Skip to main content

A Pay as You Use Resource Security Provision Approach Based on Data Graph, Information Graph and Knowledge Graph

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 10585))

Abstract

With the development of data mining technology, lack of private resource protection has become a serious challenge. We propose to clarify the expression of Knowledge Graph in three layers including Data Graph, Information Graph and Knowledge Graph and illustrate the representation of Data Graph, Information Graph and Knowledge Graph respectively. We elaborate a pay as you use resource security provision approach based on Data Graph, Information Graph and Knowledge Graph in order to ensure that resources will not be used, tampered with, lost and destroyed in unauthorized situations.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Bayardo, R.J., Agrawal, R.: Data privacy through optimal k-anonymization. In: ICDE 2005 Proceedings, pp. 217–228 (2005)

    Google Scholar 

  2. Duan, Y., Fu, G., Zhou, N., Sun, X., Narendra, N.C., Hu, B.: Everything as a service (xaas) on the cloud: Origins, current and future trends. In: IEEE International Conference on Cloud Computing, pp. 621–628 (2015)

    Google Scholar 

  3. Duan, Y., Shao, L., Hu, G., Zhou, Z., Zou, Q., Lin, Z.: Specifying architecture of knowledge graph with data graph, information graph, knowledge graph and wisdom graph. In: IEEE International Conference on SERA, pp. 327–332 (2017)

    Google Scholar 

  4. Rizvi, S.J., Haritsa, J.R.: Maintaining data privacy in association rule mining. In: Proceedings of the 28th VLDB Conference, pp. 682–693 (2002)

    Google Scholar 

  5. Shao, L., Duan, Y., Sun, X., Gao, H.: Answering who/when, what, how, why through constructing data graph, information graph, knowledge graph and wisdom graph. In: Proceedings of the International Conference on SEKE, pp. 1–7 (2017)

    Google Scholar 

  6. Shao, L., Duan, Y., Sun, X., Zou, Q., Jing, R., Lin, J.: Bidirectional value driven design between economical planning and technical implementation based on data graph, information graph and knowledge graph. In: IEEE International Conference on SERA, pp. 339–344 (2017)

    Google Scholar 

  7. Soria-Comas, J., Domingo-Ferrer, J.: Big data privacy: challenges to privacy principles and models. Data Sci. Eng. 1(1), 21–28 (2016)

    Article  Google Scholar 

  8. Win, K.T., Susilo, W., Yi, M.: Personal health record systems and their security protection. J. Med. Syst. 30(4), 309–315 (2006)

    Article  Google Scholar 

Download references

Acknowledgment

This paper is supported by NSFC under Grant (No.61363007, No.61662021, No. 6161019), NSF of Hainan No.ZDYF2017128.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yucong Duan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Shao, L., Duan, Y., Cui, L., Zou, Q., Sun, X. (2017). A Pay as You Use Resource Security Provision Approach Based on Data Graph, Information Graph and Knowledge Graph. In: Yin, H., et al. Intelligent Data Engineering and Automated Learning – IDEAL 2017. IDEAL 2017. Lecture Notes in Computer Science(), vol 10585. Springer, Cham. https://doi.org/10.1007/978-3-319-68935-7_48

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-68935-7_48

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-68934-0

  • Online ISBN: 978-3-319-68935-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics