Nothing Special   »   [go: up one dir, main page]

CN113553612B - Privacy protection method based on mobile crowd sensing technology - Google Patents

Privacy protection method based on mobile crowd sensing technology Download PDF

Info

Publication number
CN113553612B
CN113553612B CN202110723883.9A CN202110723883A CN113553612B CN 113553612 B CN113553612 B CN 113553612B CN 202110723883 A CN202110723883 A CN 202110723883A CN 113553612 B CN113553612 B CN 113553612B
Authority
CN
China
Prior art keywords
task
sensing
node
nodes
receiving end
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110723883.9A
Other languages
Chinese (zh)
Other versions
CN113553612A (en
Inventor
汪晓丁
胡嘉
林晖
彭梦垚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujian Normal University
Original Assignee
Fujian Normal University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujian Normal University filed Critical Fujian Normal University
Priority to CN202110723883.9A priority Critical patent/CN113553612B/en
Publication of CN113553612A publication Critical patent/CN113553612A/en
Application granted granted Critical
Publication of CN113553612B publication Critical patent/CN113553612B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/23Clustering techniques
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16YINFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
    • G16Y10/00Economic sectors
    • G16Y10/60Healthcare; Welfare
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Data Mining & Analysis (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Databases & Information Systems (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • Medical Informatics (AREA)
  • Economics (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Development Economics (AREA)
  • Epidemiology (AREA)
  • General Business, Economics & Management (AREA)
  • Primary Health Care (AREA)
  • Artificial Intelligence (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Evolutionary Biology (AREA)
  • Evolutionary Computation (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

本发明提供一种基于移动群智感知技术的隐私保护方法,包括步骤:任务发布端在分配感知任务之前,先在感知层中对任务接收端使用谱聚类算法进行分类,并划分相应的安全等级;任务发布端将待分配的感知任务按敏感度进行排序,并划分相应的安全等级,然后将感知任务通过网络层传输到应用层的区块链服务器中;区块链服务器采用智能合约技术限制任务接收端对感知任务的选择。本发明通过使用谱聚类的方法对任务接收端进行安全等级划分,并对要发布的感知任务也进行安全等级划分,然后采用智能合约技术,有效限制任务接收端对不同等级的感知任务的接收权限,显著提高系统性能并同时对感知任务中的敏感信息起到保护作用。

The present invention provides a privacy protection method based on mobile crowd-sensing technology, which includes the steps: before assigning the sensing task, the task issuing end classifies the task receiving end using the spectral clustering algorithm in the sensing layer, and divides the corresponding security Level; the task issuer sorts the perception tasks to be assigned according to the sensitivity, and divides the corresponding security level, and then transmits the perception tasks to the blockchain server of the application layer through the network layer; the blockchain server adopts smart contract technology Restrict the choice of perception tasks at the task receiver. The present invention divides the security level of the task receiving end by using the spectral clustering method, and also divides the security level of the perception tasks to be released, and then adopts the smart contract technology to effectively limit the reception of different levels of perception tasks by the task receiving end permissions, significantly improving system performance and at the same time protecting sensitive information in sensing tasks.

Description

一种基于移动群智感知技术的隐私保护方法A privacy protection method based on mobile crowd sensing technology

技术领域technical field

本发明涉及医疗物联网中移动群智感知领域,尤其是涉及一种基于移动群智感知技术的隐私保护方法。The invention relates to the field of mobile crowd sensing in the medical internet of things, in particular to a privacy protection method based on mobile crowd sensing technology.

背景技术Background technique

医疗物联网(IoMT)是物联网技术在医疗健康领域的应用,医疗物联网的出现为传统医疗领域所面临的一个普遍的问题提供了一个可行的解决方案,即解决了对于高度动态与分布式的医疗机构该如何及时且准确的获得参与用户的医疗健康信息的问题。在日常生活中,IoMT通过从分布在各地的各类终端应用中收集用户的医疗健康数据,如平板,手机,个人电脑,智能手环等,并通过分析相关数据,对用户健康状况作出及时的诊断与报告,这一过程显著的提高了医疗效率。The Internet of Medical Things (IoMT) is the application of Internet of Things technology in the field of healthcare. The emergence of the Internet of Medical Things provides a feasible solution to a common problem faced by the traditional medical field, that is, it solves the problem of highly dynamic and distributed How should medical institutions obtain the medical and health information of participating users in a timely and accurate manner. In daily life, IoMT collects the user's medical and health data from various terminal applications distributed in various places, such as tablets, mobile phones, personal computers, smart bracelets, etc., and analyzes the relevant data to make timely analysis of the user's health status. Diagnosis and reporting, this process significantly improves medical efficiency.

进一步地,为了更加方便从终端收集数据,移动群智感知技术(MCS)便引起了广泛关注,MCS技术使得日常生活中的移动终端设备具备了感知、计算以及通信的能力,并可以生成环境本身的数据信息。具体来说,根据数据提供者的类型来分,MCS可被分为个人感知以及社区(群体)感知。一方面,从参与用户角度而言更加侧重于个人感知的作用,即MCS技术通过收集计算个人信息数据来为用户提供相应的健康数据报告;另一方面,从数据收集端而言则更加侧重于社区感知的作用,即MCS技术通过汇聚所有参与用户的信息数据来为医院等医疗机构提供大量数据,以便供其对大规模现象的监测,但这也就需要更多的参与者积极的提供个人健康数据。与传统的医疗健康管理模式相比,基于MCS技术的医疗健康管理系统具有有效节省经济与时间成本的优势。然而,在数据收集过程中,可能会涉及到用户与任务数据的隐私泄露问题。Furthermore, in order to more conveniently collect data from terminals, mobile crowd sensing technology (MCS) has attracted widespread attention. MCS technology enables mobile terminal devices in daily life to have the capabilities of perception, computing and communication, and can generate the environment itself. data information. Specifically, according to the type of data provider, MCS can be divided into individual perception and community (group) perception. On the one hand, from the perspective of participating users, it focuses more on the role of personal perception, that is, MCS technology provides users with corresponding health data reports by collecting and calculating personal information data; on the other hand, from the perspective of data collection, it focuses more on The role of community perception, that is, MCS technology provides a large amount of data for hospitals and other medical institutions by gathering information and data of all participating users, so that they can monitor large-scale phenomena, but this also requires more participants to actively provide personal health data. Compared with the traditional medical and health management model, the medical and health management system based on MCS technology has the advantages of effectively saving economic and time costs. However, during the data collection process, the privacy disclosure of user and task data may be involved.

