期刊文献+

电子交易中保护消费者隐私相关性分析

Correlation Analysis on Consumer Privacy-protecting Big-data in Electronic Transaction Systems
下载PDF
导出
摘要 对电子交易中的消费数据进行统计分析能方便向消费者提供更好的服务.针对消费数据容易暴露消费者隐私等安全问题,提出了一种有效实用的解决方案,首先将消费者数据分块存储在多服务器中,同时服务器采用Paillier同态加密算法对各自所存储的数据加密,并对分析者进行访问控制,确保仅授权分析者可获得结果.最后在密文域上完成安全计算与统计分析,有效防止半诚实服务器的内部攻击.分析表明,在不泄露消费者隐私的前提下,可有效完成相关统计分析,具有较高实用价值. In order to protect consumer data from attacks in electronic transactions,a practical privacy-preserving correlation analysis scheme was proposed.To prevent internal attacks,consumer data were separated into several parts and stored in different servers.The access was controlled to ensure that the unauthorized analyzer could not obtain any results.The homomorphic Paillier cryptosystem was used for the security calculation.To ensuring consumer privacy,the statistical correlation analysis of the big data were implemented.The correctness of the scheme was analyzed,and the computational and communication complexity were also provided,which indicated the scheme could achieve the efficient analysis without revealing consumers′privacy.
作者 陈文倩 赵岚 张亦茹 CHEN Wenqian;ZHAO Lan;ZHANG Yiru(School of Computers,Hubei University of Technology,Wuhan 430068,China;Innovation Center of Industrial Big-Data,Hubei University of Technology,Wuhan 430068,China;Guangzhou Middle School,Guangzhou 510000,China)
出处 《郑州大学学报(理学版)》 CAS 北大核心 2019年第4期43-48,共6页 Journal of Zhengzhou University:Natural Science Edition
基金 国家自然科学基金项目(61702168,61701173) 湖北省自然科学基金面上项目(2017CFB596)
关键词 相关性分析 访问控制 Paillier同态加密 保护隐私 statistical correlation analysis access control Paillier cryptosystem privacy protection
  • 相关文献

参考文献4

二级参考文献35

  • 1孙平,徐宗本,申建中.基于核化原理的非线性典型相关判别分析[J].计算机学报,2004,27(6):789-795. 被引量:11
  • 2Ziba Eslami, Saideh Kabiri Rad. A new verifiable multi-secret sharing scheme based on bilinear maps [J]. Wireless Personal Communications, 2012, 63 (2): 459-467.
  • 3Gentry C. Fully homomorphic encryption using ideal lattices [C] //Proc of the ACM Int' 1 Syrup on Theory of Computing, 2009: 13-17.
  • 4郑强.不同模型下若干安全多方计算问题的研究[D].北京:北京邮电大学,2011:12-15.
  • 5Dong W, Wang V. Secure friend discovery in mobile social network [C] //INFOCOM, 2011.. 46-48.
  • 6周青停.基于Paillier密码体制的点积协议研究[D].云南:云南大学,2012.
  • 7Gentry C. Fully homomorphic encryption using ideallattices [ C ] Proceedings of the forty-first annualACM Sysposium on Theory of Computing. NY, USA:IEEE,2009:169-178.
  • 8Kantarcioglu,M Kardes. Privacy-preserving data min-ing in the malicious model[C]// Proceeding of the Sev-enth IEEE International Data Uining Wo9rkshops. O-maha,NE:IEEE, 2007: 717-722.
  • 9魏志强,康密军,贾东宁,殷波,周炜.普适计算隐私保护策略研究[J].计算机学报,2010,33(1):128-138. 被引量:25
  • 10钱萍,吴蒙.同态加密隐私保护数据挖掘方法综述[J].计算机应用研究,2011,28(5):1614-1617. 被引量:31

共引文献246

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部