Abstract
With the development of data mining technology, lack of private resource protection has become a serious challenge. We propose to clarify the expression of Knowledge Graph in three layers including Data Graph, Information Graph and Knowledge Graph and illustrate the representation of Data Graph, Information Graph and Knowledge Graph respectively. We elaborate a pay as you use resource security provision approach based on Data Graph, Information Graph and Knowledge Graph in order to ensure that resources will not be used, tampered with, lost and destroyed in unauthorized situations.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Bayardo, R.J., Agrawal, R.: Data privacy through optimal k-anonymization. In: ICDE 2005 Proceedings, pp. 217–228 (2005)
Duan, Y., Fu, G., Zhou, N., Sun, X., Narendra, N.C., Hu, B.: Everything as a service (xaas) on the cloud: Origins, current and future trends. In: IEEE International Conference on Cloud Computing, pp. 621–628 (2015)
Duan, Y., Shao, L., Hu, G., Zhou, Z., Zou, Q., Lin, Z.: Specifying architecture of knowledge graph with data graph, information graph, knowledge graph and wisdom graph. In: IEEE International Conference on SERA, pp. 327–332 (2017)
Rizvi, S.J., Haritsa, J.R.: Maintaining data privacy in association rule mining. In: Proceedings of the 28th VLDB Conference, pp. 682–693 (2002)
Shao, L., Duan, Y., Sun, X., Gao, H.: Answering who/when, what, how, why through constructing data graph, information graph, knowledge graph and wisdom graph. In: Proceedings of the International Conference on SEKE, pp. 1–7 (2017)
Shao, L., Duan, Y., Sun, X., Zou, Q., Jing, R., Lin, J.: Bidirectional value driven design between economical planning and technical implementation based on data graph, information graph and knowledge graph. In: IEEE International Conference on SERA, pp. 339–344 (2017)
Soria-Comas, J., Domingo-Ferrer, J.: Big data privacy: challenges to privacy principles and models. Data Sci. Eng. 1(1), 21–28 (2016)
Win, K.T., Susilo, W., Yi, M.: Personal health record systems and their security protection. J. Med. Syst. 30(4), 309–315 (2006)
Acknowledgment
This paper is supported by NSFC under Grant (No.61363007, No.61662021, No. 6161019), NSF of Hainan No.ZDYF2017128.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Shao, L., Duan, Y., Cui, L., Zou, Q., Sun, X. (2017). A Pay as You Use Resource Security Provision Approach Based on Data Graph, Information Graph and Knowledge Graph. In: Yin, H., et al. Intelligent Data Engineering and Automated Learning – IDEAL 2017. IDEAL 2017. Lecture Notes in Computer Science(), vol 10585. Springer, Cham. https://doi.org/10.1007/978-3-319-68935-7_48
Download citation
DOI: https://doi.org/10.1007/978-3-319-68935-7_48
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-68934-0
Online ISBN: 978-3-319-68935-7
eBook Packages: Computer ScienceComputer Science (R0)