目前如何对数据收集过程中的隐私进行有效保护已成为IoMT中移动群智感知技术的研究热点,现有出现了一些相关的研究成果:Haiming Jin等(Incentive mechanismfor privacy-aware data aggregation in mobile crowd sensing systems,2018,1-14)提出了一种全新的移动智能感知系统,它集成了数据聚合、激励以及扰动机制,其中扰动机制确保了用户对隐私保护的要求以及扰动后数据的准确性要求;Haiqin Wu等(Enablingdata trustworthiness and user privacy in mobile crowdsensing,2019,2294-2307)提出了一种不需要可信第三方的可信以及隐私保护的移动群智感知策略,在该策略中除了通过群签名进行匿名身份验证外,还设计了基于盲签名的协议来实现用户的匿名授权验证;Jinwen Xi等(CrowdBLPS:Ablockchain-based location privacy-preserving mobilecrowdsensing system,2019,16(6))引入智能合约的思想,提出了一个两阶段的方法,包括预先登记阶段以及最终选择阶段,以达到保护位置隐私的目的;Jianbing Ni等(Enablingstrong privacy preservation and accurate task allocation for mobilecrowdsensing,2020,19(6):1317-1331)提出了一种具有用户信用管理的强隐私保护移动群智感知系统,利用代理重加密以及BBS+签名技术来防止用户的隐私泄露。At present, how to effectively protect privacy in the process of data collection has become a research hotspot in mobile crowd sensing technology in IoMT, and some related research results have appeared: Haiming Jin et al. (Incentive mechanism for privacy-aware data aggregation in mobile crowd sensing systems , 2018, 1-14) proposed a brand-new mobile intelligent perception system, which integrates data aggregation, incentives and disturbance mechanisms, in which the disturbance mechanism ensures the user's privacy protection requirements and the accuracy of the disturbed data; Haiqin Wu et al. (Enablingdata trustworthiness and user privacy in mobile crowdsensing, 2019, 2294-2307) proposed a trusted and privacy-protected mobile crowdsensing strategy that does not require a trusted third party. In addition to anonymous identity verification, a protocol based on blind signature is also designed to realize anonymous authorization verification of users; Jinwen Xi et al. (CrowdBLPS: Ablockchain-based location privacy-preserving mobile crowdsensing system, 2019, 16(6)) introduced the idea of smart contracts, A two-stage method is proposed, including the pre-registration stage and the final selection stage, to achieve the purpose of protecting location privacy; Jianbing Ni et al. (Enablingstrong privacy preservation and accurate task allocation for mobilecrowdsensing,2020,19(6):1317-1331) A mobile crowd sensing system with strong privacy protection and user credit management is proposed, which uses proxy re-encryption and BBS+signature technology to prevent user privacy from leaking.

但现有的方法大多集中于对用户个人敏感数据隐私的保护,而对感知任务中的敏感信息的保护仍需加强;因此,结合医疗物联网的特点,设计出能够有效保护感知任务中敏感信息不被泄露的方法成为本领域技术人员亟待解决的技术问题。However, most of the existing methods focus on protecting the privacy of users’ personal sensitive data, and the protection of sensitive information in sensing tasks still needs to be strengthened; The method of not being leaked has become a technical problem to be solved urgently by those skilled in the art.

发明内容Contents of the invention

本发明所要解决的技术问题是:提供一种基于移动群智感知技术的隐私保护方法,能够有效防止感知任务中的敏感信息被恶意窃取。The technical problem to be solved by the present invention is to provide a privacy protection method based on mobile crowd sensing technology, which can effectively prevent sensitive information in sensing tasks from being maliciously stolen.

为了解决上述技术问题,本发明采用的技术方案为:一种基于移动群智感知技术的隐私保护方法,包括步骤:In order to solve the above technical problems, the technical solution adopted in the present invention is: a privacy protection method based on mobile crowd sensing technology, comprising steps:

S1、任务发布端在分配感知任务之前,先在感知层中对任务接收端使用谱聚类算法进行分类,并按照分类后的影响力大小排序对每个分类簇划分相应的安全等级;S1. Before assigning sensing tasks, the task issuing end first uses the spectral clustering algorithm to classify the task receiving end in the sensing layer, and divides each classification cluster into a corresponding security level according to the degree of influence after classification;

S2、所述任务发布端将待分配的所述感知任务按敏感度进行排序,并按顺序为所述感知任务划分相应的安全等级,然后将所述感知任务通过网络层传输到应用层的区块链服务器中;S2. The task issuing end sorts the sensing tasks to be assigned according to sensitivity, and divides the corresponding security levels for the sensing tasks in order, and then transmits the sensing tasks to the area of the application layer through the network layer In the block chain server;

S3、所述区块链服务器采用智能合约技术限制所述任务接收端对所述感知任务的选择。S3. The block chain server uses smart contract technology to limit the selection of the sensing task by the task receiving end.

本发明的有益效果在于:本发明提供一种基于移动群智感知技术的隐私保护方法,通过在感知任务的分配与接收之前,任务发布端使用谱聚类的方法对任务接收端进行安全等级的划分,并根据感知任务中敏感信息的敏感度排序将感知任务也进行安全等级的划分,然后与区块链服务器中的智能合约技术相结合,可以有效限制任务接收端对不同等级的感知任务的接收权限,显著提高系统性能的同时对感知任务中的敏感信息起到保护作用。The beneficial effect of the present invention is that: the present invention provides a privacy protection method based on mobile crowd sensing technology, before the distribution and reception of sensing tasks, the task issuer uses the spectral clustering method to perform security level assessment on the task receiver According to the sensitivity ranking of the sensitive information in the sensing task, the sensing task is also divided into security levels, and then combined with the smart contract technology in the blockchain server, it can effectively limit the task receiver's ability to perceive different levels of sensing tasks. Receive permissions, significantly improve system performance and protect sensitive information in perception tasks.

