CN112329067B - Network privacy protection method and device, electronic equipment and storage medium - Google Patents

Network privacy protection method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN112329067B
CN112329067B CN202011312015.3A CN202011312015A CN112329067B CN 112329067 B CN112329067 B CN 112329067B CN 202011312015 A CN202011312015 A CN 202011312015A CN 112329067 B CN112329067 B CN 112329067B
Authority
CN
China
Prior art keywords
terminal
data unit
node
privacy
verification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011312015.3A
Other languages
Chinese (zh)
Other versions
CN112329067A (en
Inventor
张雪菲
夏文博
李逸静
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing University of Posts and Telecommunications
Original Assignee
Beijing University of Posts and Telecommunications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing University of Posts and Telecommunications filed Critical Beijing University of Posts and Telecommunications
Priority to CN202011312015.3A priority Critical patent/CN112329067B/en
Publication of CN112329067A publication Critical patent/CN112329067A/en
Application granted granted Critical
Publication of CN112329067B publication Critical patent/CN112329067B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/22Indexing; Data structures therefor; Storage structures
    • G06F16/2228Indexing structures
    • G06F16/2255Hash tables
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/60Type of objects
    • G06V20/62Text, e.g. of license plates, overlay texts or captions on TV images
    • G06V20/625License plates

Abstract

The invention provides a network privacy protection method, a device, electronic equipment and a storage medium, wherein the method comprises the following steps: according to the DAG graph, calculating a reputation value of a first terminal by a historical data unit node uploaded by the first terminal to obtain the reputation value of the first terminal, and selecting a terminal successful authentication target number according to the reputation value of the first terminal; acquiring a hash value of a pointed node pointed by a data unit node, and establishing the data unit node by combining the successful authentication target number of the terminal and the privacy-removed network information; and transmitting the data unit node to a second terminal for verification, and adding the data unit node into a directed acyclic graph structure when the number of verification passing of the second terminal is received and exceeds the number of successful verification targets of the terminal. The public database with the decentralized directed acyclic graph is introduced to record the shared content uploaded by the terminals, and the shared content is associated with the reputation values of the terminals, so that the management of the reputation values of all the terminals is completed.

