CN113783859A - Web page construction method and processing terminal supporting trace k-anonymity - Google Patents
Web page construction method and processing terminal supporting trace k-anonymity Download PDFInfo
- Publication number
- CN113783859A CN113783859A CN202111018863.8A CN202111018863A CN113783859A CN 113783859 A CN113783859 A CN 113783859A CN 202111018863 A CN202111018863 A CN 202111018863A CN 113783859 A CN113783859 A CN 113783859A
- Authority
- CN
- China
- Prior art keywords
- webpage
- anonymous
- resource objects
- web page
- access sequence
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000010276 construction Methods 0.000 title claims abstract description 14
- 238000000034 method Methods 0.000 claims abstract description 15
- 238000009877 rendering Methods 0.000 claims description 3
- 238000010586 diagram Methods 0.000 description 9
- 238000004590 computer program Methods 0.000 description 5
- 230000006870 function Effects 0.000 description 5
- 238000012986 modification Methods 0.000 description 5
- 230000004048 modification Effects 0.000 description 5
- 230000008569 process Effects 0.000 description 5
- 230000007246 mechanism Effects 0.000 description 2
- 230000004075 alteration Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000007123 defense Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000005259 measurement Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0407—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
- H04L63/0421—Anonymous communication, i.e. the party's identifiers are hidden from the other party or parties, e.g. using an anonymizer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The invention discloses a webpage construction method and a processing terminal for supporting trace k-anonymity, wherein the method comprises the following steps: forming a webpage set needing k-anonymization by the acquired k target webpages, and recording as a webpage set to be anonymized; counting the number of the webpage resource objects, and recording the webpage to be anonymous with the maximum value of the sum of the number of the webpage resource objects as a maximum reference webpage; adding a corresponding amount of preset webpage resources to all anonymous webpages except the maximum reference webpage to obtain a new webpage set to be anonymous; the browser accesses a new webpage set to be anonymous through single connection to obtain access sequence orders, and the maximum value of the size of webpage resources in each access sequence order is calculated according to the access sequence orders; and adding data to each webpage resource object in the webpage to be anonymized so that the file sizes of the resource objects in the sequence of each webpage are the same. The method and the device can effectively prevent the track of the user accessing the specific page from being inferred, and protect the privacy security of the user browsing the webpage.
Description
Technical Field
The invention relates to the technical field of webpage anti-tracking, in particular to a webpage construction method and a processing terminal supporting trace k-anonymity.
Background
Websites of large and medium-sized organizations generally include a plurality of web pages to provide different types of web application services, and users can obtain corresponding services by accessing the web application services. For example, digital government and intelligent government services often provide web services, and users accessing different web pages in a web site can obtain different services. To prevent data leakage to protect user access privacy, many websites have begun to employ encrypted web access services such as https. However, although the https encryption mechanism of the web page can enable the user to conveniently and safely obtain the information required by the user, the https encryption mechanism of the web page cannot well and safely protect the privacy of the user for accessing a specific website and a specific page. Existing access-traffic-based data can infer a particular page that a user accesses from even an encrypted https web page, thereby revealing the privacy of the user's browsing of the web page. Therefore, a better method for preventing webpage tracking is needed, so that the trace of the user accessing a specific page cannot be inferred, and the security of the user privacy is improved.
Disclosure of Invention
In view of the shortcomings of the prior art, one of the objects of the present invention is to provide a web page construction method supporting trace k-anonymity, which can solve the problem that the trace of a user accessing a specific page is presumed;
another object of the present invention is to provide a processing terminal capable of solving a problem that a trace of a user's access to a specific page is presumed;
the technical scheme for realizing one purpose of the invention is as follows: a webpage construction method supporting trace k-anonymity comprises the following steps:
step 1: acquiring k target webpages, wherein k is more than or equal to 1, and constructing a webpage set needing k-anonymization based on the k target webpages to obtain a webpage set to be anonymized;
step 2: traversing the set of the web pages to be anonymous, counting the number of the web page resource objects of each web page to be anonymous, and calculating the maximum value f of the sum of the number of the web page resource objects in all anonymous web pagesmaxRecording the anonymous webpage with the maximum sum of the webpage resource object numbers as a maximum reference webpage;
and step 3: analyzing each webpage resource object, judging whether the webpage resource object is in a file format of analyzing the addable property of the equivalent data by the browser, if not, converting the file format of the webpage resource object into the file format of analyzing the addable property of the equivalent data by the browser;
and 4, step 4: adding a corresponding number of preset webpage resource objects to all anonymous webpages in the anonymous webpage set except the maximum reference webpage so that the sum of the number of the webpage resource objects of all webpages to be anonymous is consistent with that of the maximum reference webpage, thereby obtaining a new webpage set to be anonymous;
and 5: the browser accesses a new webpage set to be anonymous through single connection to obtain a webpage resource object access sequence order of each webpage to be anonymous, and the maximum value of the size of the webpage resource in each access sequence order is calculated according to the access sequence order;
step 6: and adding filling data to each webpage resource object in the webpage to be anonymous according to the access sequence order so as to ensure that the file sizes of the webpage resource objects of the webpages in the same access sequence order are the same, thereby obtaining a final anonymous webpage set and completing the k-anonymous webpage construction.