附图说明Description of drawings

图1为本发明实施例的一种基于移动群智感知技术的隐私保护方法的整体流程图;1 is an overall flowchart of a privacy protection method based on mobile crowd sensing technology according to an embodiment of the present invention;

图2为本发明实施例的一种基于移动群智感知技术的隐私保护方法的框架示意图;FIG. 2 is a schematic framework diagram of a privacy protection method based on mobile crowd sensing technology according to an embodiment of the present invention;

图3为本发明实施例的一种基于移动群智感知技术的隐私保护方法的具体流程图。FIG. 3 is a specific flowchart of a privacy protection method based on mobile crowd sensing technology according to an embodiment of the present invention.

具体实施方式Detailed ways

为详细说明本发明的技术内容、所实现目的及效果,以下结合实施方式并配合附图予以说明。In order to describe the technical content, achieved goals and effects of the present invention in detail, the following descriptions will be made in conjunction with the embodiments and accompanying drawings.

请参照图1至图3,一种基于移动群智感知技术的隐私保护方法,包括步骤:Please refer to Figure 1 to Figure 3, a privacy protection method based on mobile crowd sensing technology, including steps:

S1、任务发布端在分配感知任务之前,先在感知层中对任务接收端使用谱聚类算法进行分类,并按照分类后的影响力大小排序对每个分类簇划分相应的安全等级;S1. Before assigning sensing tasks, the task issuing end first uses the spectral clustering algorithm to classify the task receiving end in the sensing layer, and divides each classification cluster into a corresponding security level according to the degree of influence after classification;

S2、所述任务发布端将待分配的所述感知任务按敏感度进行排序,并按顺序为所述感知任务划分相应的安全等级,然后将所述感知任务通过网络层传输到应用层的区块链服务器中;S2. The task issuing end sorts the sensing tasks to be assigned according to sensitivity, and divides the corresponding security levels for the sensing tasks in order, and then transmits the sensing tasks to the area of the application layer through the network layer In the block chain server;

S3、所述区块链服务器采用智能合约技术限制所述任务接收端对所述感知任务的选择。S3. The block chain server uses smart contract technology to limit the selection of the sensing task by the task receiving end.

由上述描述可知,本发明的有益效果在于:通过在感知任务的分配与接收之前,任务发布端使用谱聚类的方法对任务接收端进行安全等级的划分,并根据感知任务中敏感信息的敏感度排序将感知任务也进行安全等级的划分,然后与区块链服务器中的智能合约技术相结合,可以有效限制任务接收端对不同等级的感知任务的接收权限,显著提高系统性能的同时对感知任务中的敏感信息起到保护作用。From the above description, it can be known that the beneficial effect of the present invention lies in: before the assignment and reception of the sensing task, the task issuing end uses the spectral clustering method to divide the security level of the task receiving end, and according to the sensitivity of the sensitive information in the sensing task Degree sorting divides the perception tasks into security levels, and then combines it with the smart contract technology in the blockchain server, which can effectively limit the task receiving end's receiving authority for different levels of perception tasks, significantly improving system performance and at the same time improving the perception Sensitive information in missions is protected.

进一步地,所述谱聚类算法基于四个指标:节点度中心性、节点中介中心性、节点局部聚类系数和节点基于度的图熵。Further, the spectral clustering algorithm is based on four indicators: node degree centrality, node betweenness centrality, node local clustering coefficient and node degree-based graph entropy.

进一步地,所述步骤S1中的先在感知层中对任务接收端使用谱聚类算法进行分类具体包括以下步骤:Further, in the step S1, the classification of the task receiving end using the spectral clustering algorithm in the perception layer specifically includes the following steps:

S10、将所述任务接收端组成社交网络中的节点,基于所述四个指标作为节点相似度的计算参照,构造相似图;S10. Composing the task receiving end into a node in a social network, and constructing a similarity graph based on the four indicators as a reference for calculating node similarity;

S11、根据公式(1)得出所述社交网络中每个节点的向量表示:S11. Obtain the vector representation of each node in the social network according to formula (1):

xi=<D(vi),BC(vi),LC(vi),If(G(vi))> (1);x i =<D(v i ),BC(v i ),LC(v i ),I f (G(v i ))>(1);

其中,D(vi)为所述节点度中心性,BC(vi)为所述节点中介中心性,LC(vi)为所述节点局部聚类系数,If(G(vi))为所述节点基于度的图熵;Among them, D(v i ) is the degree centrality of the node, BC(v i ) is the betweenness centrality of the node, LC(v i ) is the local clustering coefficient of the node, If (G(v i ) ) is the degree-based graph entropy of the node;

S12、得到每个节点的向量表示之后,根据公式(2)计算出两个节点vi及vj之间的相似度:S12, after obtaining the vector representation of each node, calculate the similarity between two nodes v i and v j according to formula (2):

选择与vi最相似的前K个节点作为vi的邻居节点,并加上相应的连边,从而形成相似图GsSelect the top K nodes most similar to v i as the neighbor nodes of v i , and add corresponding edges to form a similarity graph G s ;

S13、根据公式(3)计算拉普拉斯矩阵:S13, calculate the Laplacian matrix according to formula (3):

L=D-W (3);L=D-W (3);

其中,D为度矩阵,W为邻接矩阵;Among them, D is the degree matrix, W is the adjacency matrix;

在所述邻接矩阵中,每两个节点间的权值计算如下:In the adjacency matrix, the weight between every two nodes is calculated as follows:

ωij=fsim(vi,vj) (4);ω ij =f sim (v i ,v j ) (4);

S14、根据公式(5)使用比率切割法使各子集中节点数平衡:S14. According to the formula (5), use the ratio cutting method to balance the number of nodes in each subset:

S15、根据拉普拉斯矩阵中的T个特征向量组成特征矩阵Y;S15, forming a feature matrix Y according to the T feature vectors in the Laplacian matrix;

S16、将所述特征矩阵Y输入k-均值算法进行聚类,聚类结果为各个用户子群CiS16. Input the feature matrix Y into the k-means algorithm for clustering, and the clustering result is each user subgroup C i ;

S17、根据公式(6)得出每个所述用户子群的影响力大小:S17. Obtain the influence of each of the user subgroups according to formula (6):

其中,为Ci中所述节点度中心性的平均值、/>为Ci中所述节点中介中心性的平均值、/>为Ci中所述节点局部聚类系数的平均值、为Ci中所述节点基于度的图熵的平均值。in, is the average of the degree centrality of the nodes mentioned in C i , /> is the average betweenness centrality of nodes mentioned in C i , /> is the average value of the local clustering coefficient of the nodes in C i , is the average value of the degree-based graph entropy of the nodes in C i .