Description

Network privacy protection method and device, electronic equipment and storage medium
Technical Field
The present invention relates to the field of information processing technologies, and in particular, to a network privacy protection method, device, electronic apparatus, and storage medium.
Background
With the vast amount of information disclosed in networks, members of online networks generate a vast amount of information about others. When a user publishes information on a network, it is highly likely that other people's private information will also be inadvertently disclosed, which can pose serious challenges to privacy security.
In fact, in an online network, peers often have private details of their friends, which can be spread out very quickly. Therefore, in the online network, the information privacy problem about the information leakage of the peers is particularly prominent.
Therefore, how to better implement network privacy protection has become a problem to be solved in the industry.
Disclosure of Invention
The invention provides a network privacy protection method, a device, electronic equipment and a storage medium, which are used for solving the problem about companion information leakage in an online network.
The invention provides a network privacy protection method, which comprises the following steps:
according to the DAG graph, calculating a reputation value of a first terminal by a historical data unit node uploaded by the first terminal to obtain the reputation value of the first terminal, and selecting a terminal successful authentication target number according to the reputation value of the first terminal;
acquiring a hash value of a pointed node pointed by a data unit node, and establishing the data unit node by combining the successful authentication target number of the terminal and the privacy-removed network information;
and transmitting the data unit node to a second terminal for verification, and adding the data unit node into a directed acyclic graph structure when the number of verification passing of the second terminal is received and exceeds the number of successful verification targets of the terminal.
According to the network privacy protection method provided by the invention, before the step of acquiring the hash value of the pointed node pointed by the data unit node and creating the data unit node by combining the successful authentication target number of the terminal and the privacy-removed network information, the method further comprises the following steps:
sensitive field identification is carried out on the privacy network information, sensitive information of a misentering person in pictures and videos in the privacy network information is identified, and sensitive fields and sensitive information of the misentering person are obtained;
filtering sensitive fields in the privacy network information, and performing fuzzy processing on the sensitive information of the misentrant to obtain the privacy-removed network information.
According to the network privacy protection method provided by the invention, the step of calculating the reputation value of the first terminal according to the historical data unit node uploaded by the first terminal in the DAG graph specifically comprises the following steps:
comparing the accumulated weight of each historical data unit node with a preset weight threshold;
and differentiating the number of historical data unit nodes with accumulated weights exceeding a preset weight threshold value with the number of data unit nodes with failed authentication in the data unit nodes uploaded by the first terminal to obtain the reputation value of the first terminal.
According to the network privacy protection method provided by the invention, the step of obtaining the hash value of the pointed node pointed by the data unit node specifically comprises the following steps:
determining a pointed node pointed by the data unit node through a Markov Monte Carlo algorithm;
and taking the tip node as a father node of the data unit node, and acquiring the hash value of the tip node.
According to the network privacy protection method provided by the invention, the step of selecting the successful authentication target number of the terminal according to the credit value of the first terminal specifically comprises the following steps:
determining the reputation value grade of the first terminal according to the reputation value of the first terminal;
and determining the minimum terminal successful authentication number of the first terminal according to the reputation value grade, and selecting the terminal successful authentication target number.
The invention provides another network privacy protection method, which comprises the following steps:
privacy protection verification and reputation value verification are carried out on the data unit nodes uploaded by the first terminal;
under the condition that the data unit node uploaded by the first terminal passes privacy protection verification and reputation value verification at the same time, judging that the successful authentication number of the data unit node is increased by one;
and when the verification passing number of the data unit nodes exceeds the successful verification target number of the terminal, adding the data unit nodes into a directed acyclic graph structure.
According to another network privacy protection method provided by the invention, the steps of privacy protection verification and reputation value verification are carried out on the data unit node uploaded by the first terminal, and specifically include:
detecting the sensitive data field of the text information encapsulated in the data unit node to obtain a sensitive field detection result;
detecting the sensitive information of the false entrant by the picture and the video information packaged in the data unit node to obtain a detection result of the sensitive information of the false entrant;
and obtaining a privacy protection verification result according to the sensitive field detection result and the sensitive field detection result.
According to another network privacy protection method provided by the invention, the steps of privacy protection verification and reputation value verification for the data unit node uploaded by the first terminal specifically further comprise:
acquiring the number of nodes of a first terminal data unit failing to verify from a second terminal to obtain a first numerical value;
acquiring the number of data unit nodes with accumulated weight exceeding a preset weight threshold value uploaded by a first terminal in the DAG graph, and obtaining a second value;
and differencing the first numerical value and the second numerical value, and comparing a difference result with the reputation value of the first terminal to obtain a reputation value verification result.
The invention also provides a network privacy protection device, which comprises:
the creating module is used for creating a data unit node according to the privacy-removed network information uploaded by the first terminal;
the analysis module is used for calculating the reputation value of the first terminal according to the data unit node to obtain the reputation value of the first terminal, and obtaining the successful authentication target number of the terminal according to the reputation value of the first terminal;
and the protection module is used for transmitting the data unit node to the second terminal for verification, and adding the data unit node into the directed acyclic graph structure when the number of the verification passing of the second terminal is received and exceeds the successful verification target number of the terminal.
