XML privacy preserving model based on dynamic context

被引:0
|
作者
Wang M. [1 ,2 ]
Huang S. [2 ]
Zheng C. [2 ]
Li H. [2 ]
机构
[1] College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing
[2] Command and Control Engineering College, Army Engineering University of PLA, Nanjing
关键词
Dynamic context; LT-BT encoding; Privacy bipartite graph; Privacy preserving; Reasoning attack; TS encoding;
D O I
10.23940/ijpe.18.12.p30.32063219
中图分类号
学科分类号
摘要
The development of cloud computing has brought about rapid changes in the data application environment. The contradiction between the availability of data fusion and privacy protection is increasing. Traditional information security focuses on hiding attributes, while big data privacy protection pays more attention to access control and data using methods. As a semi-structured representation model, XML data is an ideal carrier for heterogeneous data exchange and unstructured data storage. This paper deeply studies several problems involved in user’s individual access process for XML data privacy preserving, and proposes prior knowledge as dynamic context. Based on the innovative privacy bipartite graph and the XML document semantic encoding, we propose the XML data privacy preserving model DCPPM and the algorithm KCQ to resist reasoning attack. The scheme to preventive response of the real-time inference attack in the actual operation process is realized. Finally, the example verification and experimental data show that the proposed model can effectively protect the safe use of private data and sensitive data in real time, which has certain theoretical and practical significance. © 2018 Totem Publisher, Inc. All rights reserved.
引用
收藏
页码:3206 / 3219
页数:13
相关论文
共 50 条
  • [21] Distributed model based sampling technique for privacy preserving clustering
    Wu Xiao-dan
    Yue Dian-min
    Liu Feng-li
    Chu Chao-hsien
    PROCEEDINGS OF 2007 INTERNATIONAL CONFERENCE ON MANAGEMENT SCIENCE & ENGINEERING (14TH) VOLS 1-3, 2007, : 192 - 197
  • [22] Privacy-Preserving Model of IoT Based Trust Evaluation
    Chen, Zhenguo
    Tian, Liqin
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2017, E100D (02): : 371 - 374
  • [23] A noise-based privacy preserving model for Internet of Things
    Shelendra Kumar Jain
    Nishtha Kesswani
    Complex & Intelligent Systems, 2023, 9 : 3655 - 3679
  • [24] A Privacy-Preserving Trust Model Based on Blockchain for VANETs
    Lu, Zhaojun
    Liu, Wenchao
    Wang, Qian
    Qu, Gang
    Liu, Zhenglin
    IEEE ACCESS, 2018, 6 : 45655 - 45664
  • [25] HECC based Patient Privacy Preserving Access Control Model
    Prasanalakshmi, B.
    Pugalendhi, Ganesh Kumar
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2019, 19 (03): : 50 - 53
  • [26] A noise-based privacy preserving model for Internet of Things
    Jain, Shelendra Kumar
    Kesswani, Nishtha
    COMPLEX & INTELLIGENT SYSTEMS, 2023, 9 (04) : 3655 - 3679
  • [27] Privacy Preserving and Trustworthy Federated Learning Model Based on Blockchain
    Zhu J.-M.
    Zhang Q.-N.
    Gao S.
    Ding Q.-Y.
    Yuan L.-P.
    Jisuanji Xuebao/Chinese Journal of Computers, 2021, 44 (12): : 2464 - 2484
  • [28] Dynamic access control model for privacy preserving personalized healthcare in cloud environment
    Son, Jiseong
    Kim, Jeong-Dong
    Na, Hong-Seok
    Baik, Doo-Kwon
    TECHNOLOGY AND HEALTH CARE, 2016, 24 : S123 - S129
  • [29] AnonySense: Opportunistic and privacy-preserving context collection
    Kapadia, Apu
    Triandopoulos, Nikos
    Cornelius, Cory
    Peebles, Daniel
    Kotz, David
    PERVASIVE COMPUTING, 2008, 5013 : 280 - +
  • [30] Privacy Preserving Dynamic Room Layout Mapping
    Li, Xinyu
    Zhang, Yanyi
    Marsic, Ivan
    Burd, Randall S.
    IMAGE AND SIGNAL PROCESSING (ICISP 2016), 2016, 9680 : 61 - 70