[go: up one dir, main page]

CN114491650A - A desensitization encryption method and system for geospatial information - Google Patents

A desensitization encryption method and system for geospatial information Download PDF

Info

Publication number
CN114491650A
CN114491650A CN202210385958.1A CN202210385958A CN114491650A CN 114491650 A CN114491650 A CN 114491650A CN 202210385958 A CN202210385958 A CN 202210385958A CN 114491650 A CN114491650 A CN 114491650A
Authority
CN
China
Prior art keywords
data
attribute
land
ownership
feature
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210385958.1A
Other languages
Chinese (zh)
Other versions
CN114491650B (en
Inventor
洪勇
罗冷坤
谢田晋
刘琛
姜益民
董朝阳
李纯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan Optics Valley Information Technology Co ltd
Original Assignee
Wuhan Optics Valley Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Optics Valley Information Technology Co ltd filed Critical Wuhan Optics Valley Information Technology Co ltd
Priority to CN202210385958.1A priority Critical patent/CN114491650B/en
Publication of CN114491650A publication Critical patent/CN114491650A/en
Application granted granted Critical
Publication of CN114491650B publication Critical patent/CN114491650B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/29Geographical information databases

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Data Mining & Analysis (AREA)
  • Remote Sensing (AREA)
  • Medical Informatics (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Storage Device Security (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

本发明提供一种地理空间信息脱敏加密方法及系统,方法包括:按照时空属性、权属属性和地类属性对地理空间信息数据进行统计分类;分别基于时空坐标转换法对时空属性数据、基于纵向权属特征交换重组法对权属属性数据以及基于地类特征归一化处理方法对地类属性数据进行脱敏加密;对脱敏加密后的地理空间数据进行数据重组,构成地理统计数据;对地理统计数据与所述地理空间信息数据进行数据校验。本发明分别通过时空坐标转换法、纵向权属特征交换重组法和地类特征归一化处理方法对时空属性数据、权重属性数据和地类属性数据进行脱敏加密,提高了数据脱敏加密的速度以及满足数据加密的可靠性。

Figure 202210385958

The invention provides a method and system for desensitizing and encrypting geospatial information. The method includes: performing statistical classification on geospatial information data according to space-time attributes, ownership attributes and land type attributes; The vertical ownership feature exchange and reorganization method desensitizes and encrypts the ownership attribute data and the land category attribute data based on the normalization processing method of land category features; performs data reorganization on the desensitized and encrypted geospatial data to form geographic statistical data; Data verification is performed on the geostatistical data and the geospatial information data. The present invention desensitizes and encrypts the spatiotemporal attribute data, weight attribute data and land type attribute data through the space-time coordinate conversion method, the vertical ownership feature exchange and reorganization method and the land type feature normalization processing method, thereby improving the data desensitization and encryption efficiency. speed and reliability for data encryption.

Figure 202210385958

Description

一种地理空间信息脱敏加密方法及系统A desensitization encryption method and system for geospatial information

技术领域technical field

本发明涉及数据安全领域,更具体地,涉及一种地理空间信息脱敏加密方法及系统。The invention relates to the field of data security, and more particularly, to a method and system for desensitizing and encrypting geospatial information.

背景技术Background technique

随着地理信息行业的上下游产业链快速发展,数据治理技术已从传统的金融、医疗、党政、教育等大数据行业向地理信息行业衍生。同时也为地理信息大数据隐私安全问题带来冲击,有效的地理空间信息数据脱敏加密将对地理信息行业发展起到至关重要作用。传统行业数据类型多为文本、图像、语音数据为主,数据特征信息较为单一、数据结构较为规整,目前硬件层面主要采用硬件隔离的方式进行数据加密,但也阻断了数据的流通性;软件层面主要采用分布式学习、联邦学习、数据库动态更新等技术进行隐私脱敏加密。地理空间信息数据主要包含时空位置信息、权属信息、地类特征信息等敏感信息,数据空间层级更为复杂,传统的数据治理手段显然难以满足需求。With the rapid development of the upstream and downstream industrial chains of the geographic information industry, data governance technology has been derived from the traditional big data industries such as finance, medical care, party and government, and education to the geographic information industry. At the same time, it also has an impact on the privacy and security of geographic information big data. Effective desensitization and encryption of geospatial information will play a vital role in the development of the geographic information industry. Traditional industry data types are mostly text, image, and voice data. The data feature information is relatively simple, and the data structure is relatively regular. At present, hardware isolation is mainly used for data encryption at the hardware level, but it also blocks the flow of data; software; At the level, technologies such as distributed learning, federated learning, and database dynamic update are mainly used for privacy desensitization encryption. Geospatial information data mainly includes sensitive information such as spatiotemporal location information, ownership information, and land type feature information. The spatial level of data is more complex, and traditional data governance methods are obviously difficult to meet the needs.

国土空间信息数据中包含大量的个人隐私信息以及国家战略部署信息,传统的数据清洗、统计、分析手段会保留数据的敏感属性,无法实现数据公开流通,难以满足多部门交叉协作管理。基于多要素分离的地理空间信息脱敏加密方法依次对数据进行解译、分层加密、清洗、统计、校验,保证数据加密后的有效性和迁移性,推动地理信息行业中数据产业链发展,同时也为遥感测绘技术与地理信息隐私安全计算结合创造契机。The land and space information data contains a large amount of personal privacy information and national strategic deployment information. Traditional data cleaning, statistics, and analysis methods will retain the sensitive attributes of the data, which cannot realize the open circulation of data, and it is difficult to meet the multi-departmental cross-cooperative management. The desensitization and encryption method of geospatial information based on multi-element separation interprets, encrypts, cleans, counts, and checks the data in sequence to ensure the validity and migration of the encrypted data, and promote the development of the data industry chain in the geographic information industry. At the same time, it also creates an opportunity for the combination of remote sensing mapping technology and geographic information privacy and security computing.

发明内容SUMMARY OF THE INVENTION

本发明针对现有技术中存在的技术问题,提供一种地理空间信息脱敏加密方法及系统,能够提高数据脱敏加密的速度和保证数据加密的可靠性。Aiming at the technical problems existing in the prior art, the present invention provides a method and system for desensitizing and encrypting geospatial information, which can improve the speed of data desensitization and encryption and ensure the reliability of data encryption.

根据本发明的第一方面,提供了一种地理空间信息脱敏加密方法,包括:According to a first aspect of the present invention, a desensitization encryption method for geospatial information is provided, comprising:

步骤1,对地理空间信息数据进行空间约束掩膜处理,并按照时空属性、权属属性和地类属性对地理空间信息数据进行统计分类,得到时空属性数据、权属属性数据和地类属性数据;Step 1: Perform spatial constraint mask processing on the geospatial information data, and perform statistical classification on the geospatial information data according to space-time attributes, ownership attributes and land type attributes, and obtain spatio-temporal attribute data, ownership attribute data and land type attribute data ;

步骤2,分别基于时空坐标转换法对所述时空属性数据、基于纵向权属特征交换重组法对所述权属属性数据以及基于地类特征归一化处理方法对所述地类属性数据进行脱敏加密;Step 2: Detach the spatiotemporal attribute data based on the spatiotemporal coordinate transformation method, the property attribute data based on the vertical property feature exchange and reorganization method, and the land type attribute data based on the land type feature normalization processing method. sensitive encryption;

步骤3,对脱敏加密后的地理空间数据进行数据重组,构成地理统计数据;Step 3, performing data reorganization on the desensitized and encrypted geospatial data to form geographic statistical data;

步骤4,对所述地理统计数据与所述地理空间信息数据进行数据校验。Step 4: Perform data verification on the geographic statistical data and the geographic spatial information data.