进一步地,所述步骤S11还包括:Further, the step S11 also includes:

所述节点中介中心性的计算如下:The calculation of the betweenness centrality of the nodes is as follows:

进一步地,所述步骤S11还包括:Further, the step S11 also includes:

所述节点局部聚类系数的计算如下:The calculation of the node local clustering coefficient is as follows:

其中,μG(vi)和ωG(vi)分别表示的是G(vi)中三角形以及三边形的数量。Among them, μG(v i ) and ωG(v i ) respectively represent the number of triangles and triangles in G(v i ).

进一步地,所述步骤S11还包括:Further, the step S11 also includes:

所述节点基于度的图熵计算如下:The degree-based graph entropy of the nodes is calculated as follows:

设α=1,则有:If α=1, then:

其中,n为图中节点的个数,m为图中边的条数。Among them, n is the number of nodes in the graph, and m is the number of edges in the graph.

由上述描述可知,在由任务接收端组成的社交网络中按照四个节点指标通过谱聚类方法对任务接收端完成安全等级划分,有效降低了共谋攻击的风险。It can be seen from the above description that in the social network composed of task receivers, according to the four node indicators, the task receivers are divided into security levels through the spectral clustering method, which effectively reduces the risk of collusion attacks.

进一步地,所述步骤S2中还包括:Further, the step S2 also includes:

所述任务发布端将待分配的所述感知任务分割为不同的多个子任务。The task issuing end divides the perception task to be assigned into a plurality of different subtasks.

由上述描述可知,将感知任务分割成不同的子任务,可以限制任务接收端窃取完整的感知任务的敏感信息,从而防止感知任务中的隐私泄露。From the above description, it can be known that dividing the perception task into different subtasks can restrict the task receiver from stealing the sensitive information of the complete perception task, thereby preventing the privacy leakage in the perception task.

进一步地,所述步骤S2中所述任务发布端将待分配的所述感知任务按敏感度进行排序,并按顺序为所述感知任务划分相应的安全等级具体为:Further, in the step S2, the task issuer sorts the sensing tasks to be assigned according to sensitivity, and divides the corresponding security levels for the sensing tasks in order, specifically:

所述任务发布端将多个所述子任务按所述子任务中敏感信息的敏感度程度从大到小进行排序,并按照预设的等级个数顺次将所述子任务划分到不同的安全级别中。The task issuing end sorts the multiple subtasks according to the degree of sensitivity of the sensitive information in the subtasks from large to small, and sequentially divides the subtasks into different subtasks according to the number of preset levels. security level.

由上述描述可知,对感知任务的子任务都进行安全等级划分之后,结合也进行了安全等级划分的任务接收端,可以有效避免共谋攻击。It can be seen from the above description that after the sub-tasks of the perception task are divided into security levels, the collusion attack can be effectively avoided in combination with the task receiving end that has also been divided into security levels.

进一步地,所述步骤S3中还包括:Further, the step S3 also includes:

所述智能合约为超级账本中的一种电子合约,所述电子合约的规则、监督及决策由所述区块链服务器预先设置。The smart contract is an electronic contract in the hyperledger, and the rules, supervision and decision-making of the electronic contract are preset by the blockchain server.

由上述描述可知,通过电子合约的预设规则、监督及决策,可以有效防止任务接收端掌握整个感知任务中的敏感信息以及防止隐私遭到共谋攻击。From the above description, it can be seen that through the preset rules, supervision and decision-making of the electronic contract, it can effectively prevent the task receiver from mastering the sensitive information in the entire sensing task and prevent the privacy from collusion attacks.

进一步地,所述步骤S3具体为:Further, the step S3 is specifically:

所述任务接收端在请求访问所述区块链服务器中的所述感知任务时,所述电子合约检测所述任务接收端的安全等级与所选择的所述感知任务的安全等级是否相同,若相同则所述任务接收端可以接收所选择的所述感知任务,否则,所述任务接收端不可以接收所选择的所述感知任务。When the task receiver requests access to the perception task in the blockchain server, the electronic contract detects whether the security level of the task receiver is the same as the selected security level of the perception task, and if they are the same Then the task receiving end can receive the selected sensing task, otherwise, the task receiving end cannot receive the selected sensing task.

由上述描述可知,通过智能合约完成对任务接收端的访问控制,可以有效保护感知任务中的敏感信息以防被恶意任务接收端窃取。From the above description, it can be seen that the access control to the task receiver is completed through the smart contract, which can effectively protect the sensitive information in the perception task from being stolen by the malicious task receiver.

请参照图1,本发明的实施例一为:Please refer to Fig. 1, embodiment one of the present invention is:

一种基于移动群智感知技术的隐私保护方法,本实施例为基于医疗物联网背景下,处于感知层的任务发布端在对任务接收端,即参与用户以及需要发布的医疗感知任务进行相应的安全等级分类之后,通过网络层将医疗感知任务提交到应用层中的区块链服务器中存储,并且供感知层的任务接收端进行任务的选择,同时在区块链服务器中使用智能合约技术来完成任务接收端的访问控制权限。A privacy protection method based on mobile crowd-sensing technology. This embodiment is based on the background of the medical Internet of Things. The task issuing end at the perception layer is corresponding to the task receiving end, that is, the participating users and the medical sensing tasks that need to be issued. After the security level classification, the medical perception task is submitted to the blockchain server in the application layer through the network layer for storage, and the task receiving end of the perception layer can select the task, and at the same time, the smart contract technology is used in the blockchain server. Complete the access control permissions on the receiving end of the task.

如图1所示,本实施例的一种基于移动群智感知技术的隐私保护方法,包括步骤:As shown in Figure 1, a kind of privacy protection method based on mobile crowd sensing technology of the present embodiment comprises steps:

S1、任务发布端在分配感知任务之前,先在感知层中对任务接收端使用谱聚类算法进行分类,并按照分类后的影响力大小排序对每个分类簇划分相应的安全等级。S1. Before assigning sensing tasks, the task issuing end first uses the spectral clustering algorithm to classify the task receiving end in the sensing layer, and divides each classification cluster into a corresponding security level according to the degree of influence after classification.