Further, the webpage resource objects in the access request comprise basic HTML (hypertext markup language) documents of the webpage and webpage resource object documents required for rendering the webpage, and by adding the webpage resource objects and adding filling data to the webpage resource objects, the access sequences of the webpage resource objects accessed by the single connection of the browser are the same in length, and the corresponding webpage resource object documents in the same access sequence order are the same in size.
The second technical scheme for realizing the aim of the invention is as follows: a processing terminal, comprising:
a memory for storing program instructions;
a processor for executing the program instructions to perform the steps of the web page construction method supporting trail k-anonymity.
The invention has the beneficial effects that: according to the method and the device, the number of the webpage resource objects and the file size of each webpage resource object are added, so that the trace of the user accessing a specific page cannot be inferred from the webpage resource objects with the same number and the same file size, and the privacy security of the user browsing the webpage is protected.
Drawings
FIG. 1 is a schematic flow chart of a first embodiment;
fig. 2 is a schematic diagram of a processing terminal.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, specific embodiments of the present application will be described in detail with reference to the accompanying drawings. It is to be understood that the specific embodiments described herein are merely illustrative of the application and are not limiting of the application. It should be further noted that, for the convenience of description, only some but not all of the relevant portions of the present application are shown in the drawings. Before discussing exemplary embodiments in more detail, it should be noted that some exemplary embodiments are described as processes or methods depicted as flowcharts. Although a flowchart may describe the operations (or steps) as a sequential process, many of the operations can be performed in parallel, concurrently or simultaneously. In addition, the order of the operations may be re-arranged. The process may be terminated when its operations are completed, but may have additional steps not included in the figure. The processes may correspond to methods, functions, procedures, subroutines, and the like.
Referring to fig. 1, a web page construction method supporting trail k-anonymity includes the steps of:
step 1: k target webpages are obtained, k is larger than or equal to 1, a k-anonymous webpage set is constructed based on the k target webpages, and a webpage set to be anonymous is obtained, wherein the webpage set is a webpage set formed by all webpages.
And constructing a k-anonymous webpage set, namely constructing the webpage set meeting the k-anonymous requirement, thereby forming the anonymous webpage set.
Step 2: traversing the webpage set to be anonymized, counting the number of the webpage resource objects of each webpage to be anonymized, and calculating the maximum value f of the sum of the number of the webpage resource objects in all the webpages to be anonymizedmaxAnd the anonymous webpage with the maximum sum of the webpage resource object numbers is marked as the maximum reference webpage.
The number of the web resource objects refers to a statistical value of the number of the web resource objects, the web resource objects include basic HTML documents of the web pages and web resource objects required for rendering the documents, and the file size of the web resource objects refers to a measurement value of storage capacity required to be occupied by the web resource objects.
For example, the webpage 1 to be anonymous includes webpage resource objects a1, a2 and a3, the webpage 2 to be anonymous includes webpage resource objects b1, b2, b3, b4 and b5, and the webpage 3 to be anonymous includes webpage resource objects c1, c2, c3 and c4, so that the sum of the number of the webpage resource objects of the anonymous webpage 1 is 3, the sum of the number of the webpage resource objects of the anonymous webpage 2 is 5, and the sum of the number of the webpage resource objects of the anonymous webpage 1 is 4. Thus, in these 3 anonymous web pages, the maximum value f of the sum of the number of web page resource objectsmax5, the largest reference page is anonymous page 2.
And step 3: analyzing each webpage resource object, judging whether the webpage resource object is in a file format of analyzing the addable property of the equivalent data by the browser, and if not, converting the file format of the webpage resource object into the file format of analyzing the addable property of the equivalent data by the browser.
For example, the web resource object is in a file format of PNG or JPEG picture, which belongs to a file format of browser parsing equivalence data addability, and if a certain web resource object is not in a picture of such a file format, the web resource object can be converted into a file format of PNG or JPEG picture, so as to satisfy the file format of browser parsing equivalence data addability.
And 4, step 4: adding a corresponding number of preset webpage resource objects to all the webpages to be anonymous except the maximum reference webpage in the webpage set to be anonymous, so that the sum of the webpage resource objects of all the anonymous webpages is consistent with that of the maximum reference webpage, namely the sum of the webpage resource objects of all the anonymous webpages is fmaxAnd thus obtaining a new webpage set to be anonymous.
