Marketing data security and privacy protection based on federated gamma in cloud computing environment

被引:0
|
作者
Zhang C. [1 ]
Pan Z. [2 ]
Hou C. [1 ]
机构
[1] State Grid Beijing Electric Power Company, Daxing District, Beijing
[2] State Grid Beijing Information and Telecommunication Company, Beijing
关键词
Data security; Federated learning; Quality security; System design;
D O I
10.1016/j.ijin.2023.09.003
中图分类号
学科分类号
摘要
This study aims to address the existing data security and user privacy vulnerabilities in the “cloud” environment, which is essential for ensuring the safety and integrity of data in the era of big data and cloud computing. To achieve this purpose, we propose a novel approach that combines the logit link function with a longitudinal joint learning framework for the gamma regression model. This approach enhances the application of the model and the loss function, providing a robust solution for data security and user privacy in cloud-based systems. While cloud computing technology has greatly improved the convenience of work and life, it has also introduced significant challenges related to data security and user privacy. This study leverages semantic web technology and blockchain technology to establish a distributed and credit-guaranteed product quality and safety traceability application. By designing a concept verification system and ensuring data integrity at each stage of the product supply chain, this approach addresses these challenges effectively. The distributed network architecture employed in our technical design ensures overall system stability, reliability, and sustainability, with no single point of failure. © 2023
引用
下载
收藏
页码:261 / 271
页数:10
相关论文
共 50 条
  • [41] Security and Privacy in Cloud Computing
    Tari, Zahir
    IEEE CLOUD COMPUTING, 2014, 1 (01): : 54 - 57
  • [42] Enhancement for Data Security in Cloud Computing Environment
    Gawali, M. B.
    Wagh, R. B.
    3RD NIRMA UNIVERSITY INTERNATIONAL CONFERENCE ON ENGINEERING (NUICONE 2012), 2012,
  • [43] Security and Privacy in Cloud Computing
    Hamouda, Sara
    2012 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGIES, APPLICATIONS AND MANAGEMENT (ICCCTAM), 2012, : 241 - 245
  • [44] Security and Privacy in Cloud Computing
    Xiao, Zhifeng
    Xiao, Yang
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2013, 15 (02): : 843 - 859
  • [45] Security and Privacy in Cloud Computing
    Soni, Rajat
    Ambalkar, Smrutee
    Bansal, Pratosh
    2016 SYMPOSIUM ON COLOSSAL DATA ANALYSIS AND NETWORKING (CDAN), 2016,
  • [46] Data Security and Privacy Protection for Cloud Storage: A Survey
    Yang, Pan
    Xiong, Naixue
    Ren, Jingli
    IEEE ACCESS, 2020, 8 : 131723 - 131740
  • [47] Research on the key technology of data security protection based on cloud computing
    Guo, Juan
    PROCEEDINGS OF THE 2015 3RD INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND INFORMATION TECHNOLOGY APPLICATIONS, 2015, 35 : 66 - 69
  • [48] Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing
    Zhang, Yinghui
    Chen, Xiaofeng
    Li, Jin
    Wong, Duncan S.
    Li, Hui
    You, Ilsun
    INFORMATION SCIENCES, 2017, 379 : 42 - 61
  • [49] Privacy preserving model-based authentication and data security in cloud computing
    Pawar, Ankush Balaram
    Ghumbre, Shashikant U.
    Jogdand, Rashmi M.
    INTERNATIONAL JOURNAL OF PERVASIVE COMPUTING AND COMMUNICATIONS, 2023, 19 (02) : 173 - 190
  • [50] Wind power prediction method based on cloud computing and data privacy protection
    Zhang, Lei
    Zhu, Shaoming
    Su, Shen
    Chen, Xiaofeng
    Yang, Yan
    Zhou, Bing
    JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2024, 13 (01):