S2、任务发布端将待分配的感知任务按敏感度进行排序,并按顺序为感知任务划分相应的安全等级,然后将感知任务通过网络层传输到应用层的区块链服务器中。S2. The task issuer sorts the sensing tasks to be assigned according to the sensitivity, and divides the corresponding security levels for the sensing tasks in order, and then transmits the sensing tasks to the blockchain server of the application layer through the network layer.

S3、区块链服务器采用智能合约技术限制任务接收端对感知任务的选择。S3. The blockchain server uses smart contract technology to limit the choice of the task receiver to the sensing task.

在此,需要说明的是,本实施例中步骤S1与步骤S2之间并无严格的时序限制。例如,可以是任务发布端先对感知任务划分安全等级,再对任务接收端划分安全等级;也可以是任务发布端先对任务接收端划分安全等级,再对感知任务划分安全等级;再或者可以同时对感知任务及任务接收端划分安全等级。Here, it should be noted that there is no strict time sequence restriction between step S1 and step S2 in this embodiment. For example, it may be that the task issuing end first divides the security level of the sensing task, and then divides the security level of the task receiving end; it may also be that the task issuing end first divides the security level of the task receiving end, and then divides the security level of the sensing task; or it may At the same time, the security level is divided for the sensing task and the task receiving end.

即在本实施例中,通过在感知任务的分配与接收之前,任务发布端使用谱聚类的方法对任务接收端进行安全等级的划分,然后与区块链服务器中的智能合约技术相结合,可以有效限制任务接收端对不同等级的感知任务的接收权限,显著提高系统性能的同时对感知任务中的敏感信息起到保护作用。That is to say, in this embodiment, before the distribution and reception of perception tasks, the task issuing end uses the spectral clustering method to divide the security level of the task receiving end, and then combines it with the smart contract technology in the blockchain server, It can effectively limit the receiving authority of the task receiving end to different levels of sensing tasks, significantly improve system performance and protect sensitive information in sensing tasks.

请参照图1至图3,本发明的实施例二为:Please refer to Fig. 1 to Fig. 3, embodiment two of the present invention is:

在上述实施例一的基础上,本实施例的一种基于移动群智感知技术的隐私保护方法中,谱聚类算法基于四个指标:节点度中心性、节点中介中心性、节点局部聚类系数和节点基于度的图熵。On the basis of the first embodiment above, in a privacy protection method based on mobile crowd sensing technology in this embodiment, the spectral clustering algorithm is based on four indicators: node degree centrality, node betweenness centrality, and node local clustering Degree-based graph entropy for coefficients and nodes.

其中,为了构造相似图,在上述实施例一的步骤S1中的先在感知层中对任务接收端使用谱聚类算法进行分类具体包括以下步骤:Wherein, in order to construct the similarity graph, in step S1 of the above-mentioned embodiment 1, in the perception layer, the spectral clustering algorithm is used to classify the task receiving end, which specifically includes the following steps:

S10、将任务接收端组成社交网络中的节点,基于四个指标作为节点相似度的计算参照,构造相似图。S10. Form the task receiving end into nodes in the social network, and construct a similarity graph based on the four indicators as references for calculating node similarity.

S11、根据公式(1)得出社交网络中每个节点的向量表示:S11. Obtain the vector representation of each node in the social network according to formula (1):

xi=<D(vi),BC(vi),LC(vi),If(G(vi))> (1);x i =<D(v i ),BC(v i ),LC(v i ),I f (G(v i ))>(1);

其中,D(vi)为节点度中心性,BC(vi)为节点中介中心性,LC(vi)为节点局部聚类系数,If(G(vi))为节点基于度的图熵。Among them, D(v i ) is node degree centrality, BC(v i ) is node betweenness centrality, LC(v i ) is node local clustering coefficient, If (G(v i )) is node degree-based Graph entropy.

在本实施例中,节点中介中心性的计算如下:In this embodiment, the calculation of node betweenness centrality is as follows:

节点局部聚类系数的计算如下:The calculation of node local clustering coefficient is as follows:

其中,μG(vi)和ωG(vi)分别表示的是G(vi)中三角形以及三边形的数量。Among them, μG(v i ) and ωG(v i ) respectively represent the number of triangles and triangles in G(v i ).

节点基于度的图熵计算如下:The degree-based graph entropy of a node is calculated as follows:

设α=1,则有:If α=1, then:

其中,n为图中节点的个数,m为图中边的条数。Among them, n is the number of nodes in the graph, and m is the number of edges in the graph.

S12、得到每个节点的向量表示之后,根据公式(2)计算出两个节点vi及vj之间的相似度:S12. After obtaining the vector representation of each node, calculate the similarity between the two nodes vi and vj according to formula (2):

选择与vi最相似的前K个节点作为vi的邻居节点,并加上相应的连边,从而形成相似图GsSelect the top K nodes most similar to v i as neighbor nodes of v i , and add corresponding edges to form similarity graph G s .

S13、根据公式(3)计算拉普拉斯矩阵:S13, calculate the Laplacian matrix according to formula (3):

L=D-W (3);L=D-W (3);

其中,D为度矩阵,W为邻接矩阵;Among them, D is the degree matrix, W is the adjacency matrix;

在邻接矩阵中,每两个节点间的权值计算如下:In the adjacency matrix, the weight between every two nodes is calculated as follows:

ωij=fsim(vi,vj)(4)。ω ij =f sim (v i ,v j ) (4).

S14、根据公式(5)使用比率切割法使各子集中节点数平衡:S14. According to the formula (5), use the ratio cutting method to balance the number of nodes in each subset:

S15、根据拉普拉斯矩阵中的T个特征向量组成特征矩阵Y。S15. Form a feature matrix Y according to the T feature vectors in the Laplacian matrix.

S16、将特征矩阵Y输入k-均值算法进行聚类,聚类结果为各个用户子群CiS16. Input the feature matrix Y into the k-means algorithm for clustering, and the clustering result is each user subgroup C i .

