A New Mining and Protection Method Based on Sensitive Data
The traditional method of sensitive data identification for data stream has a large amount of calculation and does not reflect the impact of time on the data value, and the mining accuracy is not high. In view of the above problems we firstly adopt the sliding window mechanism to divide the data flo...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi Limited
2018-01-01
|
Series: | Journal of Control Science and Engineering |
Online Access: | http://dx.doi.org/10.1155/2018/1864703 |
id |
doaj-25cecc3a4fb64804a82d7b5598cfb3ee |
---|---|
record_format |
Article |
spelling |
doaj-25cecc3a4fb64804a82d7b5598cfb3ee2020-11-24T20:55:57ZengHindawi LimitedJournal of Control Science and Engineering1687-52491687-52572018-01-01201810.1155/2018/18647031864703A New Mining and Protection Method Based on Sensitive DataXiaoyao Zheng0Yuqing Liu1Hao You2Liangmin Guo3Chuanxin Zhao4School of Computer and Information, Anhui Normal University, Anhui, Wuhu 241002, ChinaSchool of Computer Science and Technology, Soochow University, Jiangsu, Suzhou 215000, ChinaSchool of Computer and Information, Anhui Normal University, Anhui, Wuhu 241002, ChinaSchool of Computer and Information, Anhui Normal University, Anhui, Wuhu 241002, ChinaSchool of Computer and Information, Anhui Normal University, Anhui, Wuhu 241002, ChinaThe traditional method of sensitive data identification for data stream has a large amount of calculation and does not reflect the impact of time on the data value, and the mining accuracy is not high. In view of the above problems we firstly adopt the sliding window mechanism to divide the data flow according to time and delay the dataset according to the characteristics of the data flow in the sliding window to achieve the purpose of saving time and space. At the same time, threshold sensitivity analysis is used to find out the optimal threshold. Finally, a K-anonymous algorithm based on dynamic rounding function is employed to achieve the protection of sensitive data. Theoretical analysis and experimental results show that the algorithm can effectively mine the sensitive data in the data stream and can effectively protect the sensitive data.http://dx.doi.org/10.1155/2018/1864703 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Xiaoyao Zheng Yuqing Liu Hao You Liangmin Guo Chuanxin Zhao |
spellingShingle |
Xiaoyao Zheng Yuqing Liu Hao You Liangmin Guo Chuanxin Zhao A New Mining and Protection Method Based on Sensitive Data Journal of Control Science and Engineering |
author_facet |
Xiaoyao Zheng Yuqing Liu Hao You Liangmin Guo Chuanxin Zhao |
author_sort |
Xiaoyao Zheng |
title |
A New Mining and Protection Method Based on Sensitive Data |
title_short |
A New Mining and Protection Method Based on Sensitive Data |
title_full |
A New Mining and Protection Method Based on Sensitive Data |
title_fullStr |
A New Mining and Protection Method Based on Sensitive Data |
title_full_unstemmed |
A New Mining and Protection Method Based on Sensitive Data |
title_sort |
new mining and protection method based on sensitive data |
publisher |
Hindawi Limited |
series |
Journal of Control Science and Engineering |
issn |
1687-5249 1687-5257 |
publishDate |
2018-01-01 |
description |
The traditional method of sensitive data identification for data stream has a large amount of calculation and does not reflect the impact of time on the data value, and the mining accuracy is not high. In view of the above problems we firstly adopt the sliding window mechanism to divide the data flow according to time and delay the dataset according to the characteristics of the data flow in the sliding window to achieve the purpose of saving time and space. At the same time, threshold sensitivity analysis is used to find out the optimal threshold. Finally, a K-anonymous algorithm based on dynamic rounding function is employed to achieve the protection of sensitive data. Theoretical analysis and experimental results show that the algorithm can effectively mine the sensitive data in the data stream and can effectively protect the sensitive data. |
url |
http://dx.doi.org/10.1155/2018/1864703 |
work_keys_str_mv |
AT xiaoyaozheng anewminingandprotectionmethodbasedonsensitivedata AT yuqingliu anewminingandprotectionmethodbasedonsensitivedata AT haoyou anewminingandprotectionmethodbasedonsensitivedata AT liangminguo anewminingandprotectionmethodbasedonsensitivedata AT chuanxinzhao anewminingandprotectionmethodbasedonsensitivedata AT xiaoyaozheng newminingandprotectionmethodbasedonsensitivedata AT yuqingliu newminingandprotectionmethodbasedonsensitivedata AT haoyou newminingandprotectionmethodbasedonsensitivedata AT liangminguo newminingandprotectionmethodbasedonsensitivedata AT chuanxinzhao newminingandprotectionmethodbasedonsensitivedata |
_version_ |
1716791392695484416 |