Similarly, for the above example, 2 (a4, a5) and 1 preset web resource object c5 are added to the web page to be anonymous 1 and the web page to be anonymous 3, respectively, and the number of the added web resource objects is 1.
The preset webpage resource object is a self-defined webpage resource object.
And 5: the method comprises the steps that a single browser accesses a new webpage set to be anonymous in a connected mode to obtain a webpage resource object access sequence of each webpage to be anonymous, and the maximum value of the size of webpage resources in each access sequence is calculated according to the access sequence;
also taking the above example as an example, in the case of not causing confusion, the web resource objects accessed by the anonymous web page 1, the anonymous web page 2 and the anonymous web page 3 under the single browser connection are respectively represented by using a, b and c, and the access sequence order of the anonymous web page 1, the anonymous web page 2 and the anonymous web page 3 is not set to be < a1, a2, a3, a4, a5>, < b1, b2, b3, b4, b5>, < c1, c2, c3, c4 and c5>, respectively.
Step 6: and adding filling data to each webpage resource object in the webpage to be anonymous according to the access sequence order so as to ensure that the file sizes of the webpage resource objects in the order of each webpage are the same, thereby obtaining a final anonymous webpage set and completing the k-anonymous webpage construction.
Also in the above example, if the file sizes of the web resource objects a1, b1, and c1 in the access requests of the user for the anonymous web page 1, the anonymous web page 2, and the anonymous web page 3, which have the access sequence order of 1 (i.e., the first access), are 10 (dimensions omitted), 20, and 15 in this order, the maximum value W of the file sizes of the web resource objects in all the access requests having the access sequence order of 1 is set to be 1maxThen, 10 and 5 units of padding data are added to the two web resource objects a1 and c1, respectively, so that the file sizes of the web resource objects a1, b1 and c1 become 20. The same is true for the processing of web page resource objects of other access sequence orders.
In an optional implementation manner, the file size of the web page resource object in the access request refers to the size of an HTML document for accessing a web page to be anonymous, and the size W of the HTML document is defined asmaxAdding empty text characters or annotations to all anonymous web pages other than the anonymous web page, thereby enabling the anonymous web page to be used in a computer systemAll anonymous web pages have HTML document size Wmax。
According to the embodiment, by adding the number of the webpage resource objects and modifying the file size of each webpage resource object, the trace of the user accessing a specific page cannot be estimated according to the webpage access flow, and the privacy security of the user browsing the webpage is protected.
The embodiment can be well applied to digital government and intelligent government, can improve the security defense line of the digital government, and can effectively prevent the access information of the user from being leaked when the user accesses the digital government and handles the general business of the intelligent government, thereby effectively avoiding the access trail of the user from being deduced by other useful people and serving as a network and information security service of the intelligent government in the digital government.
Referring to fig. 2, the present embodiment further provides a processing terminal, which includes:
a memory 101 for storing program instructions;
a processor 102 for executing the program instructions to perform the steps of the web page construction method supporting trail k-anonymity.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While preferred embodiments of the present invention have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all such alterations and modifications as fall within the scope of the invention.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.
Claims (3)
1. A webpage construction method supporting trace k-anonymity is characterized by comprising the following steps:
step 1: acquiring k target webpages, wherein k is more than or equal to 1, and constructing a webpage set needing k-anonymization based on the k target webpages to obtain a webpage set to be anonymized;
step 2: traversing the set of the web pages to be anonymous, counting the number of the web page resource objects of each web page to be anonymous, and calculating the maximum value f of the sum of the number of the web page resource objects in all anonymous web pagesmaxRecording the anonymous webpage with the maximum sum of the webpage resource object numbers as a maximum reference webpage;
and step 3: analyzing each webpage resource object, judging whether the webpage resource object is in a file format of analyzing the addable property of the equivalent data by the browser, if not, converting the file format of the webpage resource object into the file format of analyzing the addable property of the equivalent data by the browser;
and 4, step 4: adding a corresponding number of preset webpage resource objects to all anonymous webpages in the anonymous webpage set except the maximum reference webpage so that the sum of the number of the webpage resource objects of all webpages to be anonymous is consistent with that of the maximum reference webpage, thereby obtaining a new webpage set to be anonymous;
and 5: the browser accesses a new webpage set to be anonymous through single connection to obtain a webpage resource object access sequence order of each webpage to be anonymous, and the maximum value of the size of the webpage resource in each access sequence order is calculated according to the access sequence order;
step 6: and adding filling data to each webpage resource object in the webpage to be anonymous according to the access sequence order so as to ensure that the file sizes of the webpage resource objects of the webpages in the same access sequence order are the same, thereby obtaining a final anonymous webpage set and completing the k-anonymous webpage construction.