S17、根据公式(6)得出每个用户子群的影响力大小:S17. According to the formula (6), the influence of each user subgroup is obtained:

其中,为Ci中节点度中心性的平均值、/>为Ci中节点中介中心性的平均值、/>为Ci中节点局部聚类系数的平均值、/>为Ci中节点基于度的图熵的平均值。in, is the average of degree centrality of nodes in C i , /> is the average betweenness centrality of nodes in C i , /> is the average value of the local clustering coefficient of nodes in C i , /> is the average degree-based graph entropy of nodes in C i .

即在本实施例中,在由任务接收端组成的社交网络中按照四个节点指标通过谱聚类方法对任务接收端完成安全等级划分,有效降低了共谋攻击的风险。That is to say, in this embodiment, in the social network composed of task receivers, the task receivers are divided into security levels by spectrum clustering method according to four node indicators, which effectively reduces the risk of collusion attacks.

其中,在本实施例中,步骤S2中还包括:Wherein, in this embodiment, step S2 also includes:

任务发布端将待分配的感知任务分割为不同的多个子任务。The task issuer divides the perception task to be assigned into multiple subtasks.

即在本实施例中,将感知任务分割为不同的子任务,可以限制任务接收端窃取完整的感知任务的敏感信息,从而防止感知任务中的隐私泄露。That is, in this embodiment, dividing the sensing task into different sub-tasks can restrict the task receiving end from stealing the sensitive information of the complete sensing task, thereby preventing privacy leakage in the sensing task.

则上述实施例一的步骤S2中任务发布端将待分配的感知任务按敏感度进行排序,并按顺序为感知任务划分相应的安全等级具体为:Then in step S2 of the first embodiment above, the task issuer sorts the sensing tasks to be assigned according to the sensitivity, and divides the corresponding security levels for the sensing tasks in order, specifically as follows:

任务发布端将多个子任务按子任务中敏感信息的敏感度程度从大到小进行排序,并按照预设的等级个数顺次将子任务划分到不同的安全级别中。The task issuer sorts the multiple subtasks according to the degree of sensitivity of the sensitive information in the subtasks from large to small, and sequentially divides the subtasks into different security levels according to the preset number of levels.

即在本实施例中,对感知任务的子任务都进行安全等级划分之后,结合也进行了安全等级划分的任务接收端,可以有效避免共谋攻击。That is, in this embodiment, after all the subtasks of the perception task are divided into security levels, the collusion attack can be effectively avoided in combination with the task receiving end that has also been divided into security levels.

其中,步骤S3中还包括:Wherein, step S3 also includes:

智能合约为超级账本中的一种电子合约,电子合约的规则、监督及决策由区块链服务器预先设置。在本实施例中,通过电子合约的预设规则、监督及决策,使系统自身完成对任务接收端申请访问控制感知任务过程中的一些规则、监督及决策,可以有效防止任务接收端掌握整个感知任务中的敏感信息以及防止隐私遭到共谋攻击。A smart contract is an electronic contract in the hyperledger. The rules, supervision and decision-making of the electronic contract are preset by the blockchain server. In this embodiment, through the preset rules, supervision and decision-making of the electronic contract, the system itself completes some rules, supervision and decision-making in the process of applying for access control perception tasks to the task receiver, which can effectively prevent the task receiver from mastering the entire perception process. Sensitive information in missions and protecting privacy from collusive attacks.

则上述实施例一的步骤S3具体为:Then the step S3 of the above-mentioned embodiment 1 is specifically:

任务接收端在请求访问区块链服务器中的感知任务时,电子合约检测任务接收端的安全等级与所选择的感知任务的安全等级是否相同,若相同则任务接收端可以接收所选择的感知任务,否则,任务接收端不可以接收所选择的感知任务。When the task receiving end requests to access the sensing task in the blockchain server, the electronic contract checks whether the security level of the task receiving end is the same as the security level of the selected sensing task. If they are the same, the task receiving end can receive the selected sensing task. Otherwise, the task receiver cannot receive the selected sensing task.

即在本实施例中,通过智能合约完成对任务接收端的访问控制,可以有效保护感知任务中的敏感信息以防被恶意任务接收端窃取。That is, in this embodiment, the access control to the task receiving end is completed through the smart contract, which can effectively protect the sensitive information in the sensing task from being stolen by the malicious task receiving end.

综上所述,本发明提供的一种基于移动群智感知技术的隐私保护方法,具有以下有益效果:In summary, a privacy protection method based on mobile crowd sensing technology provided by the present invention has the following beneficial effects:

(1)从隐私保护度分析:本发明应用于医疗物联网背景下的移动群智感知领域,在医疗感知任务上传与接收的过程中,可能会有感知任务中所包含的敏感信息被恶意泄露的风险,因此,本发明中使用谱聚类方法对任务接收端进行分类,同时将感知任务分割为不同的子任务,并对子任务按其敏感程度也划分成相应的安全等级,按照区块链服务器中的智能合约的规定,任务接收端只能接收与自己安全等级相同的子任务,可以防止某个恶意任务接收端完整掌握某个感知任务的敏感信息,以便有效保护任务发布端所发布的医疗感知任务的隐私;(1) Analysis from the degree of privacy protection: the present invention is applied to the field of mobile crowd sensing under the background of the medical Internet of Things. During the process of uploading and receiving medical sensing tasks, sensitive information contained in the sensing tasks may be maliciously leaked Therefore, in the present invention, the spectral clustering method is used to classify the task receiving end, and at the same time, the perception task is divided into different sub-tasks, and the sub-tasks are also divided into corresponding security levels according to their sensitivity. According to the smart contract in the chain server, the task receiving end can only receive subtasks with the same security level as itself, which can prevent a malicious task receiving end from fully grasping the sensitive information of a sensing task, so as to effectively protect the tasks issued by the task issuing end. privacy of medical perception tasks;

(2)从系统性能分析:本发明中所使用的系统,即使在任务接收端以及感知任务被分级的情况下,仍可具有高吞吐量以及低延迟,可保持一个较好的系统性能。(2) Analysis of system performance: the system used in the present invention can still have high throughput and low delay even when the task receiving end and perception tasks are classified, and can maintain a better system performance.

以上所述仅为本发明的实施例,并非因此限制本发明的专利范围,凡是利用本发明说明书及附图内容所作的等同变换,或直接或间接运用在相关的技术领域,均同理包括在本发明的专利保护范围内。The above description is only an embodiment of the present invention, and does not limit the patent scope of the present invention. All equivalent transformations made by using the description of the present invention and the contents of the accompanying drawings, or directly or indirectly used in related technical fields, are all included in the same principle. Within the scope of patent protection of the present invention.

