期刊文献+

基于转移函数的移动网络海量数据隐私泄露检测技术 被引量:3

Massive Data Privacy Disclosure Detection Technology in Mobile Network Based on Transfer Function
下载PDF
导出
摘要 移动终端网络数据规模大,采用传统方法对海量数据隐私泄露进行检测时,无法保证网络中所有查询结果均参与运算,不能保证检测结果的准确性。为此,提出一种新的移动终端网络海量数据隐私泄露检测方法。把设计系统安装于移动运营商核心网,构建检测系统模型。将半格看作数据分析方式,通过半格元素对移动终端网络数据信息进行描述。采集程序中和变量使用相关的信息,对数据在基本块间传输与修改过程进行研究,实现对所有移动终端网络数据的分析。令全部查询结果参与运算。前向遍历基本块中的函数,依据函数类别,按基本块内污点规则对污点数据与漂白污点数据施行更新。获取转移函数,将转移函数应用于格值,得到隐私泄露数据。依据T-D法建立隐私泄露检测模型,对其进行优化,获取K-匿名隐私泄露检测模型。通过K-Q法对其进行求解,实现移动终端网络海量数据隐私泄露检测。实验结果表明,相对于传统方法,检测准确性较高,具有广泛的应用价值。 When mobile terminal network data is large and traditional methods are used to detect massive data privacy leaks , it is impossible to guarantee that all query results in the network are involved in operation , and the accuracy of detection results can not be guaranteed. To this end,a new detection metliod for privacy disclosure of mass data in mobile terminal networks is proposed. The design system is installed in the mobile operator core network, and the detection system model is built. The semilattice as a data analysis method,, through the semi lattice elements of the mobile terminal information network data acquisition program and variable description,using the related information,and modify the process of transmission of data in the basic block,realize the analysis of all mobile networl data,so that all query results involved in operation. A forward traversal basic block function,basis function category,according to the basic block stain rules on tainted data and bleach tainted data update,obtain the transfer function,the transfer function of Hugh application value,get data privacy.The privacy leak detection model is established based on the T-D method,and it is optimized to obtain the K-anonymous privacy leak detection model.The K-Q method is used to solve it,and the mass data privacy leak detection of the mobile terminal network is realized. The experimental results show that the proposed metiiod has a high accuracy and wide application value compared with the traditional method.
作者 高文莲 白凤凤 GAO Wen-Lian;BAI Feng-feng(Department of Computer Science and Technology,Liiliang University,Liiliang 033000,Chin)
出处 《科学技术与工程》 北大核心 2018年第21期76-81,共6页 Science Technology and Engineering
基金 山西省教育教学改革课题(J2016115) 吕梁学院教学改革课题(JYZD201601)资助
关键词 移动终端 网络 海量数据 隐私泄露 检测 mobile terminal network massive data privacy disclosure detection
  • 相关文献

参考文献15

二级参考文献157

  • 1孙岚,吴英杰,罗钊,王一蕾.路网环境下防止重放攻击的位置隐私保护算法[J].华中科技大学学报(自然科学版),2013,41(S2):285-290. 被引量:4
  • 2杨欢,张玉清,胡予濮,刘奇旭.基于权限频繁模式挖掘算法的Android恶意应用检测方法[J].通信学报,2013,34(S1):106-115. 被引量:47
  • 3张二勇,李云峰,王玮.Surfer软件绘图接口的开发及应用[J].地下水,2005,27(3):212-214. 被引量:18
  • 4谭学瑞,邓聚龙.灰色关联分析:多因素统计分析新方法[J].统计研究,1995,12(3):46-48. 被引量:338
  • 5LAWTON G.New technology prevents data leakage[J].Computer,2008,41(9):14-17.
  • 6YOSHIHAMA S,MISHINA T,MATSUMOTO T.Web-based data leakage prevention[C]//Proceedings of the 5th International Workshop on Security.Piscataway:IEEE,2010:78-93.
  • 7SCHEAR N,KINTANA C,ZHANG Q,et al.Glavlit:Preventing exfiltration at wire speed[J].Irvine Is Burning,2012,12(5):133-140.
  • 8YUMEREFENDI A R,MICKLE B,COX L P.TightLip:Keeping applications from spilling the beans[C]// Proceedings of the 9th USENIX Symposium on Networked Systems and Design and Implementation.Berkeley:USENIX Association,2012:289-296.
  • 9KLONOWSKI M,KOZA M,KUTYLOWSKI M.Efficient and robust data aggregation using untrusted infrastructure[C]// Proceedings of the 6th International Conference on Security of Information and Networks.New York:ACM,2013:123-130.
  • 10MITZENMACHER M.Compressed bloom filters[J].IEEE/ACM Transactions on Networking,2002,10(5):604-612.

共引文献111

同被引文献29

引证文献3

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部