在上述技术方案的基础上,本发明还可以作出如下改进。On the basis of the above technical solutions, the present invention can also make the following improvements.

可选的,所述步骤2中基于时空坐标转换法对所述时空属性数据进行脱敏加密,包括:Optionally, performing desensitization and encryption on the spatiotemporal attribute data based on the spatiotemporal coordinate transformation method in the step 2, including:

对所述时空属性数据进行两次切片;slicing the spatiotemporal attribute data twice;

基于两次切片后的每一个切片数据的尺寸大小和坐标,计算每一个切片数据的旋转角和坐标转换后的尺寸大小;Based on the size and coordinates of each slice data after two slices, calculate the rotation angle of each slice data and the size after coordinate conversion;

基于每一个切片数据的旋转角和坐标转换后的尺寸大小,对两次切片后的每一个切片数据进行脱敏加密处理。Based on the rotation angle of each slice data and the size after coordinate conversion, desensitization and encryption processing is performed on each slice data after two slices.

可选的,所述对所述时空属性数据进行两次切片,包括:Optionally, the slicing of the spatiotemporal attribute data twice includes:

按照M*N尺寸对所述时空属性数据进行第一次切片;Slice the spatiotemporal attribute data for the first time according to the M*N size;

按照X*Y尺寸对第一次切片后的每一个切片数据进行第二次切片;Perform a second slice of each sliced data after the first slice according to the X*Y size;

相应的,所述基于两次切片后的每一个切片数据的尺寸大小和坐标,计算每一个切片数据的旋转角和投影坐标转换后的尺寸大小,包括:Correspondingly, based on the size and coordinates of each sliced data after two slices, the rotation angle of each sliced data and the converted size of the projection coordinates are calculated, including:

设两次切片后的切片数据的坐标为(x,y),则所述切片数据的旋转角θ为:Assuming that the coordinates of the sliced data after two slices are (x, y), the rotation angle θ of the sliced data is:

Figure 734357DEST_PATH_IMAGE001
Figure 734357DEST_PATH_IMAGE001
;

其中,k1、k2和k3为坐标偏移常数,

Figure 260016DEST_PATH_IMAGE002
的取值范围为(0,90); where k 1 , k 2 and k 3 are coordinate offset constants,
Figure 260016DEST_PATH_IMAGE002
The value range is (0, 90);

所述切片数据投影坐标转换后的尺寸为:The dimension of the slice data after projection coordinate transformation is:

Figure 948617DEST_PATH_IMAGE003
Figure 948617DEST_PATH_IMAGE003

Figure 508912DEST_PATH_IMAGE004
Figure 508912DEST_PATH_IMAGE004
;

其中,Xt、Yt表示投影坐标转换后的切片数据尺寸;Among them, X t , Y t represent the slice data size after projection coordinate conversion;

基于每一个切片数据的旋转角和投影坐标转换后的尺寸大小,对二次切片后的每一个切片数据进行投影坐标转换,获得脱敏加密后的时空属性数据。Based on the rotation angle of each slice data and the size of the converted projection coordinates, each slice data after the second slice is subjected to projection coordinate conversion to obtain desensitized and encrypted spatiotemporal attribute data.

可选的,所述基于纵向权属特征交换重组法对所述权属属性数据进行脱敏加密,包括:Optionally, performing desensitization and encryption on the ownership attribute data based on the vertical ownership feature exchange and reorganization method, including:

设数据A中包含数据特征P,数据B中包含数据特征Q和标签特征M,当数据A和数据B作为样本数据与标签M共同来构建算法模型时,将特征P和特征Q中的部分特征进行交换构成新权属特征Pt和QtSuppose that data A contains data feature P, and data B contains data feature Q and label feature M. When data A and data B are used as sample data to construct an algorithm model together with label M, some features in feature P and feature Q are used to construct an algorithm model. Swap to form new tenure features Pt and Qt .

可选的,所述将特征P和特征Q中的部分特征进行交换构成新权属特征Pt和Qt,包括:Optionally, the part of features in feature P and feature Q are exchanged to form new property features P t and Q t , including:

设数据A的初始特征图集

Figure 562449DEST_PATH_IMAGE005
,数据B的初始特征图集
Figure 122875DEST_PATH_IMAGE006
,i和j为特征数据的下标; Let the initial feature atlas of data A be
Figure 562449DEST_PATH_IMAGE005
, the initial feature atlas of data B
Figure 122875DEST_PATH_IMAGE006
, i and j are the subscripts of the feature data;

对于初始特征图集P的最后一列

Figure 67697DEST_PATH_IMAGE007
,采用初始特征图集Q的最 后一列
Figure 427704DEST_PATH_IMAGE008
代替,并在初始特征图集P中添加一列
Figure 793088DEST_PATH_IMAGE009
, 得到新权属特征Pt; For the last column of the initial feature atlas P
Figure 67697DEST_PATH_IMAGE007
, using the last column of the initial feature atlas Q
Figure 427704DEST_PATH_IMAGE008
instead, and add a column to the initial feature atlas P
Figure 793088DEST_PATH_IMAGE009
, obtain the new ownership feature P t ;

对于初始特征图集Q的最后一列

Figure 558919DEST_PATH_IMAGE010
,采用初始特征图集P的 最后一列
Figure 524076DEST_PATH_IMAGE011
代替,得到新权属特征Qt。For the last column of the initial feature atlas Q
Figure 558919DEST_PATH_IMAGE010
, using the last column of the initial feature atlas P
Figure 524076DEST_PATH_IMAGE011
Instead, a new ownership feature Qt is obtained.

可选的,所述基于地类特征归一化处理方法对所述地类属性数据进行脱敏加密,包括:Optionally, performing desensitization and encryption on the land type attribute data based on the land type feature normalization processing method, including:

对于所述地类属性数据,基于农用地、建筑用地、林地、水域和未利用地五个地类来统一地类属性,将所述地类属性数据归整为五大地类属性数据。For the land type attribute data, the land type attributes are unified based on the five land types of agricultural land, construction land, forest land, water area and unused land, and the land type attribute data are grouped into five major land type attribute data.

根据本发明的第二方面,提供一种地理空间信息脱敏加密系统,包括:According to a second aspect of the present invention, a desensitization and encryption system for geospatial information is provided, comprising:

统计分类模块,用于对地理空间信息数据进行空间约束掩膜处理,并按照时空属性、权属属性和地类属性对地理空间信息数据进行统计分类,得到时空属性数据、权属属性数据和地类属性数据;The statistical classification module is used to perform spatial constraint mask processing on geospatial information data, and perform statistical classification of geospatial information data according to space-time attributes, ownership attributes and land type attributes, and obtain spatio-temporal attribute data, ownership attribute data and land type attributes. class attribute data;

脱敏加密模块,用于分别基于时空坐标转换法对所述时空属性数据、基于纵向权属特征交换重组法对所述权属属性数据以及基于地类特征归一化处理方法对所述地类属性数据进行脱敏加密;The desensitization and encryption module is used for respectively processing the space-time attribute data based on the space-time coordinate transformation method, the ownership attribute data based on the vertical ownership feature exchange and reorganization method, and the land type feature normalization processing method. Attribute data is desensitized and encrypted;

数据重组模块,用于对脱敏加密后的地理空间数据进行数据重组,构成地理统计数据;The data reorganization module is used to reorganize the desensitized and encrypted geospatial data to form geographic statistical data;

数据校验模块,用于对所述地理统计数据与所述地理空间信息数据进行数据校验。A data verification module, configured to perform data verification on the geographic statistical data and the geographic spatial information data.

