Research on the personal privacy information protection problem based on computer security technology
- DOI
- 10.2991/amcce-15.2015.162How to use a DOI?
- Keywords
- Personalized anonymity; Public key system; Particle swarm; Group signature; K-anonymity; L-diversity
- Abstract
In order to improve the security of the individual privacy data, personal privacy information computer protection method has been designed using the public key system and the group signature, which adopted personalized privacy anonymity technology, and combined with the particle swarm algorithm. This method has orderly arranged personal privacy information by anonymous and non anonymous, the information sequence that needed key security encryption has finally obtained according to the security level. It is found that this algorithm is better than two kinds of protection model k-anonymity and l-diversity in the aspect of the protection limitation of personal privacy information, through the security attack test in the same period of time, the protection number using this algorithm is also more than others . It is a very University security protection method for computer privacy , which can effectively resist five types of attacks that contains links, homogeneity, background knowledge, skewness and approximate.
- Copyright
- © 2015, the Authors. Published by Atlantis Press.
- Open Access
- This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).
Cite this article
TY - CONF AU - Shuangxi Zhong AU - Min Zhang PY - 2015/04 DA - 2015/04 TI - Research on the personal privacy information protection problem based on computer security technology BT - Proceedings of the 2015 International Conference on Automation, Mechanical Control and Computational Engineering PB - Atlantis Press SP - 908 EP - 914 SN - 1951-6851 UR - https://doi.org/10.2991/amcce-15.2015.162 DO - 10.2991/amcce-15.2015.162 ID - Zhong2015/04 ER -