Claims (4)

1.一种基于移动群智感知技术的隐私保护方法,其特征在于,包括步骤:1. A privacy protection method based on mobile crowd sensing technology, characterized in that, comprising steps: S1、任务发布端在分配感知任务之前,先在感知层中对任务接收端使用谱聚类算法进行分类,并按照分类后的影响力大小排序对每个分类簇划分相应的安全等级;S1. Before assigning sensing tasks, the task issuing end first uses the spectral clustering algorithm to classify the task receiving end in the sensing layer, and divides each classification cluster into a corresponding security level according to the degree of influence after classification; 所述谱聚类算法基于四个指标:节点度中心性、节点中介中心性、节点局部聚类系数和节点基于度的图熵;The spectral clustering algorithm is based on four indicators: node degree centrality, node betweenness centrality, node local clustering coefficient and node degree-based graph entropy; 所述步骤S1中的先在感知层中对任务接收端使用谱聚类算法进行分类具体包括以下步骤:In the step S1, the classification of the task receiving end using the spectral clustering algorithm in the perception layer specifically includes the following steps: S10、将所述任务接收端组成社交网络中的节点,基于所述四个指标作为节点相似度的计算参照,构造相似图;S10. Composing the task receiving end into a node in a social network, and constructing a similarity graph based on the four indicators as a reference for calculating node similarity; S11、根据公式(1)得出所述社交网络中每个节点的向量表示:S11. Obtain the vector representation of each node in the social network according to formula (1): xi=<D(vi),BC(vi),LC(vi),If(G(vi))> (1);x i =<D(v i ),BC(v i ),LC(v i ),I f (G(v i ))>(1); 其中,D(vi)为所述节点度中心性,BC(vi)为所述节点中介中心性,LC(vi)为所述节点局部聚类系数,If(G(vi))为所述节点基于度的图熵;Among them, D(v i ) is the degree centrality of the node, BC(v i ) is the betweenness centrality of the node, LC(v i ) is the local clustering coefficient of the node, If (G(v i ) ) is the degree-based graph entropy of the node; S12、得到每个节点的向量表示之后,根据公式(2)计算出两个节点vi及vj之间的相似度:S12, after obtaining the vector representation of each node, calculate the similarity between two nodes v i and v j according to formula (2): 选择与vi最相似的前K个节点作为vi的邻居节点,并加上相应的连边,从而形成相似图GsSelect the top K nodes most similar to v i as the neighbor nodes of v i , and add corresponding edges to form a similarity graph G s ; S13、根据公式(3)计算拉普拉斯矩阵:S13, calculate the Laplacian matrix according to formula (3): L=D-W (3);L=D-W (3); 其中,D为度矩阵,W为邻接矩阵;Among them, D is the degree matrix, W is the adjacency matrix; 在所述邻接矩阵中,每两个节点间的权值计算如下:In the adjacency matrix, the weight between every two nodes is calculated as follows: ωij=fsim(vi,vj) (4);ω ij =f sim (v i ,v j ) (4); S14、根据公式(5)使用比率切割法使各子集中节点数平衡:S14. According to the formula (5), use the ratio cutting method to balance the number of nodes in each subset: S15、根据拉普拉斯矩阵中的T个特征向量组成特征矩阵Y;S15, forming a feature matrix Y according to the T feature vectors in the Laplacian matrix; S16、将所述特征矩阵Y输入k-均值算法进行聚类,聚类结果为各个用户子群CiS16. Input the feature matrix Y into the k-means algorithm for clustering, and the clustering result is each user subgroup C i ; S17、根据公式(6)得出每个所述用户子群的影响力大小:S17. Obtain the influence of each of the user subgroups according to formula (6): 其中,为Ci中所述节点度中心性的平均值、/>为Ci中所述节点中介中心性的平均值、/>为Ci中所述节点局部聚类系数的平均值、/>为Ci中所述节点基于度的图熵的平均值;in, is the average of the degree centrality of the nodes mentioned in C i , /> is the average betweenness centrality of nodes mentioned in C i , /> is the average value of the local clustering coefficient of the node in C i , /> is the average value of degree-based graph entropy of nodes described in C i ; S2、所述任务发布端将待分配的所述感知任务按敏感度进行排序,并按顺序为所述感知任务划分相应的安全等级,然后将所述感知任务通过网络层传输到应用层的区块链服务器中;S2. The task issuing end sorts the sensing tasks to be assigned according to sensitivity, and divides the corresponding security levels for the sensing tasks in order, and then transmits the sensing tasks to the area of the application layer through the network layer In the block chain server; 所述步骤S2中还包括:Said step S2 also includes: 所述任务发布端将待分配的所述感知任务分割为不同的多个子任务;The task issuing end divides the perception task to be assigned into a plurality of different subtasks; 所述步骤S2中所述任务发布端将待分配的所述感知任务按敏感度进行排序,并按顺序为所述感知任务划分相应的安全等级具体为:In the step S2, the task issuing end sorts the sensing tasks to be assigned according to sensitivity, and divides the corresponding security levels for the sensing tasks in order, specifically: 所述任务发布端将多个所述子任务按所述子任务中敏感信息的敏感度程度从大到小进行排序,并按照预设的等级个数顺次将所述子任务划分到不同的安全级别中;The task issuing end sorts the multiple subtasks according to the degree of sensitivity of the sensitive information in the subtasks from large to small, and sequentially divides the subtasks into different subtasks according to the number of preset levels. in the security level; S3、所述区块链服务器采用智能合约技术限制所述任务接收端对所述感知任务的选择;S3. The blockchain server uses smart contract technology to limit the selection of the sensing task by the task receiving end; 所述步骤S3中还包括:Said step S3 also includes: 所述智能合约为超级账本中的一种电子合约,所述电子合约的规则、监督及决策由所述区块链服务器预先设置;The smart contract is an electronic contract in the super ledger, and the rules, supervision and decision-making of the electronic contract are preset by the blockchain server; 所述步骤S3具体为:The step S3 is specifically: 所述任务接收端在请求访问所述区块链服务器中的所述感知任务时,所述电子合约检测所述任务接收端的安全等级与所选择的所述感知任务的安全等级是否相同,若相同则所述任务接收端可以接收所选择的所述感知任务,否则,所述任务接收端不可以接收所选择的所述感知任务。When the task receiver requests access to the perception task in the blockchain server, the electronic contract detects whether the security level of the task receiver is the same as the selected security level of the perception task, and if they are the same Then the task receiving end can receive the selected sensing task, otherwise, the task receiving end cannot receive the selected sensing task. 2.根据权利要求1所述的一种基于移动群智感知技术的隐私保护方法,其特征在于,所述步骤S11还包括:2. a kind of privacy protection method based on mobile crowd sensing technology according to claim 1, is characterized in that, described step S11 also comprises: 所述节点中介中心性的计算如下:The calculation of the betweenness centrality of the nodes is as follows: 3.根据权利要求1所述的一种基于移动群智感知技术的隐私保护方法,其特征在于,所述步骤S11还包括:3. a kind of privacy protection method based on mobile crowd sensing technology according to claim 1, is characterized in that, described step S11 also comprises: 所述节点局部聚类系数的计算如下:The calculation of the node local clustering coefficient is as follows: 其中,μG(vi)和ωG(vi)分别表示的是G(vi)中三角形以及三边形的数量。Among them, μG(v i ) and ωG(v i ) respectively represent the number of triangles and triangles in G(v i ). 4.根据权利要求3所述的一种基于移动群智感知技术的隐私保护方法,其特征在于,所述步骤S11还包括:4. A kind of privacy protection method based on mobile crowd sensing technology according to claim 3, is characterized in that, described step S11 also comprises: 所述节点基于度的图熵计算如下:The degree-based graph entropy of the nodes is calculated as follows: 设α=1,则有:If α=1, then: 其中,n为图中节点的个数,m为图中边的条数。Among them, n is the number of nodes in the graph, and m is the number of edges in the graph.
CN202110723883.9A 2021-06-29 2021-06-29 Privacy protection method based on mobile crowd sensing technology Active CN113553612B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110723883.9A CN113553612B (en) 2021-06-29 2021-06-29 Privacy protection method based on mobile crowd sensing technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110723883.9A CN113553612B (en) 2021-06-29 2021-06-29 Privacy protection method based on mobile crowd sensing technology