根据本发明的第三方面,提供了一种电子设备,包括存储器、处理器,所述处理器用于执行存储器中存储的计算机管理类程序时实现地理空间信息脱敏加密方法的步骤。According to a third aspect of the present invention, an electronic device is provided, including a memory and a processor, wherein the processor is configured to implement the steps of a method for desensitizing and encrypting geospatial information when executing a computer management program stored in the memory.

根据本发明的第四方面,提供了一种计算机可读存储介质,其上存储有计算机管理类程序,所述计算机管理类程序被处理器执行时实现地理空间信息脱敏加密方法的步骤。According to a fourth aspect of the present invention, a computer-readable storage medium is provided, on which a computer management program is stored, and when the computer management program is executed by a processor, the steps of the method for desensitizing and encrypting geospatial information are implemented.

本发明提供的一种地理空间信息脱敏加密方法及系统,首先将地理空间信息数据属性进行解译剖析,对数据属性按照时空属性、权属属性、地类属性归类整理得到一级数据源;然后分别采用时空坐标转换、纵向权属特征交换重组、地类特征归一化处理对时空属性、权属属性、地类属性加密,脱敏加密后的数据进行统计归类成为地理统计数据;为保证重组后地理统计数据与地理空间信息数据源关键信息一致性,对两组数据最后进行比对校验,防止脱敏过程中重要信息丢失,提高了数据脱敏加密的速度以及满足数据加密的可靠性。In the method and system for desensitizing and encrypting geospatial information provided by the present invention, firstly, the data attributes of geospatial information are interpreted and analyzed, and the data attributes are classified and sorted according to space-time attributes, ownership attributes and land type attributes to obtain a primary data source. ; Then use spatiotemporal coordinate transformation, vertical ownership feature exchange and reorganization, and land type feature normalization to encrypt spatiotemporal attributes, ownership attributes, and land type attributes, and desensitize and encrypt the data for statistical classification into geographic statistical data; In order to ensure the consistency of the reorganized geographic statistical data and the key information of the geospatial information data source, the two sets of data are finally compared and verified to prevent the loss of important information during the desensitization process, improve the speed of data desensitization and encryption, and meet the requirements of data encryption. reliability.

附图说明Description of drawings

图1为本发明提供的一种地理空间信息脱敏加密方法流程图;1 is a flowchart of a method for desensitizing and encrypting geospatial information provided by the present invention;

图2为地理空间信息脱敏加密方法的整体处理过程示意图;2 is a schematic diagram of the overall processing process of the desensitization encryption method for geospatial information;

图3为基于时空坐标转换法对时空属性数据进行投影坐标转换的示意图;FIG. 3 is a schematic diagram of performing projection coordinate transformation on spatiotemporal attribute data based on a spatiotemporal coordinate transformation method;

图4为特征P和特征Q重组的示意图;Fig. 4 is the schematic diagram of feature P and feature Q recombination;

图5为对地类属性数据进行归一化处理的示意图;FIG. 5 is a schematic diagram of normalizing the land type attribute data;

图6为本发明提供的一种地理空间信息脱敏加密系统的结构示意图;6 is a schematic structural diagram of a geospatial information desensitization encryption system provided by the present invention;

图7为本发明提供的一种可能的电子设备的硬件结构示意图;7 is a schematic diagram of the hardware structure of a possible electronic device provided by the present invention;

图8为本发明提供的一种可能的计算机可读存储介质的硬件结构示意图。FIG. 8 is a schematic diagram of the hardware structure of a possible computer-readable storage medium provided by the present invention.

具体实施方式Detailed ways

下面结合附图和实施例,对本发明的具体实施方式作进一步详细描述。以下实施例用于说明本发明,但不用来限制本发明的范围。The specific embodiments of the present invention will be described in further detail below with reference to the accompanying drawings and embodiments. The following examples are intended to illustrate the present invention, but not to limit the scope of the present invention.

本发明提供了一种基于多要素分离的地理空间信息脱敏加密方法及系统,地理空间信息数据主要包括土地调查数据、农经权数据、国土空间规划数据、土地利用现状数据等,首先将地理空间信息数据属性进行解译剖析,对数据属性按照时空属性、权属属性、地类属性归类整理得到一级数据源。然后分别采用时空坐标转换、纵向权属特征交换重组、地类特征归一化处理对时空属性、权属属性、地类属性加密,脱敏加密后的数据进行统计归类成为地理统计数据。为保证重组后地理统计数据与地理空间信息数据源关键信息一致性,对两组数据最后进行比对校验,防止脱敏过程中重要信息丢失。The invention provides a method and system for desensitizing and encrypting geospatial information based on the separation of multiple elements. The geospatial information data mainly includes land survey data, agricultural economic rights data, national land spatial planning data, land use status data, etc. The spatial information data attributes are interpreted and analyzed, and the data attributes are classified and sorted according to space-time attributes, ownership attributes, and land type attributes to obtain primary data sources. Then, spatiotemporal coordinate transformation, vertical ownership feature exchange and reorganization, and land type feature normalization are used to encrypt the time and space attributes, ownership attributes, and land type attributes, and the desensitized and encrypted data are statistically classified into geographic statistical data. In order to ensure the consistency of the reorganized geographic statistical data and the key information of the geospatial information data source, the two sets of data are finally compared and verified to prevent the loss of important information during the desensitization process.

实施例一Example 1

一种地理空间信息脱敏加密方法,如图1和图2所示,该脱敏加密方法包括如下步骤:A desensitization encryption method for geospatial information, as shown in Figure 1 and Figure 2, the desensitization encryption method comprises the following steps:

步骤1,对地理空间信息数据进行空间约束掩膜处理,并按照时空属性、权属属性和地类属性对地理空间信息数据进行统计分类,得到时空属性数据、权属属性数据和地类属性数据。Step 1: Perform spatial constraint mask processing on the geospatial information data, and perform statistical classification on the geospatial information data according to space-time attributes, ownership attributes and land type attributes, and obtain spatio-temporal attribute data, ownership attribute data and land type attribute data .

可以理解是,地理空间信息数据主要包括土地调查数据、农经权数据、国土空间规划数据、土地利用现状数据等,首先对地理空间信息数据进行空间约束掩膜,保证地理坐标的统一配准。然后按照时空属性、权属属性、地类属性对地理空间信息数据特征统计分类,通过抽样查验的方式校验分类统计后数据特征完整性以及有效性。It can be understood that the geospatial information data mainly includes land survey data, agricultural economic rights data, national land spatial planning data, land use status data, etc. First, the geospatial information data is subjected to spatial constraint masking to ensure the unified registration of geographic coordinates. Then, the features of geospatial information data are statistically classified according to space-time attributes, ownership attributes, and land type attributes, and the integrity and validity of the data features after classification and statistics are verified by sampling inspection.

