Font Size: a A A

Research On Data Privacy Protection Technology Based On Edge Computing

Posted on:2022-12-09Degree:MasterType:Thesis
Country:ChinaCandidate:S H WuFull Text:PDF
GTID:2518306764980639Subject:Computer Software and Application of Computer
Abstract/Summary:PDF Full Text Request
In the edge computing architecture,with the increasing types of intelligent devices at the edge,there are more and more data types of edge node devices.Based on preventing malicious users from mining massive data of various edge node devices for illegal sales and causing great losses,it is inevitable to require more research on privacy protection in the edge computing environment,so as to promote the development of edge computing and ensure the security of data privacy at the same time.Therefore,thesis will consider the privacy protection in the edge computing environment,analyze the different types of large data sets of edge devices,and design relevant privacy protection schemes.The research on privacy protection mainly focuses on the differential privacy disturbance protection technology and anonymous privacy protection technology in privacy protection.Through the research on the basis of these two kinds of technologies,a new privacy protection technology based on the improved basic technology is designed to improve the privacy in the edge computing environment,so as to the data security of intelligent device in edge computing environment is guaranteed.The main research work of thesis is as follows:(1)Thesis analyzes the privacy protection methods suitable for different types of stored data on the device side in fixed occasions in the edge computing environment;(2)According to the privacy protection required by a certain type of data,the PSO(particle swarm optimization)algorithm,the principle of genetic algorithm and clustering algorithm are studied,and the clustering anonymous optimization algorithm based on edge computing environment is constructed,including the clustering anonymous optimization algorithm of genetic optimization clustering and the clustering anonymous optimization algorithm of Partricle Swarm Optimization clustering;(3)An example is simulated based on the optimized anonymous model,and the results are analyzed by comparing the model with the corresponding indexes.(4)For the privacy protection required by another type of data,the principles and characteristics of reasoning model algorithm,differential model algorithm and time series analysis model algorithm are studied.A differential privacy protection model based on edge computing environment is constructed,and the simulation results are analyzed based on the model example.The research direction of thesis is a module of the Laboratory Task Group,namely the Privacy Protection Module,which takes different types of data as the research point and aims to achieve data privacy,the models suitable for different data in the terminal of edge computing system are studied,and then the simulation results are analyzed and verified.
Keywords/Search Tags:Anonymous Privacy, Differential Privacy, Optimization Algorithm
PDF Full Text Request
Related items