Publications (2)

Publication Number Publication Date
CN113553612A CN113553612A (en) 2021-10-26
CN113553612B true CN113553612B (en) 2023-08-11

Family

ID=78102457

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110723883.9A Active CN113553612B (en) 2021-06-29 2021-06-29 Privacy protection method based on mobile crowd sensing technology

Country Status (1)

Country Link
CN (1) CN113553612B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114329526B (en) * 2021-12-17 2024-03-26 重庆邮电大学 Data sharing access control method based on blockchain and user credibility

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA3057385A1 (en) * 2019-03-01 2019-05-31 Alibaba Group Holding Limited Methods and devices for protecting sensitive data of transaction activity based on smart contract in blockchain
CN111988131A (en) * 2020-08-31 2020-11-24 广东技术师范大学 Block chain construction method facing mobile crowd sensing
CN112053043A (en) * 2020-08-21 2020-12-08 北京邮电大学 A method and system for crowdsensing based on blockchain
CN112187712A (en) * 2020-08-18 2021-01-05 西安电子科技大学 Anonymous authentication method and system for trust in de-center mobile crowdsourcing

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA3057385A1 (en) * 2019-03-01 2019-05-31 Alibaba Group Holding Limited Methods and devices for protecting sensitive data of transaction activity based on smart contract in blockchain
CN112187712A (en) * 2020-08-18 2021-01-05 西安电子科技大学 Anonymous authentication method and system for trust in de-center mobile crowdsourcing
CN112053043A (en) * 2020-08-21 2020-12-08 北京邮电大学 A method and system for crowdsensing based on blockchain
CN111988131A (en) * 2020-08-31 2020-11-24 广东技术师范大学 Block chain construction method facing mobile crowd sensing

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
移动群智感知中基于用户联盟匹配的隐私保护激励机制;熊金波;马蓉;牛郭云川;林立;;计算机研究与发展(07);全文 *

Also Published As

Publication number Publication date
CN113553612A (en) 2021-10-26

Similar Documents

Publication Publication Date Title
Kumar et al. UIDS: a unified intrusion detection system for IoT environment
Li et al. Blockchain for federated learning toward secure distributed machine learning systems: a systemic survey
Liu et al. Recent advances on federated learning: A systematic survey
Wang et al. A triple real-time trajectory privacy protection mechanism based on edge computing and blockchain in mobile crowdsourcing
US20130198188A1 (en) Apparatus and Methods For Anonymizing a Data Set
CN103049704B (en) Mobile terminal self-adaptation method for secret protection and device
Abbasi et al. A clustering‐based anonymization approach for privacy‐preserving in the healthcare cloud
Velliangiri et al. Hybrid optimization scheme for intrusion detection using considerable feature selection
Zhan et al. Identification of top-k influential communities in big networks
Tai et al. Structural diversity for resisting community identification in published social networks
Geetha et al. Design of big data privacy framework—a balancing act
CN113553612B (en) Privacy protection method based on mobile crowd sensing technology
Anand et al. Privacy preserving framework using Gaussian mutation based firebug optimization in cloud computing
Wang et al. An accuracy-enhanced group recommendation approach based on DEMATEL
Tian et al. Privacy-preserving cross-domain recommendation with federated graph learning
Tian et al. Bi-tier differential privacy for precise auction-based people-centric IoT service
CN106156317B (en) A data security storage method based on attribute division
Prasanthi et al. A comprehensive assessment of privacy preserving data mining techniques
Qin et al. Adaptive In‐Network Collaborative Caching for Enhanced Ensemble Deep Learning at Edge
Peethambaran et al. An ensemble learning approach for privacy–quality–efficiency trade-off in data analytics
Peng et al. A privacy-enhanced mobile crowdsensing strategy for blockchain empowered internet of medical things
Trujillo et al. A traffic analysis attack to compute social network measures
Sakthivel et al. An intellectual optimization of k-anonymity model for efficient privacy preservation in cloud platform
Li et al. Protecting private geosocial networks against practical hybrid attacks with heterogeneous information
Narule et al. Privacy preservation using optimized Federated Learning: A critical survey

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant