A New Mining and Protection Method Based on Sensitive Data

The traditional method of sensitive data identification for data stream has a large amount of calculation and does not reflect the impact of time on the data value, and the mining accuracy is not high. In view of the above problems we firstly adopt the sliding window mechanism to divide the data flo...

Full description

Bibliographic Details
Main Authors: Xiaoyao Zheng, Yuqing Liu, Hao You, Liangmin Guo, Chuanxin Zhao
Format: Article
Language:English
Published: Hindawi Limited 2018-01-01
Series:Journal of Control Science and Engineering
Online Access:http://dx.doi.org/10.1155/2018/1864703
id doaj-25cecc3a4fb64804a82d7b5598cfb3ee
record_format Article
spelling doaj-25cecc3a4fb64804a82d7b5598cfb3ee2020-11-24T20:55:57ZengHindawi LimitedJournal of Control Science and Engineering1687-52491687-52572018-01-01201810.1155/2018/18647031864703A New Mining and Protection Method Based on Sensitive DataXiaoyao Zheng0Yuqing Liu1Hao You2Liangmin Guo3Chuanxin Zhao4School of Computer and Information, Anhui Normal University, Anhui, Wuhu 241002, ChinaSchool of Computer Science and Technology, Soochow University, Jiangsu, Suzhou 215000, ChinaSchool of Computer and Information, Anhui Normal University, Anhui, Wuhu 241002, ChinaSchool of Computer and Information, Anhui Normal University, Anhui, Wuhu 241002, ChinaSchool of Computer and Information, Anhui Normal University, Anhui, Wuhu 241002, ChinaThe traditional method of sensitive data identification for data stream has a large amount of calculation and does not reflect the impact of time on the data value, and the mining accuracy is not high. In view of the above problems we firstly adopt the sliding window mechanism to divide the data flow according to time and delay the dataset according to the characteristics of the data flow in the sliding window to achieve the purpose of saving time and space. At the same time, threshold sensitivity analysis is used to find out the optimal threshold. Finally, a K-anonymous algorithm based on dynamic rounding function is employed to achieve the protection of sensitive data. Theoretical analysis and experimental results show that the algorithm can effectively mine the sensitive data in the data stream and can effectively protect the sensitive data.http://dx.doi.org/10.1155/2018/1864703
collection DOAJ
language English
format Article
sources DOAJ
author Xiaoyao Zheng
Yuqing Liu
Hao You
Liangmin Guo
Chuanxin Zhao
spellingShingle Xiaoyao Zheng
Yuqing Liu
Hao You
Liangmin Guo
Chuanxin Zhao
A New Mining and Protection Method Based on Sensitive Data
Journal of Control Science and Engineering
author_facet Xiaoyao Zheng
Yuqing Liu
Hao You
Liangmin Guo
Chuanxin Zhao
author_sort Xiaoyao Zheng
title A New Mining and Protection Method Based on Sensitive Data
title_short A New Mining and Protection Method Based on Sensitive Data
title_full A New Mining and Protection Method Based on Sensitive Data
title_fullStr A New Mining and Protection Method Based on Sensitive Data
title_full_unstemmed A New Mining and Protection Method Based on Sensitive Data
title_sort new mining and protection method based on sensitive data
publisher Hindawi Limited
series Journal of Control Science and Engineering
issn 1687-5249
1687-5257
publishDate 2018-01-01
description The traditional method of sensitive data identification for data stream has a large amount of calculation and does not reflect the impact of time on the data value, and the mining accuracy is not high. In view of the above problems we firstly adopt the sliding window mechanism to divide the data flow according to time and delay the dataset according to the characteristics of the data flow in the sliding window to achieve the purpose of saving time and space. At the same time, threshold sensitivity analysis is used to find out the optimal threshold. Finally, a K-anonymous algorithm based on dynamic rounding function is employed to achieve the protection of sensitive data. Theoretical analysis and experimental results show that the algorithm can effectively mine the sensitive data in the data stream and can effectively protect the sensitive data.
url http://dx.doi.org/10.1155/2018/1864703
work_keys_str_mv AT xiaoyaozheng anewminingandprotectionmethodbasedonsensitivedata
AT yuqingliu anewminingandprotectionmethodbasedonsensitivedata
AT haoyou anewminingandprotectionmethodbasedonsensitivedata
AT liangminguo anewminingandprotectionmethodbasedonsensitivedata
AT chuanxinzhao anewminingandprotectionmethodbasedonsensitivedata
AT xiaoyaozheng newminingandprotectionmethodbasedonsensitivedata
AT yuqingliu newminingandprotectionmethodbasedonsensitivedata
AT haoyou newminingandprotectionmethodbasedonsensitivedata
AT liangminguo newminingandprotectionmethodbasedonsensitivedata
AT chuanxinzhao newminingandprotectionmethodbasedonsensitivedata
_version_ 1716791392695484416