2. The method for constructing the webpage capable of supporting the trail k-anonymity, according to claim 1, wherein the webpage resource objects in the access request comprise basic HTML documents of the webpage and webpage resource object documents required for rendering the webpage, and the lengths of the access sequences of the webpage resource objects accessed by the single connection of the browser are the same and the sizes of the corresponding webpage resource object documents in the same access sequence order are the same by adding the webpage resource objects and adding filling data to the webpage resource objects.
3. A processing terminal, characterized in that it comprises:
a memory for storing program instructions;
a processor for executing the program instructions to perform the steps of the web page construction method supporting trace k-anonymity of claim 1 or 2.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111018863.8A CN113783859A (en) | 2021-08-31 | 2021-08-31 | Web page construction method and processing terminal supporting trace k-anonymity |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111018863.8A CN113783859A (en) | 2021-08-31 | 2021-08-31 | Web page construction method and processing terminal supporting trace k-anonymity |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113783859A true CN113783859A (en) | 2021-12-10 |
Family
ID=78840578
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111018863.8A Pending CN113783859A (en) | 2021-08-31 | 2021-08-31 | Web page construction method and processing terminal supporting trace k-anonymity |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113783859A (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080005264A1 (en) * | 2006-06-28 | 2008-01-03 | Microsoft Corporation | Anonymous and secure network-based interaction |
US20140278972A1 (en) * | 2013-03-15 | 2014-09-18 | Liveramp, Inc. | Anonymous information management |
US20200028926A1 (en) * | 2018-07-17 | 2020-01-23 | Popdust, Inc. | Anonymous eCommerce Behavior Tracking |
CN112836232A (en) * | 2019-11-22 | 2021-05-25 | 南京理工大学 | Dynamic webpage privacy protection method based on k-anonymity in the context of webpage fingerprinting |
-
2021
- 2021-08-31 CN CN202111018863.8A patent/CN113783859A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080005264A1 (en) * | 2006-06-28 | 2008-01-03 | Microsoft Corporation | Anonymous and secure network-based interaction |
US20110238829A1 (en) * | 2006-06-28 | 2011-09-29 | Microsoft Corporation | Anonymous and secure network-based interaction |
US20140278972A1 (en) * | 2013-03-15 | 2014-09-18 | Liveramp, Inc. | Anonymous information management |
US20200028926A1 (en) * | 2018-07-17 | 2020-01-23 | Popdust, Inc. | Anonymous eCommerce Behavior Tracking |
CN112836232A (en) * | 2019-11-22 | 2021-05-25 | 南京理工大学 | Dynamic webpage privacy protection method based on k-anonymity in the context of webpage fingerprinting |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102789470B (en) | The method and apparatus of the picture in loading webpage | |
US8332952B2 (en) | Time window based canary solutions for browser security | |
US20110119361A1 (en) | System and method for managing redacted electronic documents using callback triggers | |
US20130117802A1 (en) | Authorization-based redaction of data | |
CN106888135A (en) | The querying method and device of a kind of task status | |
CN106886544A (en) | A kind of data processing method and device | |
CN107870989A (en) | webpage generating method and terminal device | |
CN111008348A (en) | Anti-crawler method, terminal, server and computer readable storage medium | |
CN107766469A (en) | A kind of method for caching and processing and device | |
CN107959660A (en) | A kind of static file access method and device based on Nginx | |
CN113076294B (en) | Information sharing method and device | |
WO2021042508A1 (en) | Webpage generation method and device, computer device and storage medium | |
CN111159729A (en) | Permission control method, device and storage medium | |
CN105678127A (en) | Verification method and device for identity information | |
CN109325192B (en) | Advertisement anti-shielding method and device | |
CN109711189A (en) | Data desensitization method and device, storage medium, terminal | |
US10404749B2 (en) | Enforcing application security requirement rules using security annotations | |
US9436669B1 (en) | Systems and methods for interfacing with dynamic web forms | |
CN104598554B (en) | Webpage loading method and device | |
CN113783859A (en) | Web page construction method and processing terminal supporting trace k-anonymity | |
US11709966B2 (en) | System and method for automatically masking confidential information that is input on a webpage | |
CN111368231B (en) | Method and device for testing heterogeneous redundancy architecture website | |
CN110825976B (en) | Website page detection method and device, electronic equipment and medium | |
CN113709148A (en) | Website monitoring method, equipment and medium | |
CN113722642A (en) | Webpage conversion method and device, electronic equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20211210 |
|
RJ01 | Rejection of invention patent application after publication |