期刊文献+

参与式感知中隐私保护的差异化数据分享协议 被引量:2

Privacy-preserving various data sharing protocol in participatory sensing
下载PDF
导出
摘要 参与式感知中用户不仅对数据匹配度有要求,对数据差异化也同样有要求,为了既能满足用户对数据匹配度和差异化数据的需求,也能保护用户的偏好隐私,提出了一种隐私保护的差异化数据分享协议。该协议首先将交互双方的数据表示为两个整数集合,并且利用计数布隆过滤器(CBF)计算两个集合的集合交,以集合交的结果作为数据类型匹配度;其次利用CBF能删除元素的功能,计算两个集合的差异化数据值;最后将数据类型匹配度和差异化数据值与预先设定的阈值比较,判断是否符合交互条件,同时,对CBF的构造方法进行了改进,用以保护用户的偏好隐私。理论分析和实验结果表明,与基于布隆过滤器(BF)的非加密匹配协议相比,该协议克服了匹配结果偏大的缺陷,同时计算开销减少了50%以上。该协议在保护用户偏好隐私和满足用户对差异化数据需求的同时,具有较高的匹配精度和效率。 In the process of participatory sensing, not only data matching level but also data variation is required by users. In order to meet the aforementioned two requirements, meanwhile, to protect users' preference privacy, a privacy- preserving various data sharing protocol was proposed. Firstly, both interactive data were processed to two sets of integer and Counting Bloom Filter (CBF) was utilized to calculate the intersection of the two sets of integer, the result of which was used as data matching level. Secondly, the function to delete elements of CBF was utilized to calculate the value of various data. Lastly, the data matching level and the difference between various data were compared with pre-set threshold, so as to decide whether they complied with interactive condition. In the meantime, the structuring method of CBF was improved to protect users' preference privacy. Theoretical analysis and experiment results show the following facts: compared with protocols based on non-cryptographic Bloom Filter (BF), the problem of relatively large results is overcome and computational overhead is saved by more than 50%. Users' preference privacy is protected and the need of various data is met in the proposed protocol. In addition, the proposed protocol enjoys higher matching precision and efficiency.
出处 《计算机应用》 CSCD 北大核心 2015年第7期1865-1869,1896,共6页 journal of Computer Applications
基金 国家973计划项目(2011CB302306) 中央高校基本科研业务费专项(211-274230) 国家自然科学基金资助项目(41371402) 水利部"948"项目(201044) 湖北省水利厅农村饮用水水资源远程监控项目(211-230912)
关键词 参与式感知 差异化数据 数据匹配度 计数布隆过滤器 隐私保护 participatory sensing various data data match Counting Bloom Filter (CBF) privacy-preserving
  • 相关文献

参考文献19

  • 1BURKE J A, ESTRIN D, HANSEN M, et al. Participatory sensing [C]// WSW'06: Proceedings of the 1st Workshop on World-Sensor-Web. New York: ACM, 2006:117-134.
  • 2MUN M, REDDY S, SHILTON K, et al. PEIR, the personal environmental impact report, as a platform for participatory sensing systems research [C]// Proceedings of the 7th International Conference on Mobile Systems, Applications, and Services. New York: ACM, 2009: 55-68.
  • 3ZHANG J, MA J, WANG W, et al. A novel privacy protection scheme for participatory sensing with incentives [C]// CCIS 2012: Proceedings of the 2012 IEEE 2nd International Conference on Cloud Computing and Intelligent Systems. Piscataway: IEEE, 2012: 1017-1021.
  • 4AHMADI H, PHAM N, GANTI R, et al. Privacy-aware regression modeling of participatory sensing data [C]// Proceedings of the 8th ACM Conference on Embedded Networked Sensor Systems. New York: ACM, 2010: 99-112.
  • 5LEE J S, HOH B. Sell your experiences: a market mechanism based incentive for participatory sensing [C]// PerCom 2010: Proceedings of the 2010 IEEE International Conference on Pervasive Computing and Communications. Piscataway: IEEE, 2010: 60-68.
  • 6中华人民共和国卫生部.GB5749-2006生活饮用水卫生标准[S].北京:中国标准出版社,2006.
  • 7AGRAWAL R, EVFIMIEVSKI A, SRIKANT R. Information sharing across private databases [C]// Proceedings of the 2003 ACM SIGMOD International Conference on Management of Data. New York: ACM, 2003: 86-97.
  • 8XIE Q, HENGARTNER U. Privacy-preserving matchmaking for mobile social networking secure against malicious users [C]// PST 2011: Proceedings of the 2011 Ninth Annual International Conference on Privacy, Security and Trust. Piscataway: IEEE, 2011: 252-259.
  • 9FREEDMAN M J, NISSIM K, PINKAS B. Efficient private matching and set intersection [C]// Advances in Cryptology-EUROCRYPT 2004. Berlin: Springer, 2004: 1-19.
  • 10YE Q, WANG H, PIEPRZYK J. Distributed private matching and set operations [C]// ISPEC 2008: Proceedings of the 4th International Conference on Information Security Practice and Experience, LNCS 4991. Berlin: Springer, 2008: 347-360.

共引文献141

同被引文献11

引证文献2

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部