The invention also provides an electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the steps of any of the network privacy preserving methods described above when executing the program.
The present invention also provides a non-transitory computer readable storage medium having stored thereon a computer program which, when executed by a processor, implements the steps of a network privacy protection method as described in any of the above.
According to the network privacy protection method, device, electronic equipment and storage medium, the public database of the directed acyclic graph is introduced to record the shared content uploaded by the terminal, the shared content is associated with the reputation value of the terminal, the management of the reputation values of all terminals is further completed, the shared content subjected to privacy protection processing is issued to the peripheral terminals for privacy protection verification, and the shared content can be added into the directed acyclic graph structure after a certain number or more of terminals are successfully authenticated. Terminals with high credit values can select to upload the terminal successful authentication numbers to the directed acyclic graph structure with fewer terminal successful authentication numbers, so that uploading time is shortened, and after the accumulated weight values in the directed acyclic graph structure reach a certain threshold value, the credit values of the terminals are increased in turn, so that the terminals can be stimulated to use own resources to protect the privacy of other people, and the privacy leakage risk of the terminals is reduced.
Drawings
In order to more clearly illustrate the invention or the technical solutions of the prior art, the following description will briefly explain the drawings used in the embodiments or the description of the prior art, and it is obvious that the drawings in the following description are some embodiments of the invention, and other drawings can be obtained according to the drawings without inventive effort for a person skilled in the art.
Fig. 1 is a schematic flow chart of a network privacy protection method provided by the present invention;
FIG. 2 is a second flowchart of a network privacy protection method according to the present invention;
fig. 3 is a schematic diagram of a network privacy protection apparatus provided in the present invention;
fig. 4 is a schematic diagram of an entity structure of an electronic device according to the present invention.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the present invention more apparent, the technical solutions of the present invention will be clearly and completely described below with reference to the accompanying drawings, and it is apparent that the described embodiments are some embodiments of the present invention, not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
The network privacy protection method of the present invention is described below in conjunction with fig. 1-2.
Fig. 1 is a schematic flow chart of a network privacy protection method provided by the present invention, as shown in fig. 1, including:
step S1, calculating a reputation value of a first terminal according to a historical data unit node uploaded by the first terminal in a DAG graph to obtain the reputation value of the first terminal, and selecting a terminal successful authentication target number according to the reputation value of the first terminal;
specifically, the DAG graph in the present invention refers to a DAG graph stored in a first terminal, where all data unit nodes stored in the DAG graph include information of a historical data unit node uploaded by the first terminal. Specifically, the first terminal described in the present invention specifically refers to a terminal that needs to upload a data unit node, and the second terminal described in the present invention refers to a terminal that performs verification on the data unit node uploaded by the first terminal.
The data unit node described in the invention is a data node unit capable of adding a directed acyclic graph, wherein the data node unit stores encapsulated text information, picture information and video information, a reputation value of a terminal of the node is created, the data unit node adds a terminal required before the directed acyclic graph structure to successfully authenticate the target number, and the weight value of the data node unit.
The privacy removing network information described in the invention is information obtained by carrying out fuzzy processing on privacy in the network information of the terminal, and the privacy removing processing can avoid leakage of sensitive information of a network misentrant and leakage of companion information.
Specifically, by calculating the reputation value of the first terminal, the invention can determine the number of targets successfully authenticated by the terminal when the data unit node generated by the terminal needs to be added to the directed acyclic graph.
The invention can set different terminal successful authentication target numbers according to different credit values, correspondingly gives fewer target numbers to terminals with high credit values, correspondingly gives higher target numbers to terminals with low credit values, and can simultaneously ensure the reliability of verification under the condition of saving computing resources.
S2, obtaining a hash value of the pointed node pointed by the data unit node, and creating the data unit node by combining the successful authentication target number of the terminal and the privacy-removed network information;
at this time, the reputation value and the privacy-removing network information are already carried in the data unit node, which can facilitate the subsequent privacy-removing verification and reputation value verification of the second terminal.
And step S3, transmitting the data unit node to a second terminal for verification, and adding the data unit node into a directed acyclic graph structure when the number of verification passes of the second terminal is received and exceeds the number of successful verification targets of the terminal.
Specifically, in the invention, the second terminal performs secondary check on the sensitive information in the privacy-removed network information in the data unit node to determine that the data unit node uploaded by the first terminal does not contain the privacy information, and the security of network privacy protection is improved by performing secondary verification for a plurality of times, so that the data unit node finally uploaded to the directed acyclic graph is effectively improved.
The public database with the decentralized center, namely the directed acyclic graph, is introduced to record the shared content uploaded by the terminal, and the shared content is associated with the reputation value of the terminal, so that the management of the reputation values of all terminals is completed, the shared content subjected to privacy protection processing is issued to the peripheral terminal for privacy protection verification, and the shared content can be added into the directed acyclic graph structure after being successfully authenticated by a certain number of terminals or more. The terminal with high credit value can select to upload the terminal with less successful authentication number to the directed acyclic graph structure, thereby accelerating uploading time, and after the accumulated weight value in the directed acyclic graph structure reaches a certain threshold value, the credit value of the terminal is increased reversely, so that the terminal can be stimulated to use own resources to protect the privacy of other people, thereby reducing the risk of privacy disclosure of the terminal
