Font Size: a A A

Research And Usage Of Anonymous Privacy Protection Technology In Barter Trader System

Posted on:2014-01-19Degree:MasterType:Thesis
Country:ChinaCandidate:Q XiaoFull Text:PDF
GTID:2248330395980921Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
With the rapid development of science and technology and computer technology continuing to progress, people’s lives become increasingly inseparable from the computer, especially the rapid development of the network in nearly three decades makes the exchange of information that is no longer limited by distance, time, space. In the process of information exchange, there will inevitably be issues of privacy, so more and more attention has been paid on privacy protection technologies.Modern enterprises, especially those engaged in the online trading business enterprises, on the one hand, possess the user’s data and transaction data which are precious "virtual" assets can’t easily leak; On the other hand, on the condition that the sensitive data was leaked, companies also need to analyze the data. This article is based on a real-life scenario.Thesis including static publishing and dynamic publishing focus on anonymized privacy protection technologies in two categories, static method mainly includes K Anonymous (k-anonymity) and the L diversity (1-diversity); while the dynamic publishing method is mainly the mainstream-m invariance (m-invariance). To summarize the limitations of static distribution method and m Invariance versatility, combined with the protection requirements of the transaction data, and to improve and optimize existing m Invariance, which makes the method better suited for numerical data the same time an increase in barter trading platform subsystems the anonymous treatment used to achieve the purpose of privacy data protection barter trading platform. In this paper, the research content is as follows:1.Analyze static method mainly includes K-anonymous (k-anonymity) and L diverse (1-diversity) principles, processes and limitations, which is as dynamic publishing the premise and foundation; 2.Give m invariance (m-invariance) dynamic method detailed description and analysis of its entire process, identify some limitations in terms of performance as well as for numeric attributes processing defects, and then proposed an improved based m invariance (m-invariance) new ways to complete the requirements of the need to deal with numerical attributes;3.Implement Ideas and processes based on the previously discussed methods, complete barter trading platform for information dissemination subsystem design and implementation.
Keywords/Search Tags:Anonymization, M-invariance, NCm-invariance, Publishing subsystem
PDF Full Text Request
Related items