步骤2,分别基于时空坐标转换法对所述时空属性数据、基于纵向权属特征交换重组法对所述权属属性数据以及基于地类特征归一化处理方法对所述地类属性数据进行脱敏加密。Step 2: Detach the spatiotemporal attribute data based on the spatiotemporal coordinate transformation method, the property attribute data based on the vertical property feature exchange and reorganization method, and the land type attribute data based on the land type feature normalization processing method. Sensitive encryption.

具体的,如图3所示,对时空属性数据进行投影坐标转换,首先将空间约束掩膜后的数据按照M*N尺寸切片,然后再对每一个切片按照尺寸为X*Y二次切片并编号,进行两次切片后再对每个切片数据的时空属性进行坐标转换。其中,将时空属性数据的投影坐标转换分为多个操作步骤,包括两次切片以及坐标转换操作,一方面可以满足计算机并行计算要求,即对多个操作步骤可同时进行,提高了数据加密效率;另一方面保证数据加密的可靠性,数据难以简单解密。设二次切片后左上角第一个切片数据的坐标为(1,1),依次为(2,1)... (1,2)...即每个切片数据都会有个坐标(x,y),每一个切片数据的旋转角度θ计算公式如下:Specifically, as shown in Figure 3, the projection coordinate transformation is performed on the spatiotemporal attribute data. First, the data after the spatial constraint mask is sliced according to the size of M*N, and then each slice is sliced twice according to the size of X*Y and number, and then perform coordinate transformation on the spatiotemporal attributes of each sliced data after two slices. Among them, the projection coordinate transformation of spatiotemporal attribute data is divided into multiple operation steps, including two slices and coordinate transformation operations. On the one hand, it can meet the requirements of computer parallel computing, that is, multiple operation steps can be performed simultaneously, which improves the data encryption efficiency. On the other hand, the reliability of data encryption is guaranteed, and the data is difficult to decrypt easily. Let the coordinates of the first slice data in the upper left corner after the second slice be (1, 1), followed by (2, 1)... (1, 2)... That is, each slice data will have a coordinate (x , y), the calculation formula of the rotation angle θ of each slice data is as follows:

Figure 58963DEST_PATH_IMAGE001
Figure 58963DEST_PATH_IMAGE001
;

其中,k1、k2和k3为坐标偏移常数,k1、k2和k3的取值可根据地理空间信息数据的数据量大小来设置,以保证投影坐标变换后的数据量不增加太多,θ的取值范围为(0,90)。Among them, k 1 , k 2 and k 3 are coordinate offset constants, and the values of k 1 , k 2 and k 3 can be set according to the data volume of the geospatial information data to ensure that the data volume after projection coordinate transformation does not Increase too much, the value range of θ is (0, 90).

其中,根据每一个切片数据的坐标计算其坐标变换的旋转角,每一个切片数据的旋转角不同,可提高数据脱敏加密的安全性。Among them, the rotation angle of the coordinate transformation is calculated according to the coordinates of each slice data, and the rotation angle of each slice data is different, which can improve the security of data desensitization encryption.

投影坐标转换后的每一个切片数据按照尺寸计算公司如下:The size of each slice data converted from projected coordinates is calculated as follows:

Figure 516620DEST_PATH_IMAGE012
;
Figure 516620DEST_PATH_IMAGE012
;

Figure 395845DEST_PATH_IMAGE013
;
Figure 395845DEST_PATH_IMAGE013
;

Figure 29608DEST_PATH_IMAGE004
;
Figure 29608DEST_PATH_IMAGE004
;

其中,Xt、Yt表示坐标转换后的二次切片数据尺寸,L表示旋转方位圆的半径。根据每一个切片数据的坐标计算坐标变换后的尺寸,每一个切片数据对应的坐标变换后的尺寸均不同,提高了数据加密的可靠性。Among them, X t and Y t represent the size of the secondary slice data after coordinate conversion, and L represents the radius of the rotation azimuth circle. The coordinate-transformed size is calculated according to the coordinates of each slice data, and the coordinate-transformed size corresponding to each slice data is different, which improves the reliability of data encryption.

根据上述计算的每一个切片数据的旋转角和尺寸,对二次切刀片后的每一个切片数据进行旋转,且改变尺寸为(Xt、Yt)。According to the rotation angle and size of each slice data calculated above, rotate each slice data after the secondary cutting blade, and change the size to (X t , Y t ).

作为实施例,所述基于纵向权属特征交换重组法对所述权属属性数据进行脱敏加密,包括:设数据A中包含数据特征P,数据B中包含数据特征Q和标签特征M,当数据A和数据B作为样本数据与标签M共同来构建算法模型时,将特征P和特征Q中的部分特征进行交换构成新权属特征Pt和QtAs an embodiment, the desensitization and encryption of the ownership attribute data based on the vertical ownership feature exchange and reorganization method includes: assuming that data A includes data feature P, data B includes data feature Q and label feature M, and when When data A and data B are used as sample data to construct an algorithm model together with label M, some features in feature P and feature Q are exchanged to form new attribute features P t and Q t .

其中,所述将特征P和特征Q中的部分特征进行交换构成新权属特征Pt和Qt,包括: 设数据A的初始特征图集

Figure 419001DEST_PATH_IMAGE005
,数据B的初始特征图集
Figure 516401DEST_PATH_IMAGE006
,i和j为特征数据的下标; Wherein, exchanging some features in feature P and feature Q to form new attribute features P t and Q t includes: Assuming the initial feature atlas of data A
Figure 419001DEST_PATH_IMAGE005
, the initial feature atlas of data B
Figure 516401DEST_PATH_IMAGE006
, i and j are the subscripts of the feature data;

对于初始特征图集P的最后一列

Figure 991245DEST_PATH_IMAGE007
,采用初始特征图集Q的最 后一列
Figure 566714DEST_PATH_IMAGE008
代替,并在初始特征图集P中添加一列
Figure 810613DEST_PATH_IMAGE009
, 得到新权属特征Pt;对于初始特征图集Q的最后一列
Figure 78915DEST_PATH_IMAGE010
,采用初始特征 图集P的最后一列
Figure 306634DEST_PATH_IMAGE011
代替,得到新权属特征Qt。 For the last column of the initial feature atlas P
Figure 991245DEST_PATH_IMAGE007
, using the last column of the initial feature atlas Q
Figure 566714DEST_PATH_IMAGE008
instead, and add a column to the initial feature atlas P
Figure 810613DEST_PATH_IMAGE009
, get the new attribute feature P t ; for the last column of the initial feature atlas Q
Figure 78915DEST_PATH_IMAGE010
, using the last column of the initial feature atlas P
Figure 306634DEST_PATH_IMAGE011
Instead, a new ownership feature Qt is obtained.