In an embodiment, before the step of obtaining the hash value of the pointed node pointed to by the data unit node and creating the data unit node by combining the terminal successful authentication target number and the de-privacy network information, the method further includes:
sensitive field identification is carried out on the privacy network information, sensitive information of a misentering person in pictures and videos in the privacy network information is identified, and sensitive fields and sensitive information of the misentering person are obtained;
filtering sensitive fields in the privacy network information, and performing fuzzy processing on the sensitive information of the misentrant to obtain the privacy-removed network information.
Specifically, the privacy network information described in the present invention may refer to text information to be analyzed that requests uploading. Picture or video information.
The sensitive fields described in the present invention may specifically refer to fields related to sensitive information, such as a password, a bank card, etc.
The sensitive information of the misentering person described in the invention can refer to the face information and license plate number information of the misentering person in the pictures and videos, and can also refer to other sensitive information.
The first terminal detects a sensitive input field through text information encapsulated in a data unit node; detecting sensitive information of a misentering person in a photo or a video, filtering sensitive fields in privacy network information, and performing fuzzy processing on the sensitive information of the misentering person to obtain privacy-removed network information.
According to the invention, the network privacy can be better protected by carrying out the privacy removing treatment on the network information.
In an embodiment, the step of calculating, according to the DAG graph, the reputation value of the first terminal by the historical data unit node uploaded by the first terminal specifically includes:
comparing the accumulated weight of each historical data unit node with a preset weight threshold;
and differentiating the number of historical data unit nodes with accumulated weights exceeding a preset weight threshold value with the number of data unit nodes with failed authentication in the data unit nodes uploaded by the first terminal to obtain the reputation value of the first terminal.
In particular, the cumulative weight of each historical data unit node described in the present invention refers specifically to the weight of the historical data unit node itself, plus the sum of all parent node self weight values directly or indirectly pointing to the historical data unit node.
And carrying out difference between the number of the data unit nodes with the accumulated weight exceeding the preset weight threshold and the number of the data unit nodes which are failed to be authenticated in the first terminal, obtaining a reputation value of the first terminal, and storing the reputation value into the created data unit nodes.
In an embodiment, the step of obtaining the hash value of the pointed node pointed to by the data unit node specifically includes:
determining a pointed node pointed by the data unit node through a Markov Monte Carlo algorithm;
and taking the tip node as a father node of the data unit node, and acquiring the hash value of the tip node.
The invention selects k collision-free tip nodes as father nodes of the created data unit nodes through a Markov Monte Carlo algorithm, and stores hash values of the tip nodes into the created data unit nodes.
According to the embodiment of the invention, after the point node of the data unit node is determined through the Markov Monte Carlo algorithm, the reputation value of the first terminal is calculated, so that the follow-up steps are facilitated.
In an embodiment, the step of obtaining the target number of successful authentication of the terminal according to the reputation value of the first terminal specifically includes:
determining the reputation value grade of the first terminal according to the reputation value of the first terminal;
and determining the minimum terminal successful authentication number of the first terminal according to the reputation value grade, and selecting the terminal successful authentication target number.
Specifically, in the present application, there are preset reputation grades, which correspond to different reputation values, for example, when the reputation value is between 1 and 20, the reputation grade is determined to be three, when the reputation value is between 20 and 30, the reputation grade is determined to be two, and when the reputation value is between 30 and 40, the reputation grade is determined to be one.
Correspondingly, the credit level is one, and the minimum terminal successful authentication number of the terminal is 3; when the credit level is two, the minimum terminal successful authentication number of the terminal is 5; and when the credit level is three, the minimum number of successful terminal authentications of the terminal is 7.
The embodiment of the invention determines the minimum terminal successful authentication number of the terminal through the credit value, can dynamically adjust the minimum terminal successful authentication number of the terminal according to the credit value of the terminal, can reduce the calculated amount and accelerate the operation speed on the premise of ensuring the privacy protection reliability.
In an embodiment, before the step of transmitting the data unit node to the second terminal for authentication, the method further comprises:
specifically, the first terminal calculates the reputation value, then selects the successful authentication target number of the terminal according to the size of the reputation value, and the successful authentication target number of the terminal with different sizes can influence the size of the weight value.
Fig. 2 is a second flowchart of a network privacy protection method according to the present invention, as shown in fig. 2, including:
step S101, privacy protection verification and reputation value verification are carried out on the data unit nodes uploaded by the first terminal;
specifically, the second terminal in the invention can effectively ensure that the data in the data unit node is effectively subjected to privacy removal treatment by carrying out privacy protection verification and reputation value verification on the data unit node uploaded by the first terminal, thereby effectively improving the security of privacy protection.
And the number of the second terminals in the invention can be multiple.
Step S102, under the condition that the data unit node uploaded by the first terminal passes privacy protection verification and reputation value verification at the same time, judging that the successful authentication number of the data unit node is increased by one;
specifically, the reputation value described in the invention determines the number of successful authentication of the terminal, so that the invention not only needs to perform privacy protection verification in the data unit node, but also needs to perform reputation value verification additionally, thereby effectively guaranteeing the security of privacy protection.
