DATA PROTECTION AND PRIVACY PROTECTION OF ADVERTISING BASED ON CLOUD COMPUTING PLATFORM

被引:0
|
作者
Chen, Zhishe [1 ]
机构
[1] Wuchang Shouyi Univ, Sch Informat Sci & Engn, Wuhan 430064, Hubei, Peoples R China
来源
关键词
Privacy-preserving deep learning; Precise advertising; Secure computing; Privacy protection; Data mining; HEALTH-CARE; INNOVATION; SYSTEMS; SECURE;
D O I
10.12694/scpe.v25i5.3034
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
This paper uses the hybrid leapfrog algorithm to mine user information in encrypted advertisements effectively and intelligently. This method handles the nonlinearity of the original data by mapping it into kernel space. The representation of the original ciphertext in the kernel space is obtained by sparsely reconstructing the encrypted original advertising data. Build a corresponding scoring mechanism and select the best advertising data characteristics. The selected data were clustered using the data fuzzy clustering method based on the improved hybrid leapfrog. Set the adjustment coefficient to improve the local optimization performance of hybrid frog leaping. This algorithm uses the tightness and separation in genetic algorithms and constructs a fitness function to determine the clustering critical value. This enables the practical, intelligent mining of homomorphic passwords with privacy protection. Experimental results show that the method proposed in this article can effectively improve the convergence speed and accuracy of clustering. Improve Blowfish by combining multi-threading, sharing encryption and other methods. This enables encryption and decryption of large amounts of model data. The research of this project has very important research value in improving the security performance and effectiveness of cryptographic algorithms.
引用
收藏
页码:3484 / 3488
页数:7
相关论文
共 50 条
  • [41] Privacy Protection of data attributes in cloud environment
    Xu, Xiaolong
    Wan, Fuqiang
    Sun, Yanfei
    2016 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY PROCEEDINGS - CYBERC 2016, 2016, : 18 - 26
  • [42] A Privacy-Leakage-Tolerance based Noise Enhancing Strategy for Privacy Protection in Cloud Computing
    Zhang, Gaofeng
    Yang, Yun
    Chen, Jinjun
    2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 1 - 8
  • [43] Data Protection of Accounting Information Based on Big Data and Cloud Computing
    Li X.
    Scientific Programming, 2023, 2023
  • [44] A historical probability based noise generation strategy for privacy protection in cloud computing
    Zhang, Gaofeng
    Yang, Yun
    Chen, Jinjun
    JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2012, 78 (05) : 1374 - 1381
  • [45] Attacks classification and data privacy protection in cloud-edge collaborative computing systems
    Devarajan, Mohanarangan Veerappermal
    Yallamelli, Akhil Raj Gaius
    Yalla, Rama Krishna Mani Kanta
    Mamidala, Vijaykumar
    Ganesan, Thirusubramanian
    Sambas, Aceng
    INTERNATIONAL JOURNAL OF PARALLEL EMERGENT AND DISTRIBUTED SYSTEMS, 2024,
  • [46] New Advances of Privacy Protection and Multimedia Content Security for Big Data and Cloud Computing
    Qin, Chuan
    Qian, Zhenxing
    Wang, Jinwei
    Zhang, Xinpeng
    IETE TECHNICAL REVIEW, 2018, 35 : 1 - 3
  • [47] Development of a Security Education Model System for Cloud Computing and Data Security and Privacy Protection
    Jia, Rui
    Ni, Xiaoli
    Shao, Xiaoyi
    Zhang, Ting
    Qi, Qunkun
    WIRELESS PERSONAL COMMUNICATIONS, 2023,
  • [48] Differential privacy protection method of electrical load data towards cloud computing applications
    Yu Q.
    Shen Z.
    Sun F.
    Li Z.
    Dianli Zidonghua Shebei/Electric Power Automation Equipment, 2022, 42 (07): : 68 - 75
  • [49] Key Research Issues for Privacy Protection and Preservation in Cloud Computing
    Zhang, Gaofeng
    Yang, Yun
    Zhang, Xuyun
    Liu, Chang
    Chen, Jinjun
    SECOND INTERNATIONAL CONFERENCE ON CLOUD AND GREEN COMPUTING / SECOND INTERNATIONAL CONFERENCE ON SOCIAL COMPUTING AND ITS APPLICATIONS (CGC/SCA 2012), 2012, : 47 - 54
  • [50] Privacy protection and integrity verification of aggregate queries in cloud computing
    Jun Hong
    Tao Wen
    Quan Guo
    Zhengwang Ye
    Ying Yin
    Cluster Computing, 2019, 22 : 5763 - 5773