吉林大学学报(信息科学版) ›› 2021, Vol. 39 ›› Issue (5): 504-511.

• • 上一篇    下一篇

基于概率统计的网络用户隐私保护算法研究

汪小黎, 王 晓, 李会荣   

  1. 商洛学院 数学与计算机应用学院, 陕西 商州 726000
  • 收稿日期:2021-05-26 出版日期:2021-10-01 发布日期:2021-10-01
  • 作者简介:汪小黎 ( 1964— ), 女, 陕西柞水人, 商洛学院副教授, 主要从事应用数学研究, ( Tel) 86-13992400937 ( E-mail)wangxiaoli154@163.com。
  • 基金资助:
    陕西省教育厅专项科研计划基金资助项目 ( 16JK1243 ); 商洛学院 2021 年课程思政示范课程建设基金资助项目 (21jyjxs108)

Research on Internet User Privacy Protection Algorithm Based on Probability Statistics

WANG Xiaoli, WANG Xiao, LI Huirong   

  1. School of Mathematics and Computer Application, Shangluo University, Shangzhou 726000, China
  • Received:2021-05-26 Online:2021-10-01 Published:2021-10-01

摘要: 当前网络用户隐私保护算法在实现时, 未将数据中的噪声点进行剔除, 导致算法加密耗时长、安全指数 低、完整性差, 严重影响网络用户的应用体验感, 为此, 提出基于概率统计的网络用户隐私保护算法。 首先通 过小波变换阈值法对数据进行降噪处理, 消除数据在采集时产生的不确定因素, 使算法在加密过程中耗时更 短; 为提高算法安全指数, 采用层次分析方法在概率统计知识的基础上建立隐私保护层次分析模型, 并利用该 模型通过 Logistic 混沌映射系统, 对获得的隐私保护目标值进行加密, 实现对网络用户的隐私保护。 实验对比 结果表明, 所提算法加密耗时短, 安全指数高, 完整性更好, 可以被广泛运用。

关键词: 小波变换阈值法; , 降噪处理; , 概率统计知识; , 隐私保护层次分析模型; , Logistic 混沌映射系统

Abstract: When the current privacy protection algorithm for network users is implemented, the noise points in the data are not removed, which leads to long time-consuming encryption, low security index, and poor integrity, which seriously affects the application experience of network users. Therefore, a network based on probability statistics is proposed using privacy protection algorithm. First, the wavelet transform threshold method is used to reduce the noise of the data to eliminate the uncertain factors generated during the data collection, so that the algorithm consumes less time in the encryption process. In order to improve the security index of the algorithm, the analytic hierarchy process is used in probability statistics. On the basis of knowledge, a privacy protection hierarchical analysis model is established, and the model is used to encrypt the obtained privacy protection target value through the Logistic chaotic mapping system to realize the privacy protection of network users. The experimental comparison results show that the proposed algorithm has short time-consuming encryption, high security index and better integrity, and can be widely used.

Key words: Wavelet transform threshold method, noise reduction processing, knowledge of probability statistics, privacy protection analytic hierarchy model, Logistic chaotic mapping system

中图分类号: 

  • TN918. 2