If the second terminal judges that the data unit node uploaded by the first terminal passes privacy protection verification and reputation value verification at the same time, the number of successful terminal authentications of the first terminal is increased by 1.
And step S103, when the verification passing number of the data unit nodes exceeds the successful verification target number of the terminal, adding the data unit nodes into a directed acyclic graph structure.
Specifically, the number of successfully authenticated targets of the terminal described in the present invention refers to the number of authenticated data unit nodes passing through the second terminal.
And when the verification passing number of the data unit nodes exceeds the successful verification target number of the terminal, adding the data unit nodes into the self-stored directed acyclic graph structure, and finally sharing the self-stored directed acyclic graph structure to the peripheral terminal for updating, so that the peripheral terminal can synchronize the directed acyclic graph added with the data unit nodes.
The invention records the shared content uploaded by the terminal by introducing the decentralized public database of the directed acyclic graph, correlates the shared content with the reputation value of the terminal, further completes the management of the reputation values of all terminals, distributes the shared content subjected to privacy protection treatment to the peripheral terminal for privacy protection verification, and can be added into the directed acyclic graph structure after the shared content is successfully authenticated by a certain number or more of terminals. Terminals with high credit values can select to upload the terminal successful authentication numbers to the directed acyclic graph structure with fewer terminal successful authentication numbers, so that uploading time is shortened, and after the accumulated weight values in the directed acyclic graph structure reach a certain threshold value, the credit values of the terminals are increased in turn, so that the terminals can be stimulated to use own resources to protect the privacy of other people, and the privacy leakage risk of the terminals is reduced.
In an embodiment, the step of performing privacy protection verification and reputation value verification on the data unit node uploaded by the first terminal specifically includes:
detecting the sensitive data field of the text information encapsulated in the data unit node to obtain a sensitive field detection result;
detecting the sensitive information of the false entrant by the picture and the video information packaged in the data unit node to obtain a detection result of the sensitive information of the false entrant;
and obtaining a privacy protection verification result according to the sensitive field detection result and the sensitive field detection result.
Specifically, in the invention, the second terminal detects the sensitive data field of the encapsulated text information in the data unit node uploaded by the first terminal and the encapsulated picture and video information detect the sensitive information of the misentrant person, so as to verify the privacy-free condition in the first terminal, and if the privacy protection verification result shows that the second terminal can not detect the privacy information from the first terminal, or the proportion of the detected privacy information is lower, the privacy verification is judged to pass.
The invention processes the privacy-removed network information of the first terminal through the second terminal, thereby effectively ensuring the reliability of network privacy protection.
In an embodiment, the step of performing privacy protection verification and reputation value verification on the data unit node uploaded by the first terminal specifically further includes:
acquiring the number of nodes of a first terminal data unit failing to verify from a second terminal to obtain a first numerical value;
acquiring the number of historical data unit nodes with accumulated weights exceeding a preset weight threshold value uploaded by a first terminal in the DAG graph, and obtaining a second value;
and differencing the first numerical value and the second numerical value, and comparing a difference result with the reputation value of the first terminal to obtain a reputation value verification result.
Specifically, the second terminal calculates the number of nodes with accumulated weight reaching a certain threshold value in all data unit nodes issued by the first terminal according to the DAG graph structure held by the second terminal, and makes a difference with the number of authentication failures in the data unit nodes issued by the first terminal recorded by the second terminal, if the difference is smaller than a preset threshold value, reputation verification is not passed, and if the difference is larger than the preset threshold value, verification is judged to be passed.
And under the condition that the verification is not passed, the second terminal terminates the verification work of the data unit node and continues to receive and verify other data unit nodes.
Fig. 3 is a schematic diagram of a network privacy protection apparatus provided by the present invention, as shown in fig. 3, including: a creation module 310, an analysis module 320, and a protection module 330; the creating module 310 is configured to calculate, according to the historical data unit node uploaded by the first terminal in the DAG graph, a reputation value of the first terminal, obtain the reputation value of the first terminal, and select, according to the reputation value of the first terminal, a terminal successful authentication target number; the analysis module 320 is configured to obtain a hash value of a point node pointed by the data unit node, and create the data unit node by combining the terminal successful authentication target number and the de-privacy network information; the protection module 330 is configured to send the data unit node to the second terminal for verification, and add the data unit node to the directed acyclic graph structure when the number of verification passes of the second terminal is received and exceeds the number of successful verification targets of the terminal.
More specifically, the apparatus further includes a de-privacy module configured to: sensitive field identification is carried out on the privacy network information, sensitive information of a misentering person in pictures and videos in the privacy network information is identified, and sensitive fields and sensitive information of the misentering person are obtained;
filtering sensitive fields in the privacy network information, and performing fuzzy processing on the sensitive information of the misentrant to obtain the privacy-removed network information.
More specifically, the analysis module is specifically configured to:
comparing the accumulated weight of each historical data unit node with a preset weight threshold;
and differentiating the number of historical data unit nodes with accumulated weights exceeding a preset weight threshold value with the number of data unit nodes with failed authentication in the data unit nodes uploaded by the first terminal to obtain the reputation value of the first terminal.
Determining a pointed node pointed by the data unit node through a Markov Monte Carlo algorithm;
