期刊文献+

群智能感知网络中时空众包用户隐私保护研究

Research on privacy protection of spatiotemporal crowdsourcing users in swarm intelligent sensing networks
下载PDF
导出
摘要 随着智能移动设备技术和移动互联网技术的蓬勃发展,时空众包用户隐私保护成为群智能感知网络的热门话题。在分析攻击者模型的基础上,提出结合k-匿名与差分隐私的位置保护模型。同时利用分布式动态汇聚方法加快感知数据的传输速度以及斯塔克伯格博弈平衡服务质量和用户保护力度的平衡性。仿真结果表明,结合k-匿名和差分隐私保护模型相比较单一隐私保护机制拥有更高的隐私保护等级。当最大服务质量阈值约为1 km时,服务质量损失和隐私保护力度几乎相等。 with the rapid development of intelligent mobile device technology and mobile Internet technology,spatiotemporal crowdsourcing user privacy protection has become a hot topic in swarm intelligent sensing network.Based on the analysis of the attacker model,a location protection model combining k-anonymity and differential privacy is proposed.At the same time,the distributed dynamic aggregation method is used to accelerate the transmission speed of sensing data,and the Stackelberg game is used to balance the quality of service and user protection.The simulation results show that the combination of k-anonymity and differential privacy protection model has higher privacy protection level than single privacy protection mechanism.When the maximum QoS threshold is about 1km,the QoS loss and privacy protection are almost equal.
作者 王瑛 林国福 WANG Ying;LIN Guo-fu(Experimental Training Management Center of,Minjiang University,Fuzhou 350108,Fujian,China)
出处 《贵阳学院学报(自然科学版)》 2022年第1期5-9,共5页 Journal of Guiyang University:Natural Sciences
关键词 群智能感知 位置隐私 斯塔克伯格博弈 K-匿名 Swarm intelligence perception Location privacy Stackelberg game K-anonymity
  • 相关文献

参考文献10

二级参考文献52

  • 1孙晓军,周宗奎.探索性因子分析及其在应用中存在的主要问题[J].心理科学,2005,28(6):1440-1442. 被引量:90
  • 2YANG D J, XUE G L, FANG X, et al. Incentive mechanisms for crowdsensing: crowdsourcing with smartphones[J]. IEEE/ A CM Transactions on Networking, 2015, 99: 1-13.
  • 3GAO S, MA J F, SHI W S, et al. TrPF: A trafectory privacy-preserving framework for participatory sensing[J]. IEEE Transactions on Information Forensics and Security, 2013, 8(6): 874-887.
  • 4MOHAN P, PADMANABHAN V N, and RAMJEE R. Nericelh rich monitoring of road and traffic conditions using mobile smartphones[C]. Proceedings of the ACM Conference on Embedded Networked Sensor Systems, North Carolina, 2008: 323-336.
  • 5MONTJOYE Y A, HIDALGO C A, VERLEYSEN M, et al. Unique in the crowd: The privacy bounds of human mobility[R]. Nature Science Report, Cambridge, 2013.
  • 6CHRIS M, DAVID Y, and NUNG Y. Privacy vulnerability of published anonymous mobility traces[J]. IEEE Transactions on Networking, 2013, 21(3): 720-733.
  • 7孙利民,李红,王笑寒,等.物联网位置隐私保护综述[J].软件学报,2014,25(s1):1-10.
  • 8SHI E, CHANT H, RIEFFEL E, et al. Privacy-preserving aggregation of time-series data[C]. Proceedings of 18th Network & Distributed System Security Symposium, California, 2011: 1-17.
  • 9HOH B, GRUTESER M, XIONG H, et al. Achieving guaranteed anonymity in gps traces via uncertainty-aware path cloaking [J]. IEEE Transactions on Mobile Computing, 2010, 9(8): 1089-1107.
  • 10PALANISAMY B and LIU L. Attack-resilient mix-zones over road networks: architecture and algorithms[J]. IEEE Transactions on Mobile Computing, 2015, 14(3): 495-508.

共引文献59

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部