具体的,对权属属性数据进行纵向权属特征交换重组,如图4所示,假设数据A中包 含数据特征为P,数据B中包含数据特征Q和标签特征M,当数据A和数据B作为样本数据与标 签M共同来构建算法模型时,那么数据A与数据B中特征进行部分交换、训练时权值进行共享 的情况下对模型训练不会构成影像,所以将特征组

Figure 682864DEST_PATH_IMAGE014
与特征组
Figure 984532DEST_PATH_IMAGE015
进行交换构成新的权 属特征Pt和Qt。算法流程如下: Specifically, vertical ownership feature exchange and reorganization is performed on the ownership attribute data, as shown in Figure 4, assuming that data A contains data feature P, data B contains data feature Q and label feature M, when data A and data B When the algorithm model is constructed together as sample data and label M, the model training will not constitute an image if the features in data A and data B are partially exchanged and the weights are shared during training, so the feature group
Figure 682864DEST_PATH_IMAGE014
with feature groups
Figure 984532DEST_PATH_IMAGE015
The swaps form new tenure features P t and Q t . The algorithm flow is as follows:

分别输入初始特征图集

Figure 423735DEST_PATH_IMAGE016
和初始特征图集
Figure 669908DEST_PATH_IMAGE017
,特征图集P和特征图集Q均为多维矩阵,可 参见图4。Enter the initial feature atlas separately
Figure 423735DEST_PATH_IMAGE016
and the initial feature atlas
Figure 669908DEST_PATH_IMAGE017
, the feature atlas P and the feature atlas Q are multi-dimensional matrices, as shown in Figure 4.

Figure 790442DEST_PATH_IMAGE018
,且每次P和Q均只替换相同位具体算法如 下:
Figure 790442DEST_PATH_IMAGE018
, and each time P and Q only replace the same bits. The specific algorithm is as follows:

Figure 8934DEST_PATH_IMAGE019
Figure 8934DEST_PATH_IMAGE019
;

Figure 619038DEST_PATH_IMAGE020
Figure 619038DEST_PATH_IMAGE020
;

Figure 290191DEST_PATH_IMAGE021
Figure 290191DEST_PATH_IMAGE021
;

Figure 103881DEST_PATH_IMAGE022
Figure 103881DEST_PATH_IMAGE022

Figure 973617DEST_PATH_IMAGE023
Figure 973617DEST_PATH_IMAGE023

Figure 754622DEST_PATH_IMAGE024
Figure 754622DEST_PATH_IMAGE024

Figure 913071DEST_PATH_IMAGE025
Figure 913071DEST_PATH_IMAGE025

Figure 172145DEST_PATH_IMAGE026
Figure 172145DEST_PATH_IMAGE026

Figure 99650DEST_PATH_IMAGE027
Figure 99650DEST_PATH_IMAGE027

Figure 189572DEST_PATH_IMAGE028
Figure 189572DEST_PATH_IMAGE028

作为实施例,所述基于地类特征归一化处理方法对所述地类属性数据进行脱敏加密,包括:对于所述地类属性数据,基于农用地、建筑用地、林地、水域和未利用地五个地类来统一地类属性,将所述地类属性数据归整为五大地类属性数据。As an embodiment, performing desensitization and encryption on the land type attribute data based on the land type feature normalization processing method includes: for the land type attribute data, based on agricultural land, building land, forest land, water area and unused land The five land types are used to unify the land type attributes, and the land type attribute data are grouped into five land type attribute data.

具体的,对多种地理空间信息数据中地类属性数据进行归一化处理,如图5所示,土地利用现状数据包含湿地、耕地、林地、商业服务业用地、工矿用地、住宅用地、水域、草地、其他用地等,国土空间规划数据包含建筑规划用地、农业规划用地、山地、水域、林地、湖泊、草地等,由于数据属于敏感信息导致数据流通性较差,每种地理空间数据地类属性命名方式都不一致,本发明提出农用地、建筑用地、林地、水域、未利用地五个大类来统一地类属性,将地理空间数据中二级地类归整为五个大类,然后进行分类统计。Specifically, the land type attribute data in various geospatial information data are normalized. As shown in Figure 5, the current land use data includes wetlands, cultivated land, forest land, commercial service land, industrial and mining land, residential land, and water area. , grassland, other land use, etc. Land spatial planning data includes architectural planning land, agricultural planning land, mountains, waters, woodlands, lakes, grasslands, etc. Because the data is sensitive information, the data circulation is poor, and each geospatial data land type The attribute naming methods are inconsistent. The present invention proposes five categories of agricultural land, construction land, forest land, water area, and unused land to unify the land type attributes, and classify the secondary land categories in the geospatial data into five categories, and then Categorize statistics.

步骤3,对脱敏加密后的地理空间数据进行数据重组,构成地理统计数据。Step 3, performing data reorganization on the desensitized and encrypted geospatial data to form geographic statistical data.

可以理解的是,将脱敏加密后的时空属性、权属属性、地类属性进行数据重组,构建成地理统计数据,保证敏感信息已完成脱敏加密,可支持属性检索查询。It is understandable that the desensitized and encrypted space-time attributes, ownership attributes, and land type attributes are reorganized into geographic statistical data to ensure that sensitive information has been desensitized and encrypted, and can support attribute retrieval queries.

步骤4,对地理统计数据与地理空间信息数据进行数据校验。Step 4, performing data verification on the geographic statistical data and the geographic spatial information data.

可以理解的是,对地理空间信息数据进行了脱敏加密,并进行数据重组后,得到地理统计数据。本步骤4对地理统计数据与地理空间信息数据进行数据校验,首先进行统计核查检验特征完整性,然后利用实地考察数据抽样检验数据的可靠性,最后进行数据压缩解压、数据传输、共享测试检验数据的可流通性。It is understandable that, after desensitizing and encrypting the geospatial information data, and reorganizing the data, the geostatistical data is obtained. In this step 4, data verification is performed on the geographical statistical data and the geospatial information data. First, statistical verification is carried out to verify the integrity of the features, then the reliability of the data is sampled using the field inspection data, and finally the data compression and decompression, data transmission, and sharing test are carried out. The liquidity of data.

为了验证本发明方法的性能,本发明选用荆州市局部土地利用现状数据做实验验证,实验参数设置如下表1所示:In order to verify the performance of the method of the present invention, the present invention selects the local land use data in Jingzhou to do experimental verification, and the experimental parameters are set as shown in Table 1 below:

表1 实验参数Table 1 Experimental parameters

Figure 835317DEST_PATH_IMAGE029
Figure 835317DEST_PATH_IMAGE029

分别对荆州市局部土地利用现状数据和脱敏加密后的地理统计数据中地类进行统计校验,同时测试脱敏加密后的地理统计数据压缩解压、传输、共享功能,统计数据脱敏加密后数据格式大小变换。实验结果如下表2所示:Statistical verification was carried out on the local land use status data in Jingzhou City and the land types in the desensitized and encrypted geographic statistical data, and the compression, decompression, transmission, and sharing functions of the desensitized and encrypted geographic statistical data were tested. Data format size conversion. The experimental results are shown in Table 2 below:

表2实验结果Table 2 Experimental results

Figure 898082DEST_PATH_IMAGE030
Figure 898082DEST_PATH_IMAGE030

从实验结果表明,数据脱敏加密后地类面积总量未发生变化,且脱敏加密后数据可进行压缩、传输、解压操作,数据大小增大在可靠范围内。 The experimental results show that the total area of land types does not change after data desensitization and encryption, and the data can be compressed, transmitted, and decompressed after desensitization and encryption, and the data size increases within a reliable range.