and taking the tip node as a father node of the data unit node, and acquiring the hash value of the tip node.
More specifically, the analysis module is further specifically configured to: determining the reputation value grade of the first terminal according to the reputation value of the first terminal;
and determining the minimum terminal successful authentication number of the first terminal according to the reputation value grade, and selecting the terminal successful authentication target number.
The invention records the shared content uploaded by the terminal by introducing the decentralized public database of the directed acyclic graph, correlates the shared content with the reputation value of the terminal, further completes the management of the reputation values of all terminals, distributes the shared content subjected to privacy protection treatment to the peripheral terminal for privacy protection verification, and can be added into the directed acyclic graph structure after the shared content is successfully authenticated by a certain number or more of terminals. Terminals with high credit values can select to upload the terminal successful authentication numbers to the directed acyclic graph structure with fewer terminal successful authentication numbers, so that uploading time is shortened, and after the accumulated weight values in the directed acyclic graph structure reach a certain threshold value, the credit values of the terminals are increased in turn, so that the terminals can be stimulated to use own resources to protect the privacy of other people, and the privacy leakage risk of the terminals is reduced.
Fig. 4 is a schematic physical structure of an electronic device according to the present invention, as shown in fig. 4, the electronic device may include: processor 410, communication interface (Communications Interface) 420, memory 430 and communication bus 440, wherein processor 410, communication interface 420 and memory 430 communicate with each other via communication bus 440. The processor 410 may invoke logic instructions in the memory 430 to perform a network privacy preserving method comprising: according to the DAG graph, calculating a reputation value of a first terminal by a historical data unit node uploaded by the first terminal to obtain the reputation value of the first terminal, and selecting a terminal successful authentication target number according to the reputation value of the first terminal; acquiring a hash value of a pointed node pointed by a data unit node, and establishing the data unit node by combining the successful authentication target number of the terminal and the privacy-removed network information; and transmitting the data unit node to a second terminal for verification, and adding the data unit node into a directed acyclic graph structure when the number of verification passing of the second terminal is received and exceeds the number of successful verification targets of the terminal.
Further, the logic instructions in the memory 430 described above may be implemented in the form of software functional units and may be stored in a computer-readable storage medium when sold or used as a stand-alone product. Based on this understanding, the technical solution of the present invention may be embodied essentially or in a part contributing to the prior art or in a part of the technical solution, in the form of a software product stored in a storage medium, comprising several instructions for causing a computer device (which may be a personal computer, a server, a network device, etc.) to perform all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), a magnetic disk, or an optical disk, or other various media capable of storing program codes.
In another aspect, the present invention also provides a computer program product comprising a computer program stored on a non-transitory computer readable storage medium, the computer program comprising program instructions which, when executed by a computer, enable the computer to perform a network privacy protection method provided by the above methods, the method comprising: according to the DAG graph, calculating a reputation value of a first terminal by a historical data unit node uploaded by the first terminal to obtain the reputation value of the first terminal, and selecting a terminal successful authentication target number according to the reputation value of the first terminal; acquiring a hash value of a pointed node pointed by a data unit node, and establishing the data unit node by combining the successful authentication target number of the terminal and the privacy-removed network information; and transmitting the data unit node to a second terminal for verification, and adding the data unit node into a directed acyclic graph structure when the number of verification passing of the second terminal is received and exceeds the number of successful verification targets of the terminal.
In yet another aspect, the present invention also provides a non-transitory computer readable storage medium having stored thereon a computer program which, when executed by a processor, is implemented to perform the network privacy protection method provided by the above embodiments, the method comprising: according to the DAG graph, calculating a reputation value of a first terminal by a historical data unit node uploaded by the first terminal to obtain the reputation value of the first terminal, and selecting a terminal successful authentication target number according to the reputation value of the first terminal; acquiring a hash value of a pointed node pointed by a data unit node, and establishing the data unit node by combining the successful authentication target number of the terminal and the privacy-removed network information; and transmitting the data unit node to a second terminal for verification, and adding the data unit node into a directed acyclic graph structure when the number of verification passing of the second terminal is received and exceeds the number of successful verification targets of the terminal.
The apparatus embodiments described above are merely illustrative, wherein the elements illustrated as separate elements may or may not be physically separate, and the elements shown as elements may or may not be physical elements, may be located in one place, or may be distributed over a plurality of network elements. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of this embodiment. Those of ordinary skill in the art will understand and implement the present invention without undue burden.
From the above description of the embodiments, it will be apparent to those skilled in the art that the embodiments may be implemented by means of software plus necessary general hardware platforms, or of course may be implemented by means of hardware. Based on this understanding, the foregoing technical solution may be embodied essentially or in a part contributing to the prior art in the form of a software product, which may be stored in a computer readable storage medium, such as ROM/RAM, a magnetic disk, an optical disk, etc., including several instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the method described in the respective embodiments or some parts of the embodiments.
Finally, it should be noted that: the above embodiments are only for illustrating the technical solution of the present invention, and are not limiting; although the invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit and scope of the technical solutions of the embodiments of the present invention.

