DATA PROTECTION AND PRIVACY PROTECTION OF ADVERTISING BASED ON CLOUD COMPUTING PLATFORM

被引:0
|
作者
Chen, Zhishe [1 ]
机构
[1] Wuchang Shouyi Univ, Sch Informat Sci & Engn, Wuhan 430064, Hubei, Peoples R China
来源
关键词
Privacy-preserving deep learning; Precise advertising; Secure computing; Privacy protection; Data mining; HEALTH-CARE; INNOVATION; SYSTEMS; SECURE;
D O I
10.12694/scpe.v25i5.3034
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
This paper uses the hybrid leapfrog algorithm to mine user information in encrypted advertisements effectively and intelligently. This method handles the nonlinearity of the original data by mapping it into kernel space. The representation of the original ciphertext in the kernel space is obtained by sparsely reconstructing the encrypted original advertising data. Build a corresponding scoring mechanism and select the best advertising data characteristics. The selected data were clustered using the data fuzzy clustering method based on the improved hybrid leapfrog. Set the adjustment coefficient to improve the local optimization performance of hybrid frog leaping. This algorithm uses the tightness and separation in genetic algorithms and constructs a fitness function to determine the clustering critical value. This enables the practical, intelligent mining of homomorphic passwords with privacy protection. Experimental results show that the method proposed in this article can effectively improve the convergence speed and accuracy of clustering. Improve Blowfish by combining multi-threading, sharing encryption and other methods. This enables encryption and decryption of large amounts of model data. The research of this project has very important research value in improving the security performance and effectiveness of cryptographic algorithms.
引用
下载
收藏
页码:3484 / 3488
页数:7
相关论文
共 50 条
  • [1] Data Security and Privacy Protection of Cloud Computing
    Dai Xuebing
    Wang Zhaojing
    Zhang Yan
    ADVANCES IN MECHATRONICS, AUTOMATION AND APPLIED INFORMATION TECHNOLOGIES, PTS 1 AND 2, 2014, 846-847 : 1570 - +
  • [2] Cloud computing data privacy protection method based on blockchain
    He, Yingjun
    Ouyang, Wenhui
    Li, Shaolong
    Wang, Lin
    Zhou, Jing
    Su, Wenwei
    Li, Shenzhang
    Mei, Donghui
    Shi, Yan
    Jin, Yanxu
    Li, Chenglin
    Ren, Yonghui
    INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2023, 14 (05) : 480 - 492
  • [4] A Medical Data Privacy Protection Scheme Based on Blockchain and Cloud Computing
    Huang, Liang
    Lee, Hyung-Hyo
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2020, 2020
  • [5] Research on the Strategies of Data Privacy Protection in Cloud Computing
    Li, Yi
    Zhang, Bo
    2016 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SECURITY (CSIS 2016), 2016, : 475 - 481
  • [6] A Survey of Data Security and Privacy Protection in Cloud Computing
    Yuan, Zhongbing
    Liu, Xiaojun
    PROCEEDINGS OF THE 2016 6TH INTERNATIONAL CONFERENCE ON MANAGEMENT, EDUCATION, INFORMATION AND CONTROL (MEICI 2016), 2016, 135 : 647 - 651
  • [7] Survey of Privacy Data Protection Technology in Cloud Computing
    Wang, Yang
    2016 3RD INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY FOR EDUCATION (ICTE 2016), 2016, : 143 - 145
  • [8] Wind power prediction method based on cloud computing and data privacy protection
    Zhang, Lei
    Zhu, Shaoming
    Su, Shen
    Chen, Xiaofeng
    Yang, Yan
    Zhou, Bing
    JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2024, 13 (01):
  • [9] Research on patient privacy protection for medical data in cloud computing
    Wu, D. (yzwdf@yeah.net), 1600, Academy Publisher, P.O.Box 40,, OULU, 90571, Finland (08):
  • [10] Privacy Protection Method in the Era of Cloud Computing and Big Data
    Liu, Ying
    INTERNATIONAL CONFERENCE ON ENGINEERING TECHNOLOGY AND APPLICATION (ICETA 2015), 2015, 22