实施例二Embodiment 2

一种地理空间信息脱敏加密系统,参见图6,该脱敏加密系统包括统计分类模块61、脱敏加密模块62、数据重组模块63和数据校验模块64,其中:A desensitization encryption system for geospatial information, see FIG. 6 , the desensitization encryption system includes a statistical classification module 61, a desensitization encryption module 62, a data reorganization module 63 and a data verification module 64, wherein:

统计分类模块61,用于对地理空间信息数据进行空间约束掩膜处理,并按照时空属性、权属属性和地类属性对地理空间信息数据进行统计分类,得到时空属性数据、权属属性数据和地类属性数据。The statistical classification module 61 is used to perform spatial constraint mask processing on the geospatial information data, and perform statistical classification on the geospatial information data according to the spatiotemporal attributes, ownership attributes and land type attributes, and obtain spatiotemporal attribute data, ownership attribute data and Land type attribute data.

脱敏加密模块62,用于分别基于时空坐标转换法对所述时空属性数据、基于纵向权属特征交换重组法对所述权属属性数据以及基于地类特征归一化处理方法对所述地类属性数据进行脱敏加密。The desensitization and encryption module 62 is used to respectively perform the spatial-temporal attribute data based on the spatiotemporal coordinate transformation method, the title attribute data based on the vertical title feature exchange and recombination method, and the ground type feature normalization processing method. Class attribute data is desensitized and encrypted.

数据重组模块63,用于对脱敏加密后的地理空间数据进行数据重组,构成地理统计数据。The data reorganization module 63 is used to reorganize the desensitized and encrypted geospatial data to form geographic statistical data.

数据校验模块64,用于对所述地理统计数据与所述地理空间信息数据进行数据校验。The data verification module 64 is configured to perform data verification on the geographic statistical data and the geographic spatial information data.

可以理解的是,本发明提供的一种地理空间信息脱敏加密系统与前述各实施例提供的地理空间信息脱敏加密方法相对应,地理空间信息脱敏加密系统的相关技术特征可参考地理空间信息脱敏加密方法的相关技术特征,在此不再赘述。It can be understood that a desensitization and encryption system for geospatial information provided by the present invention corresponds to the desensitization and encryption methods for geospatial information provided in the foregoing embodiments, and the relevant technical features of the desensitization and encryption system for geospatial information may refer to Geospatial Information. The relevant technical features of the information desensitization encryption method will not be repeated here.

实施例三Embodiment 3

请参阅图7,图7为本发明实施例提供的电子设备的实施例示意图。如图7所示,本发明实施例提了一种电子设备700,包括存储器710、处理器720及存储在存储器710上并可在处理器720上运行的计算机程序711,处理器720执行计算机程序711时实现实施例一的地理空间信息脱敏加密方法。Please refer to FIG. 7 , which is a schematic diagram of an embodiment of an electronic device provided by an embodiment of the present invention. As shown in FIG. 7 , an embodiment of the present invention provides an electronic device 700, including a memory 710, a processor 720, and a computer program 711 stored in the memory 710 and running on the processor 720, and the processor 720 executes the computer program At 711, the desensitization and encryption method for geospatial information of the first embodiment is implemented.

实施例四Embodiment 4

请参阅图8,图8为本发明提供的一种计算机可读存储介质的实施例示意图。如图8所示,本实施例提供了一种计算机可读存储介质800,其上存储有计算机程序811,该计算机程序811被处理器执行时实现实施例一的地理空间信息脱敏加密方法。Please refer to FIG. 8, which is a schematic diagram of an embodiment of a computer-readable storage medium provided by the present invention. As shown in FIG. 8 , this embodiment provides a computer-readable storage medium 800 on which a computer program 811 is stored. When the computer program 811 is executed by a processor, the method for desensitizing and encrypting geospatial information in Embodiment 1 is implemented.

本发明实施例提供的一种地理空间信息脱敏加密方法及系统,具有以下优点:A method and system for desensitizing and encrypting geospatial information provided by the embodiments of the present invention have the following advantages:

(1)本发明提出了地理空间信息数据时空属性转换方法,通过二次数据切片后投影坐标转换,细化了数据层级,一方面提高了数据脱敏加密速度,满足了计算机并行计算的要求,对地理空间数据治理清洗提供了新的思路;另一方面提出的旋转角度计算方式即满足数据加密的可靠性,也极大地减少加密后的数据空间,保证数据存储和运算的时效性。(1) The present invention proposes a method for transforming the spatiotemporal attributes of geospatial information data, which refines the data hierarchy by transforming projected coordinates after secondary data slicing. It provides a new idea for geospatial data governance and cleaning; on the other hand, the proposed rotation angle calculation method not only satisfies the reliability of data encryption, but also greatly reduces the encrypted data space and ensures the timeliness of data storage and operation.

(2)本发明提出了地理空间信息数据权属特征纵向交换重组方法,借用联邦学习的思想对地理空间数据进行特征重组,重组后的权属特征从单一数据上角度保证了数据的隐秘性,从算法模型角度上分析并未对模型的可靠性造成损失。纵向权属特征交换从一定程度上丰富了特征复杂度,避免后续数据建模造成模型泛化效果不佳。(2) The present invention proposes a vertical exchange and reorganization method of geospatial information data ownership features, which uses the idea of federated learning to reorganize geospatial data. The reorganized ownership features ensure the privacy of the data from the perspective of single data. From the perspective of the algorithm model, the reliability of the model is not lost. The vertical ownership feature exchange enriches the feature complexity to a certain extent, and avoids the poor model generalization effect caused by subsequent data modeling.

(3)本发明提出了多种地理空间信息数据中地类属性归一化方法,制定农用地、建筑用地、林地、水域、未利用地五个大类来统一地类属性,从数据地类属性角度打通了数据之间的流通性,同时对地类属性进行了脱敏加密。为后续与卫星遥感数据进行隐私安全计算设定了地类标准,提出了地理空间信息数据隐私安全计算的新思路。(3) The present invention proposes a variety of methods for normalizing land type attributes in geospatial information data, formulating five major categories of agricultural land, construction land, forest land, water area, and unused land to unify land type attributes. The attribute angle opens up the circulation between data, and at the same time desensitizes and encrypts the land type attributes. It sets the ground class standard for the follow-up privacy and security calculation with satellite remote sensing data, and proposes a new idea for the privacy and security calculation of geospatial information data.

需要说明的是,在上述实施例中,对各个实施例的描述都各有侧重,某个实施例中没有详细描述的部分,可以参见其它实施例的相关描述。It should be noted that, in the foregoing embodiments, the description of each embodiment has its own emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to the relevant descriptions of other embodiments.

本领域内的技术人员应明白,本发明的实施例可提供为方法、系统、或计算机程序产品。因此,本发明可采用完全硬件实施例、完全软件实施例、或结合软件和硬件方面的实施例的形式。而且,本发明可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的形式。As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, etc.) having computer-usable program code embodied therein.

本发明是参照根据本发明实施例的方法、设备(系统)、和计算机程序产品的流程图和/或方框图来描述。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式计算机或者其他可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block in the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to the processor of a general purpose computer, special purpose computer, embedded computer or other programmable data processing device to produce a machine such that the instructions executed by the processor of the computer or other programmable data processing device produce Means implementing the functions specified in one or more of the flowcharts and/or one or more blocks of the block diagrams.