Claims (9)

1. A method for protecting network privacy, comprising:
according to the DAG graph, calculating a reputation value of a first terminal by a historical data unit node uploaded by the first terminal to obtain the reputation value of the first terminal, and selecting a terminal successful authentication target number according to the reputation value of the first terminal;
acquiring a hash value of a pointed node pointed by a data unit node, and establishing the data unit node by combining the successful authentication target number of the terminal and the privacy-removed network information; transmitting the data unit node to a second terminal for verification, and adding the data unit node into a directed acyclic graph structure when the number of verification passing of the second terminal is received and exceeds the number of successful authentication targets of the terminal;
before the step of obtaining the hash value of the pointed node pointed by the data unit node and creating the data unit node by combining the successful authentication target number of the terminal and the de-privacy network information, the method further comprises the following steps:
sensitive field identification is carried out on the privacy network information, sensitive information of a misentering person in pictures and videos in the privacy network information is identified, and sensitive fields and sensitive information of the misentering person are obtained;
filtering sensitive fields in the privacy network information, and performing fuzzy processing on the sensitive information of the misentrant to obtain privacy-removed network information;
the step of obtaining the hash value of the pointed node pointed by the data unit node specifically includes:
determining a pointed node pointed by the data unit node through a Markov Monte Carlo algorithm;
and taking the tip node as a father node of the data unit node, and acquiring the hash value of the tip node.
2. The network privacy protection method according to claim 1, wherein the step of calculating the reputation value of the first terminal according to the historical data unit node uploaded by the first terminal in the DAG graph specifically comprises:
comparing the accumulated weight of each historical data unit node with a preset weight threshold;
and differentiating the number of historical data unit nodes with accumulated weights exceeding a preset weight threshold value with the number of data unit nodes with failed authentication in the data unit nodes uploaded by the first terminal to obtain the reputation value of the first terminal.
3. The network privacy protection method according to claim 2, wherein the step of selecting the number of successful authentication targets of the terminal according to the reputation value of the first terminal specifically comprises:
determining the reputation value grade of the first terminal according to the reputation value of the first terminal;
and determining the minimum terminal successful authentication number of the first terminal according to the reputation value grade, and selecting the terminal successful authentication target number.
4. A method for protecting network privacy, comprising:
privacy protection verification and reputation value verification are carried out on the data unit nodes uploaded by the first terminal;
under the condition that the data unit node uploaded by the first terminal passes privacy protection verification and reputation value verification at the same time, judging that the successful authentication number of the data unit node is increased by one;
when the number of the data unit nodes passing verification exceeds the target number of successful authentication of the terminal, adding the data unit nodes into a directed acyclic graph structure;
the data unit node is a data node unit capable of adding a directed acyclic graph, wherein packaged text information, picture information and video information are stored;
wherein the number of successful authentication targets for the terminal is determined based on the reputation value of the first terminal.
5. The network privacy protection method according to claim 4, wherein the step of performing privacy protection verification and reputation value verification on the data unit node uploaded by the first terminal specifically comprises:
detecting the sensitive data field of the text information encapsulated in the data unit node to obtain a sensitive field detection result;
detecting the sensitive information of the false entrant by the picture and the video information packaged in the data unit node to obtain a detection result of the sensitive information of the false entrant;
and obtaining a privacy protection verification result according to the sensitive field detection result and the sensitive field detection result.
6. The network privacy protection method according to claim 4, wherein the step of performing privacy protection verification and reputation value verification on the data unit node uploaded by the first terminal specifically further comprises:
acquiring the number of nodes of a first terminal data unit failing to verify from a second terminal to obtain a first numerical value;
acquiring the number of historical data unit nodes with accumulated weights exceeding a preset weight threshold value uploaded by a first terminal in the DAG graph, and obtaining a second value;
and differencing the first numerical value and the second numerical value, and comparing a difference result with the reputation value of the first terminal to obtain a reputation value verification result.
7. A network privacy preserving apparatus, comprising:
the creation module is used for calculating the reputation value of the first terminal according to the historical data unit node uploaded by the first terminal in the DAG graph to obtain the reputation value of the first terminal, and obtaining the successful authentication target number of the selected terminal according to the reputation value of the first terminal;
the analysis module is used for acquiring the hash value of the pointed node pointed by the data unit node and creating the data unit node by combining the successful authentication target number of the terminal and the privacy-removed network information;
the protection module is used for transmitting the data unit node to the second terminal for verification, and adding the data unit node into a directed acyclic graph structure when the number of the second terminal verification passes is received and exceeds the number of the terminal successful authentication targets;
wherein, the device is specifically used for:
sensitive field identification is carried out on the privacy network information, sensitive information of a misentering person in pictures and videos in the privacy network information is identified, and sensitive fields and sensitive information of the misentering person are obtained;
filtering sensitive fields in the privacy network information, and performing fuzzy processing on the sensitive information of the misentrant to obtain privacy-removed network information;
determining a pointed node pointed by the data unit node through a Markov Monte Carlo algorithm;
and taking the tip node as a father node of the data unit node, and acquiring the hash value of the tip node.
8. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the steps of the network privacy protection method of any of claims 1 to 6 when the program is executed by the processor.
9. A non-transitory computer readable storage medium, on which a computer program is stored, characterized in that the computer program, when executed by a processor, implements the steps of the network privacy protection method according to any one of claims 1 to 6.
CN202011312015.3A 2020-11-20 2020-11-20 Network privacy protection method and device, electronic equipment and storage medium Active CN112329067B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011312015.3A CN112329067B (en) 2020-11-20 2020-11-20 Network privacy protection method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011312015.3A CN112329067B (en) 2020-11-20 2020-11-20 Network privacy protection method and device, electronic equipment and storage medium

