基于差分隐私保护的政企数据安全共享方法

Xiaomin Xu, Zhenglei Zhu, Jiange Liu, Xin Liu, Qingxuan Guo
{"title":"基于差分隐私保护的政企数据安全共享方法","authors":"Xiaomin Xu, Zhenglei Zhu, Jiange Liu, Xin Liu, Qingxuan Guo","doi":"10.1117/12.2668452","DOIUrl":null,"url":null,"abstract":"The security of government and enterprise data sharing is very important and critical. To increase the number of data sharing, create a more stable transmission and processing environment, and reduce network threats, this paper studies the security sharing method of government and enterprise data based on differential privacy protection. Firstly, the government and enterprise data encryption are described, and the Tendermint differential overlapping interactive sharing nodes are deployed in the preset area. Then, based on this, the interactive differential privacy protection data sharing model is designed, and the threat identification method is used to achieve data security sharing. The experimental results show that compared with the traditional proxy encryption data security sharing test group and the traditional CP-ABE data security sharing test group, the differential privacy protection sharing test group designed in this paper achieves relatively more times of one-way data security sharing, which indicates that the proposed method has a small error and fast speed in the actual data transmission process. The data processing in the region has less restrictive conditions and has practical application value.","PeriodicalId":345723,"journal":{"name":"Fifth International Conference on Computer Information Science and Artificial Intelligence","volume":"45 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Government and enterprise data security sharing method based on differential privacy protection\",\"authors\":\"Xiaomin Xu, Zhenglei Zhu, Jiange Liu, Xin Liu, Qingxuan Guo\",\"doi\":\"10.1117/12.2668452\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The security of government and enterprise data sharing is very important and critical. To increase the number of data sharing, create a more stable transmission and processing environment, and reduce network threats, this paper studies the security sharing method of government and enterprise data based on differential privacy protection. Firstly, the government and enterprise data encryption are described, and the Tendermint differential overlapping interactive sharing nodes are deployed in the preset area. Then, based on this, the interactive differential privacy protection data sharing model is designed, and the threat identification method is used to achieve data security sharing. The experimental results show that compared with the traditional proxy encryption data security sharing test group and the traditional CP-ABE data security sharing test group, the differential privacy protection sharing test group designed in this paper achieves relatively more times of one-way data security sharing, which indicates that the proposed method has a small error and fast speed in the actual data transmission process. The data processing in the region has less restrictive conditions and has practical application value.\",\"PeriodicalId\":345723,\"journal\":{\"name\":\"Fifth International Conference on Computer Information Science and Artificial Intelligence\",\"volume\":\"45 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-03-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Fifth International Conference on Computer Information Science and Artificial Intelligence\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1117/12.2668452\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Fifth International Conference on Computer Information Science and Artificial Intelligence","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1117/12.2668452","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

政府和企业数据共享的安全性是非常重要和关键的。为了增加数据共享的数量,创造更稳定的传输和处理环境,减少网络威胁,本文研究了基于差分隐私保护的政企数据安全共享方法。首先,对政企数据加密进行了描述,并在预设区域部署了Tendermint差分重叠交互共享节点;在此基础上,设计了交互式差分隐私保护数据共享模型,并采用威胁识别方法实现数据安全共享。实验结果表明,与传统的代理加密数据安全共享测试组和传统的CP-ABE数据安全共享测试组相比,本文设计的差分隐私保护共享测试组实现了相对较多的单向数据安全共享次数,表明本文方法在实际数据传输过程中误差小,速度快。该区域的数据处理限制条件较少,具有实际应用价值。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Government and enterprise data security sharing method based on differential privacy protection
The security of government and enterprise data sharing is very important and critical. To increase the number of data sharing, create a more stable transmission and processing environment, and reduce network threats, this paper studies the security sharing method of government and enterprise data based on differential privacy protection. Firstly, the government and enterprise data encryption are described, and the Tendermint differential overlapping interactive sharing nodes are deployed in the preset area. Then, based on this, the interactive differential privacy protection data sharing model is designed, and the threat identification method is used to achieve data security sharing. The experimental results show that compared with the traditional proxy encryption data security sharing test group and the traditional CP-ABE data security sharing test group, the differential privacy protection sharing test group designed in this paper achieves relatively more times of one-way data security sharing, which indicates that the proposed method has a small error and fast speed in the actual data transmission process. The data processing in the region has less restrictive conditions and has practical application value.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信