这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能。These computer program instructions may also be stored in a computer-readable memory capable of directing a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory result in an article of manufacture comprising instruction means, the instructions The apparatus implements the functions specified in the flow or flow of the flowcharts and/or the block or blocks of the block diagrams.

这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。These computer program instructions can also be loaded on a computer or other programmable data processing device to cause a series of operational steps to be performed on the computer or other programmable device to produce a computer-implemented process such that The instructions provide steps for implementing the functions specified in the flow or blocks of the flowcharts and/or the block or blocks of the block diagrams.

尽管已描述了本发明的优选实施例,但本领域内的技术人员一旦得知了基本创造概念,则可对这些实施例作出另外的变更和修改。所以,所附权利要求意欲解释为包括优选实施例以及落入本发明范围的所有变更和修改。Although preferred embodiments of the present invention have been described, additional changes and modifications to these embodiments may occur to those skilled in the art once the basic inventive concepts are known. Therefore, the appended claims are intended to be construed to include the preferred embodiment and all changes and modifications that fall within the scope of the present invention.

显然,本领域的技术人员可以对本发明进行各种改动和变型而不脱离本发明的精神和范围。这样,倘若本发明的这些修改和变型属于本发明权利要求及其等同技术的范围之内,则本发明也意图包括这些改动和变型在内。It will be apparent to those skilled in the art that various modifications and variations can be made in the present invention without departing from the spirit and scope of the invention. Thus, provided that these modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.

Claims (9)

1. A method for desensitizing encryption of geospatial information, comprising:
step 1, carrying out space constraint mask processing on geographic space information data, and carrying out statistical classification on the geographic space information data according to a space-time attribute, an ownership attribute and a land attribute to obtain space-time attribute data, ownership attribute data and land attribute data;
step 2, desensitizing and encrypting the space-time attribute data based on a space-time coordinate transformation method, the ownership attribute data based on a longitudinal ownership feature exchange recombination method and the territorial attribute data based on a territorial feature normalization processing method;
step 3, performing data recombination on the desensitized encrypted geospatial data to form geographic statistical data;
and 4, performing data verification on the geographic statistical data and the geospatial information data.
2. The desensitization encryption method according to claim 1, wherein said desensitization encryption of said spatiotemporal attribute data based on spatiotemporal coordinate transformation method in step 2 comprises:
slicing the spatio-temporal attribute data twice;
calculating the rotation angle and the size after coordinate conversion of each piece of slice data based on the size and the coordinate of each piece of slice data after twice slicing;
and performing desensitization encryption processing on each piece of slice data after twice slicing based on the rotation angle and the size of the size after coordinate conversion of each piece of slice data.
3. The desensitized encryption method of claim 2, wherein said twice slicing the spatiotemporal attribute data comprises:
performing first slicing on the spatio-temporal attribute data according to the size of M x N;
performing second slicing on each slice data after the first slicing according to the X-Y size;
correspondingly, the calculating the rotation angle and the projection coordinate converted size of each slice data based on the size and the coordinate of each slice data after twice slicing includes:
assuming that the coordinates of the slice data after the two slicing are (x, y), the rotation angle θ of the slice data is:
Figure 468215DEST_PATH_IMAGE001
wherein k is1、k2And k3In order to be a coordinate-shift constant,
Figure 995011DEST_PATH_IMAGE002
the value range of (1) is (0, 90);
the size of the converted projection coordinates of the slice data is as follows:
Figure 945780DEST_PATH_IMAGE003
Figure 267040DEST_PATH_IMAGE004
wherein, Xt、YtRepresenting the size of the slice data after the projection coordinate conversion;
and performing projection coordinate conversion on each piece of slice data subjected to secondary slicing based on the rotation angle of each piece of slice data and the size of the projection coordinate converted to obtain desensitized and encrypted space-time attribute data.
4. The desensitization encryption method of claim 1, wherein said desensitization encryption of said ownership attribute data based on longitudinal ownership feature exchange reassembly comprises:
the data A comprises data characteristics P, the data B comprises data characteristics Q and label characteristics M, and when the data A and the data B are used as sample data and the label M are used together to construct an algorithm model, the characteristics P and partial characteristics in the characteristics Q are exchanged to form new attribute characteristics PtAnd Qt
5. Desensitization encryption method according to claim 4, characterized in that said exchange of part of the characteristics P and Q constitutes a new attribute characteristic PtAnd QtThe method comprises the following steps:
let initial feature set of data A
Figure 837349DEST_PATH_IMAGE005
Initial feature atlas of data B
Figure 636678DEST_PATH_IMAGE006
I and j are subscripts of the feature data;
for the last column of the initial feature set P
Figure 973112DEST_PATH_IMAGE007
Using the last column of the initial feature set Q
Figure 465273DEST_PATH_IMAGE008
Instead of, and adding a column to the initial feature set P
Figure 254369DEST_PATH_IMAGE009
Obtaining a new ownership feature Pt
Last column for initial feature set Q
Figure 122968DEST_PATH_IMAGE010
Using the last column of the initial feature set P
Figure 579488DEST_PATH_IMAGE011
Instead, a new ownership feature Q is obtainedt
6. The desensitization encryption method according to claim 1, wherein said desensitization encryption of said locale attribute data based on a locale feature normalization processing method comprises:
and for the land attribute data, unifying the land attributes based on five land types of agricultural land, construction land, forest land, water area and unused land, and integrating the land attribute data into five land attribute data.
7. A geospatial information desensitization encryption system, comprising:
the statistical classification module is used for carrying out spatial constraint mask processing on the geographic spatial information data and carrying out statistical classification on the geographic spatial information data according to the time-space attribute, the ownership attribute and the land attribute to obtain time-space attribute data, ownership attribute data and land attribute data;
the desensitization encryption module is used for desensitizing and encrypting the space-time attribute data based on a space-time coordinate transformation method, the ownership attribute data based on a longitudinal ownership feature exchange recombination method and the land-type attribute data based on a land-type feature normalization processing method;
the data recombination module is used for carrying out data recombination on the desensitized encrypted geospatial data to form geographic statistical data;
and the data verification module is used for performing data verification on the geographic statistical data and the geographic spatial information data.
8. An electronic device comprising a memory, a processor for implementing the steps of the geospatial information desensitization encryption method according to any of claims 1-6 when executing a computer management class program stored in the memory.
9. A computer-readable storage medium, having stored thereon a computer management like program, which when executed by a processor, carries out the steps of the method of desensitizing encryption of geospatial information according to any of claims 1-6.
CN202210385958.1A 2022-04-13 2022-04-13 A desensitization encryption method and system for geospatial information Active CN114491650B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210385958.1A CN114491650B (en) 2022-04-13 2022-04-13 A desensitization encryption method and system for geospatial information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210385958.1A CN114491650B (en) 2022-04-13 2022-04-13 A desensitization encryption method and system for geospatial information

Publications (2)

Publication Number Publication Date
CN114491650A true CN114491650A (en) 2022-05-13
CN114491650B CN114491650B (en) 2022-07-01

Family

ID=81488769

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210385958.1A Active CN114491650B (en) 2022-04-13 2022-04-13 A desensitization encryption method and system for geospatial information