Publications (2)

Publication Number Publication Date
CN112329067A CN112329067A (en) 2021-02-05
CN112329067B true CN112329067B (en) 2023-04-28

Family

ID=74321412

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011312015.3A Active CN112329067B (en) 2020-11-20 2020-11-20 Network privacy protection method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN112329067B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110557403A (en) * 2019-09-26 2019-12-10 腾讯科技(深圳)有限公司 Resource allocation method and device based on block chain, storage medium and node equipment
CN110784346A (en) * 2019-10-18 2020-02-11 深圳供电局有限公司 Reputation value-based PBFT consensus system and method
CN111431695A (en) * 2020-03-24 2020-07-17 武汉理工大学 Software defined tactical network node credit management method based on block chain

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9729662B2 (en) * 2014-08-11 2017-08-08 Cisco Technology, Inc. Probabilistic lazy-forwarding technique without validation in a content centric network

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110557403A (en) * 2019-09-26 2019-12-10 腾讯科技(深圳)有限公司 Resource allocation method and device based on block chain, storage medium and node equipment
CN110784346A (en) * 2019-10-18 2020-02-11 深圳供电局有限公司 Reputation value-based PBFT consensus system and method
CN111431695A (en) * 2020-03-24 2020-07-17 武汉理工大学 Software defined tactical network node credit management method based on block chain

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
When Blockchain meets Online Social Networks;Barbara;《Pervasive and Mobile Computing》;20191127;第62卷;全文 *
区块链技术在社交网络中的应用研究;刘琦;《中国优秀硕士学位论文全文数据库》;20190115;第 信息科技 卷(第1期);全文 *

Also Published As

Publication number Publication date
CN112329067A (en) 2021-02-05

Similar Documents

Publication Publication Date Title
CN107645482B (en) Risk control method and device for business operation
JP6432210B2 (en) Security system, security method, security device, and program
CN109756458B (en) Identity authentication method and system
CN111415163B (en) Block chain-based service processing and verifying method, system and verifying node
US10659482B2 (en) Robotic process automation resource insulation system
US20160080355A1 (en) Authentication of api-based endpoints
CN107169499B (en) Risk identification method and device
CN108073821B (en) Data security processing method and device
US9667613B1 (en) Detecting mobile device emulation
CN111262701A (en) Replay attack detection method, system, equipment and storage medium
CN110598383B (en) Method and device for removing account authority limit
US20200293638A1 (en) Modifying application function based on login attempt confidence score
US20170155683A1 (en) Remedial action for release of threat data
CN111506889A (en) User verification method and device based on similar user group
TW201929481A (en) Identity authentication method, server and client device
WO2013116117A1 (en) Facial recognition streamlined login
CN107040497B (en) Network account anti-theft method and device
CN106375259B (en) Same-user account identification method and device
CN110020531A (en) Internet of things equipment risk checking method and device
CN112329067B (en) Network privacy protection method and device, electronic equipment and storage medium
US20220303293A1 (en) Methods of monitoring and protecting access to online services
CN107995167B (en) Equipment identification method and server
CN115208611A (en) Identity authentication method, identity authentication device, computer equipment, storage medium and program product
CN105427143B (en) Method and device for carrying out system security control
KR20150131846A (en) Method and System for preventing Login ID theft using captcha

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant