基于数值分析的匿名大数据访问最优控制算法
CSTR:
作者:
作者单位:

(齐齐哈尔大学 理学院,黑龙江 齐齐哈尔 161006)

作者简介:

周 莉(1976-),女,黑龙江齐齐哈尔人,硕士研究生,副教授,主要从事应用数学方向的研究。 [FQ)]

通讯作者:

中图分类号:

基金项目:

黑龙江省教育厅基本业务专项理工面上项目(135109229);国家科技支撑计划课题(2013BAK12B0803)。


An Anonymous Large Data Access Control Algorithm Based on Numerical Analysis
Author:
Affiliation:

(College of Science,Qiqihar University,Qiqihar 161006,China)

Fund Project:

  • 摘要
  • |
  • 图/表
  • |
  • 访问统计
  • |
  • 参考文献
  • |
  • 相似文献
  • |
  • 引证文献
  • |
  • 资源附件
  • |
  • 文章评论
    摘要:

    为了降低大数据访问对人们生活的影响,减少因数据访问带来的一系列问题,更好地保护用户的隐私,需要对匿名大数据访问进行控制;当前算法是利用Purpose建立匿名大数据访问模型,在原来的K-匿名算法基础上为Purpose匿名数据访问模型构建算法,该算法对公开信息隐私安全涉及较少,对分布式数据隐私的安全保障效果不理想;为此,提出一种基于数值分析的匿名大数据访问最优控制算法;该算法利用MapReduce编程框架对匿名大数据用户的公钥和私钥进行初始化,将计算代理权授权,用户把需要保存的数据以及授权传送给第三方,也就是代理方签名,实现匿名大数据的审计;根据属性群对匿名大数据访问进行控制,系统管理员构建一棵二叉树,通过对称加密算法与属性群路径密钥,加密的群密钥,产生报头消息,根据上述所获结果,管理员对属性群密钥进行生成、更新和分发;实验结果证明,所提算法计算开销、存储开销以及通信开销较低,匿名大数据访问控制的效率高,具有较强的可实践性,为该领域的研究发展提供了支撑。

    Abstract:

    In order to reduce the influence of the big data access to people’s life, and brings a series of questions to reduce the data access, better protect the privacy of our users, need for anonymous big data access control. The current algorithm is used in the Purpose to establish anonymous data access model, on the basis of the original K - anonymous algorithm for the Purpose of anonymous data access model construction algorithm, the algorithm and the public information privacy about less, the safety of the distributed data privacy protection effect is not ideal. In this paper, an optimal control algorithm for anonymous large data access based on numerical analysis is proposed. The algorithm using graphs programming framework for big data anonymous user's public key and a private key is initialized, calculates the agency authorization, users of the need to save the data, and authorized to transfer to a third party, namely proxy signature, anonymous big data audit. According to the properties of anonymous data access control, the system administrator to construct a binary tree, through the symmetric encryption algorithm and the path to the key attribute group, group of key encryption, produce the header information, according to the results obtained, the administrator to generate key attribute group, update, and distribution. The experimental results show that the proposed algorithm calculation cost, storage cost and communication overhead is lower, the anonymity of the big data access control with high efficiency, strong practical, provided support to the research development of the field.

    参考文献
    相似文献
    引证文献
引用本文

周莉,王伟华,张敬.基于数值分析的匿名大数据访问最优控制算法计算机测量与控制[J].,2017,25(12):215-218.

复制
分享
文章指标
  • 点击次数:
  • 下载次数:
  • HTML阅读次数:
  • 引用次数:
历史
  • 收稿日期:2017-05-15
  • 最后修改日期:2017-05-26
  • 录用日期:
  • 在线发布日期: 2018-01-04
  • 出版日期:
文章二维码