Country Status (1)

Country Link
CN (1) CN114491650B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115758429A (en) * 2022-12-07 2023-03-07 江苏省城市规划设计研究院有限公司 A Data Encryption Method for Planning Results Separated from Spatial and Attribute Information
CN118051938A (en) * 2024-04-16 2024-05-17 中电科网络安全科技股份有限公司 Data processing method, device, equipment and readable storage medium

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101645078A (en) * 2009-09-11 2010-02-10 中南大学 System and method for integration of change information collection and spatiotemporal data update]
KR20130025980A (en) * 2010-12-16 2013-03-13 부경대학교 산학협력단 Geographic information reding apparatus and method encrypted of compressing vector map data for geographic information
CN104751065A (en) * 2015-03-09 2015-07-01 哈尔滨工程大学 Encryption method for geographic information product file
KR20150125850A (en) * 2014-04-30 2015-11-10 부경대학교 산학협력단 The methode of selesctive encryption scheme for geographic information system vector map data
CN105069371A (en) * 2015-07-28 2015-11-18 武汉大学 Geospatial data based user privacy protection method and system
US9460175B1 (en) * 2015-06-03 2016-10-04 Palantir Technologies Inc. Server implemented geographic information system with graphical interface
CN106713245A (en) * 2015-11-17 2017-05-24 星际空间(天津)科技发展有限公司 Safety transmission method for geographic data
CN109918462A (en) * 2019-01-18 2019-06-21 杭州志远科技有限公司 A kind of processing method of GIS-Geographic Information System
CN111600712A (en) * 2020-04-14 2020-08-28 陕西天泽中孚实业有限公司 Safety encryption processing system for geographic information data
CN112231745A (en) * 2020-09-03 2021-01-15 中国电子科技集团公司第三十研究所 A big data security privacy protection method and storage medium based on geometric deformation

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101645078A (en) * 2009-09-11 2010-02-10 中南大学 System and method for integration of change information collection and spatiotemporal data update]
KR20130025980A (en) * 2010-12-16 2013-03-13 부경대학교 산학협력단 Geographic information reding apparatus and method encrypted of compressing vector map data for geographic information
KR20150125850A (en) * 2014-04-30 2015-11-10 부경대학교 산학협력단 The methode of selesctive encryption scheme for geographic information system vector map data
CN104751065A (en) * 2015-03-09 2015-07-01 哈尔滨工程大学 Encryption method for geographic information product file
US9460175B1 (en) * 2015-06-03 2016-10-04 Palantir Technologies Inc. Server implemented geographic information system with graphical interface
CN105069371A (en) * 2015-07-28 2015-11-18 武汉大学 Geospatial data based user privacy protection method and system
CN106713245A (en) * 2015-11-17 2017-05-24 星际空间(天津)科技发展有限公司 Safety transmission method for geographic data
CN109918462A (en) * 2019-01-18 2019-06-21 杭州志远科技有限公司 A kind of processing method of GIS-Geographic Information System
CN111600712A (en) * 2020-04-14 2020-08-28 陕西天泽中孚实业有限公司 Safety encryption processing system for geographic information data
CN112231745A (en) * 2020-09-03 2021-01-15 中国电子科技集团公司第三十研究所 A big data security privacy protection method and storage medium based on geometric deformation

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
张毅等: "一种基于三维Arnold变换的矢量地理数据置乱加密方法", 《信息科学辑》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115758429A (en) * 2022-12-07 2023-03-07 江苏省城市规划设计研究院有限公司 A Data Encryption Method for Planning Results Separated from Spatial and Attribute Information
CN118051938A (en) * 2024-04-16 2024-05-17 中电科网络安全科技股份有限公司 Data processing method, device, equipment and readable storage medium

Also Published As

Publication number Publication date
CN114491650B (en) 2022-07-01

Similar Documents

Publication Publication Date Title
US7797341B2 (en) Desensitizing database information
CN114491650B (en) A desensitization encryption method and system for geospatial information
EP3338205A1 (en) Simulation and virtual reality based cyber behavioral systems
Black et al. A limited area modeling capability for the finite‐volume cubed‐sphere (FV3) dynamical core and comparison with a global two‐way nest
Aydin et al. SKATER-CON: Unsupervised regionalization via stochastic tree partitioning within a consensus framework using random spanning trees
Vatsalan et al. Efficient two-party private blocking based on sorted nearest neighborhood clustering
CN116502171B (en) Network security information dynamic detection system based on big data analysis algorithm
CN115459965A (en) Multistep attack detection method for network security of power system
Schaefer et al. The existential theory of the reals as a complexity class: A compendium
CN108734414A (en) A kind of marine environmental monitoring data normalization storage and the system of analysis and appraisal
CN115796229A (en) Graph node embedding method, system, device and storage medium
CN117236439A (en) A comprehensive analysis system and method for cyberspace geographical maps
CN106203165A (en) The big data analysis method for supporting of information based on credible cloud computing
Wu et al. A nonparametric approach to uncovering connected anomalies by tree shaped priors
CN115630374B (en) Test method, device, computer equipment and storage medium of trusted numerical control system
CN117094412A (en) Federal learning method and device aiming at non-independent co-distributed medical scene
CN112540989A (en) Data authority confirming and managing method based on data exchange log
Qu et al. Precise vegetation restoration in arid regions based on potential natural vegetation and potential normalized difference vegetation index
US20220180465A1 (en) Systems and methods for tracking disaster footprints with social streaming data
CN117931937A (en) Block chain-based power grid material product carbon footprint data sharing method and system
Basnet et al. Analysis of multifactorial social unrest events with spatio-temporal k-dimensional tree-based dbscan
Shead et al. A novel in situ machine learning framework for intelligent data capture and event detection
CN114971878A (en) Risk assessment method, risk assessment device, equipment and storage medium
CN114254131A (en) Network security emergency response knowledge graph entity alignment method
Piccolotto et al. Multi-Ensemble Visual Analytics via Fuzzy Sets.

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
PE01 Entry into force of the registration of the contract for pledge of patent right
PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: A Desensitization and Encryption Method and System for Geospatial Information

Effective date of registration: 20230615

Granted publication date: 20220701

Pledgee: Guanggu Branch of Wuhan Rural Commercial Bank Co.,Ltd.

Pledgor: WUHAN OPTICS VALLEY INFORMATION TECHNOLOGY CO.,LTD.

Registration number: Y2023420000234

PC01 Cancellation of the registration of the contract for pledge of patent right
PC01 Cancellation of the registration of the contract for pledge of patent right

Granted publication date: 20220701

Pledgee: Guanggu Branch of Wuhan Rural Commercial Bank Co.,Ltd.

Pledgor: WUHAN OPTICS VALLEY INFORMATION TECHNOLOGY CO.,LTD.

Registration number: Y2023420000234

PE01 Entry into force of the registration of the contract for pledge of patent right
PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: A method and system for desensitizing and encrypting geographic spatial information

Granted publication date: 20220701

Pledgee: Guanggu Branch of Wuhan Rural Commercial Bank Co.,Ltd.

Pledgor: WUHAN OPTICS VALLEY INFORMATION TECHNOLOGY CO.,LTD.

Registration number: Y2024980049038