期刊文献+

可穿戴设备流数据的隐私保护发布

Privacy-preserving publishing of streaming data for wearable devices
下载PDF
导出
摘要 针对可穿戴设备流数据可能泄露个人隐私的问题,提出了一种基于自编码器和时频变换的隐私保护数据发布方法。通过分块离散余弦变换将滑动窗口数据变换为频谱数据,再通过自编码器实现脱敏变换,最后由重构的频谱数据逆变换回滑动窗口数据。利用预训练的活动识别与身份识别分类器评估自编码器输出结果的效用性和隐私性,通过多目标损失函数与反向传播更新自编码器权重。在Motion-Sense数据集上的实验结果表明,在重构数据上活动识别的F_(1)-score由0.944降低至0.940,而身份识别的F_(1)-score由0.908降低至0.673,重构加速度数据与原数据之间的均方误差为0.27。与同类算法相比,该算法能够更好地保留数据的效用性以及提高数据的安全性。 This paper proposed a privacy-preserving data publishing method based on autoencoder and time-frequency transformation to avoid privacy disclosure from the stream data of wearable devices.Firstly,this method transformed slide window data into frequency spectrum by the block discrete cosine transformation.Secondly,it desensitized frequency spectrum by autoencoder.Finally,it obtained slide window data from reconstructed frequency spectrum by the inverse block discrete cosine transformation.This paper applied pre-trained activity and identity classifiers to evaluate the privacy and utility of autoenco-der’s output,then updated the weights of network by multi-objective loss function and back propagation.The experimental results on the Motion-Sense dataset show that the F_(1)-score of activity recognition on the reconstructed data is reduced from 0.944 to 0.940,the F_(1)-score of identity recognition is reduced from 0.908 to 0.673,and the mean square error between reconstructed acceleration data and original data is 0.27.Compared with similar algorithms,this proposed algorithm can better retain the utility of data and improve data security.
作者 苟聪 郑洪英 肖迪 Gou Cong;Zheng Hongying;Xiao Di(College of Computer Science,Chongqing University,Chongqing 400044,China)
出处 《计算机应用研究》 CSCD 北大核心 2021年第9期2816-2820,共5页 Application Research of Computers
基金 国家自然科学基金资助项目(61672118)。
关键词 可穿戴设备 流数据发布 效用性与隐私性 自编码器 离散余弦变换 wearable device streaming data publishing utility and privacy autoencoder discrete cosine transformation
  • 相关文献

参考文献1

二级参考文献50

  • 1Bao Shudi,Poon Carmen C.Y.,Shen Lianfeng,Zha.ng Yuanting.AUTHENTICATED SYMMETRIC-KEY ESTABLISHMENT FOR MEDICAL BODY SENSOR NETWORKS[J].Journal of Electronics(China),2007,24(3):421-427. 被引量:6
  • 2A1 AMEEN M, LIU Jing-wei, KWAK K. Security and privacy issues in wireless sensor networks for healthcare applications[ J']. Journal of Medical Systems,2012,36( 1 ) :93-101.
  • 3SHARMILEE K M, MUKESH R, DAMODARAM A, et al. Secure WBAN using rule-based IDS with biometrics and MAC authentication [ C ]//Proc of the 10th International Conference on e-health Networ- king, Applications and Services. [ S. 1. ] : IEEE Press, 2008 : 102- 107.
  • 4MURTHY J K, THIMMAPPA P, RAO V S. Investigations on the routing protocols for wireless body area networks [ C ]//Proc of Inter- national Conference on Advances in Computing. India: Springer, 2012:483-490.
  • 5CHHVEZ-SANTIAGO R, KHALEGHI A, BALASINGHAM I, et al. Architecture of an ultra wideband wireless body area network for medi- cal applications[ C ]//Proc of the 2nd International Conference on Ap- plied Sciences in Biomedical and Communication Technologies. [ S. 1. ] : IEEE Press ,2009 : 1-6.
  • 6KHAN J Y, YUCE M R, KARAMI F. Performance evaluation of a wireless body area sensor network for remote patient monitoring [ C ]// Prec of IEEE International Conference on Engineering in Medicine and Biology Society, [ S. 1. ] :IEEE Press,2008:1266-1269.
  • 7LIMing, LOU Wen-jing, REN Kui. Data security and privacy in wireless body area networks [ J]. Wiroloss Communications,2010, 17(1) :51-58.
  • 8FAN Rong, PING Ling-di, FU Jian-qing, et al. The new secure and efficient data storage approaches for wireless body area networks [ C ]//Proc of International Conference on Wireless Communications and Signal Processing. [ S. 1. ] :IEEE Press, 2010:1-5.
  • 9MYKLETUN E, GIRAO J, WESTHOFF D. Public key based crypto- schemes for data concealment in wireless sensor networks [ C ]//Proc of IEEE International Conference on Communications. [ S. 1. ] : IEEE Press, 2006 : 2288 - 2295.
  • 10MANA M, FEHAM M, BENSABER B A. Trust key management scheme for wireless body area networks[ J]. International Journal of Network Security ,2011,12(2) :71-79.

共引文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部