Research on the personal privacy information protection problem based on computer security technology
Shuangxi Zhong, Min Zhang
Available Online April 2015.
- https://doi.org/10.2991/amcce-15.2015.162How to use a DOI?
- Personalized anonymity; Public key system; Particle swarm; Group signature; K-anonymity; L-diversity
- In order to improve the security of the individual privacy data, personal privacy information computer protection method has been designed using the public key system and the group signature, which adopted personalized privacy anonymity technology, and combined with the particle swarm algorithm. This method has orderly arranged personal privacy information by anonymous and non anonymous, the information sequence that needed key security encryption has finally obtained according to the security level. It is found that this algorithm is better than two kinds of protection model k-anonymity and l-diversity in the aspect of the protection limitation of personal privacy information, through the security attack test in the same period of time, the protection number using this algorithm is also more than others . It is a very University security protection method for computer privacy , which can effectively resist five types of attacks that contains links, homogeneity, background knowledge, skewness and approximate.
- Open Access
- This is an open access article distributed under the CC BY-NC license.
Cite this article
TY - CONF AU - Shuangxi Zhong AU - Min Zhang PY - 2015/04 DA - 2015/04 TI - Research on the personal privacy information protection problem based on computer security technology BT - 2015 International Conference on Automation, Mechanical Control and Computational Engineering PB - Atlantis Press SN - 1951-6851 UR - https://doi.org/10.2991/amcce-15.2015.162 DO - https://doi.org/10.2991/amcce-15.2015.162 ID - Zhong2015/04 ER -