Acceso abierto

Research on Cross-platform Data Interaction and Information Fusion Mechanism of Public Security Intelligence for National Security

 y   
17 mar 2025

Cite
Descargar portada

Figure 1.

Information structure
Information structure

Figure 2.

Communication request stage
Communication request stage

Figure 3.

Relay chain response phase
Relay chain response phase

Figure 4.

Key generation
Key generation

Figure 5.

Session key generation
Session key generation

Figure 6.

Data transmission phase
Data transmission phase

Figure 7.

Privacy leaks caused by visible policy conflicts
Privacy leaks caused by visible policy conflicts

Figure 8.

Task scheduling based on the information grid
Task scheduling based on the information grid

Figure 9.

Public security information mining results
Public security information mining results

Figure 10.

Real-time and recall contrast
Real-time and recall contrast

Figure 11.

The accuracy of the fusion algorithm under other variable loads
The accuracy of the fusion algorithm under other variable loads

Privacy risk analysis

Node Num Movielen Dataset Amazon Dataset
Max Mean Max Mean
100 0.152 0.056 0.04 0.016
1000 0.162 0.053 0.009 0.0065
10000 0.114 0.038 0.0059 0.00455

The comments are illustrated

Commentary set Explanation
c1 (good) The criteria and requirements of the index are fully met
c2 (better) In conformity with most indicators, only individuals can’t meet the requirements
c3 (general) Basic compliance criteria, less projects that can’t meet the requirements
c4 (worse) The basic discrepancies are not able to meet the requirements of the project
c5 (Very bad) The vast majority of the indicators are inconsistent with the criteria, and only individuals can meet the requirements

Security comparison

Scheme The Test Phase Examines The Validity Of The Information Safety Difficulty
Bh N Ow-Id-Cca Bdh
Rll N Ow-Id-Cca&Ow-Cca Dlp
Dcd N Ow-Id-Cca&Ind-Id-Cca Cdh&Ddh
Ours Y Ow-Id-Cca&Ind-Id-Cca Cdh&Ddh

Index weight

Factor Layer Weighting Index Layer Weighting
(W1) 0.36 (W11) 0.26
(W12) 0.15
(W13) 0.22
(W14) 0.2
(W15) 0.17
(W2) 0.15 (W21) 0.47
(W22) 0.53
(W3) 0.23 (W31) 0.39
(W32) 0.32
(W33) 0.29
(W4) 0.26 (W41) 0.22
(W42) 0.18
(W43) 0.36
(W44) 0.24

Effectiveness evaluation system

Target Layer Factor Layer Index Layer
Public Security Intelligence Evaluation (W) Intelligence Effect(W1) Veracity(W11)
Comprehensiveness(W12)
Timeliness(W13)
Novelty(W14)
Applicability(W15)
Organization(W2) Reasonableness(W21)
Coordination(W22)
Intelligence Officer(W3) Intelligence Sensitivity(W31)
Intelligence Level(W32)
Intelligence Ability(W33)
Information Platform(W4) Technical Advance(W41)
Software Quality(W42)
Economy(W43)
Ease Of Use(W44)

Intelligent contract registration message specification

Parameter Remark
Appchainid Application Chain Id
Chaincodeld Service Id
Type Service Type
Policy <Privacy Type>:<Chainld+Chaincodeld>
Extra Other Information

Application chain registration message specification

Parameter Remark
App ChainID Application chain id
Type Application chain type
Certificate The letter of the endorsement node is the letter of the letter
CBP The CBP contract address deployed on the application chain
Extra Other information

Specific evaluation grade

Index layer c1 c2 c3 c4 c5
(W11) 0.5 0.3 0.1 0.1 0
(W12) 0.4 0.2 0.2 0.1 0.1
(W13) 0.4 0.3 0.2 0.1 0
(W14) 0.4 0.3 0.3 0 0
(W15) 0.3 0.4 0.1 0.1 0.1
(W21) 0.5 0.1 0.2 0.2 0
(W22) 0.3 0.2 0.2 0.1 0.2
(W31) 0.6 0.3 0.1 0 0
(W32) 0.4 0.5 0.1 0 0
(W33) 0.5 0.3 0.1 0.1 0
(W41) 0.4 0.3 0.2 0.1 0
(W42) 0.6 0.1 0.2 0.1 0
(W43) 0.5 0.3 0.2 0 0
(W44) 0.3 0.2 0.4 0.1 0