Abstract

To improve social networking user data privacy protection, and put forward based on the difference of the disturbance of social network user data privacy protection technology, adopt the method of discrete transform social network user data output discreteness scheduling, build social network user data encryption key agreement, linear combination of ellipse encryption method for network user data of the internal spatial structure reorganization, to extract the fuzzy degree of social network user data set, the introduction of the main components in the process of fusion technology for data encryption feature normalization processing, by cross compile technology to achieve the optimal coding of social network user data control, the difference perturbation technique, Design linear disturbance control and arithmetic coding in social network user data privacy protection, construct encryption and decryption keys, and realize encrypted storage and transmission of social network user data. Simulation results show that the encryption time of this method is 8.5 ms, much lower than the traditional method, and the fidelity reaches 1 when the number of iterations reaches 400. Other methods are 0.923, 0.866 and 0.921, respectively, which are all lower than the social network user data privacy protection technology based on differential interference. Therefore, The method designed in this paper can encrypt user data in social network in a shorter time, has stronger anti-attack ability, and improves the real rate of user data transmission.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call