Journal on Communications ›› 2023, Vol. 44 ›› Issue (5): 94-109.doi: 10.11959/j.issn.1000-436x.2023083

• Papers • Previous Articles     Next Articles

Fine-grained privacy operation control method for layout documents

Peijie YIN1,2, Fenghua LI1,2, Ben NIU1, Haiyang LUO1,2, Bin KUANG1,2, Lingcui ZHANG1   

  1. 1 Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100085, China
    2 School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100049, China
  • Revised:2023-03-17 Online:2023-05-25 Published:2023-05-01
  • Supported by:
    The National Key Research and Development Program of China(2021YFB3101301);The National Natural Science Foundation of China(61932015);Major Programs of the National Social Science Foundation of China(22&ZD147)

Abstract:

In view of the problem of privacy information disclosure caused by uncontrolled forwarding in the context of frequent exchange of privacy information, a fine-grained privacy operation control method for layout documents was proposed, which could achieve differentiated fine-grained privacy operation control according to the requirements of the sharer during the sharing process of privacy information.For the received multimodal layout document, the existing privacy operation control strategy was extracted, which combined the current sharer’s use attribute and the receiver’s privacy protection ability and other factors.The privacy operation control strategy was generated iteratively, and an abstract control strategy generation algorithm framework was given.Based on the iterative privacy operation control strategy and combined with specific operation scenarios, the differentiated data-masking control, exchange boundary control and local use control were carried out for different modes of information components, and the abstract privacy operation control algorithm framework was given.A prototype system for privacy operation control of OFD (open fixed-layout document) was developed to verify the above algorithms.The generation and delivery of iterative privacy operation control strategy based on friendship, as well as the differential data-masking control, exchange boundary control and local use control of OFD were implemented in the instant messaging system.

Key words: privacy operation control, iteration, layout document

CLC Number: 

No Suggested Reading articles found!