang
    IEEE ACCESS, 2019, 7 : 136203 - 136213
  • [38] Construction of Lightning Monitoring, Warning and Protection Platform Based on Cloud Computing
    Tao H.
    Feng W.
    Gu S.
    Zhou Z.
    Guo J.
    Wu D.
    Tao, Hantao (taohantao@sgepri.sgcc.com.cn), 2017, Science Press (43): : 3784 - 3791
  • [39] Research on privacy protection system of RFID personal consumption data based on internet of things and cloud computing
    Du N.
    Chen C.
    International Journal of Information and Computer Security, 2021, 15 (04) : 328 - 342
  • [40] Data Security and Privacy Protection in Public Cloud
    Shi, Yue
    2018 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2018, : 4812 - 4819