CN111246468B - Data quality perception incentive method aiming at privacy protection in group perception - Google Patents
Data quality perception incentive method aiming at privacy protection in group perception Download PDFInfo
- Publication number
- CN111246468B CN111246468B CN202010035651.XA CN202010035651A CN111246468B CN 111246468 B CN111246468 B CN 111246468B CN 202010035651 A CN202010035651 A CN 202010035651A CN 111246468 B CN111246468 B CN 111246468B
- Authority
- CN
- China
- Prior art keywords
- data
- participant
- perception
- task
- service provider
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3218—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using proof of knowledge, e.g. Fiat-Shamir, GQ, Schnorr, ornon-interactive zero-knowledge proofs
- H04L9/3221—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using proof of knowledge, e.g. Fiat-Shamir, GQ, Schnorr, ornon-interactive zero-knowledge proofs interactive zero-knowledge proofs
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
- H04W12/033—Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
Abstract
The invention discloses a data quality perception incentive method aiming at privacy protection in group perception. The task publisher publishes a collection numerical range, the task participants are recruited by the perception service provider, the participants hide data in the constructed commitment to participate in the evaluation of the perception service provider, meanwhile, the reliability of the data submitted by the task participants is verified by the task publisher, the perception service provider provides anonymous technology for the participants to protect the identity privacy of the participants, and the incentive of data quality under the privacy protection is realized under the constraint of the task budget through the two-stage data quality measurement and the incentive mechanism based on the data quality. The method protects the identity privacy of the user and evaluates the reliability of the data of the participants in a privacy protection manner.
Description
Technical Field
The invention relates to the technical field of information security, in particular to a data quality perception incentive method aiming at privacy protection in group perception.
Background
In recent years, with the popularization of mobile sensor devices and the development of mobile device communication technologies, mobile group awareness is becoming a new data collection paradigm. The population aware application includes three main entities: a task requester, a perceptual service provider, and a group of participants. The task requester outsources the perception task to a perception service provider, and the perception service provider recruits a group of qualified participants to execute the task for the perception task. The group sensing application has the characteristics of easiness in deployment, wide coverage range and low maintenance cost, and brings great convenience for large-scale data collection, but the quality of the collected data is greatly different due to the irregular participation of sensing equipment and the uncontrollable behavior of participants; furthermore, while the perceptual service provider provides convenience for the task to process the collected data, it also faces privacy issues that reveal user data. If the group perception application does not have any privacy protection measures, the willingness of the participants to execute the perception tasks is reduced, and the popularization of the group perception application is influenced.
The reliability of a community-aware application depends not only on the large amount of sensory data collected, but also requires the support of a single high quality data. Existing methods for evaluating perceptual data quality fall into three categories: and (3) a participant reputation score, the context of perception data and a truth value discovery iterative algorithm. Evaluating data quality according to participant reputation scores tends to ignore user data privacy; data quality assessment algorithms such as perceptual data context and truth discovery are vulnerable to malicious data attacks. Therefore, in order to improve the willingness of the participants to execute tasks, reasonably evaluate the quality of the perception data and protect the privacy of the perception data, the incentive method for evaluating the quality of the perception data with privacy protection is realized on the basis of the zero-knowledge proof theory, and meanwhile, anonymous identity information is provided for the participants to protect the identity information of the users.
Disclosure of Invention
The invention aims to overcome the defects and shortcomings of the prior art, and provides a data quality perception excitation method aiming at privacy protection in group perception, which aims at solving the problems of data quality evaluation and data privacy in group perception excitation, proving whether perception data provided by participants are in a reasonable interval range of an evaluation standard, so as to realize the evaluation of data quality, and simultaneously realizing the identity privacy of users through an anonymity technology.
In order to achieve the purpose, the technical scheme provided by the invention is as follows: a data quality perception incentive method aiming at privacy protection in group perception comprises the following steps:
s1, the task publisher initializes the public and private key pair (pk)d,skd) Sending { T, pkdPi, n, B, R are respectively task content T and public key pkdThe incentive reward control parameter pi, the recruiter number n, the budget B and the quality evaluation standard interval R to a perception service provider, and the perception service provider generates a parameter pk of zero knowledge proof for the task Tz(p, G, h) where p is a large prime number, generating a cyclic group G at the base of p, G and h being generator elements of the cyclic group GPerception service provider broadcast task information { T, pkd,pkzN, B recruiting participants wiI is more than or equal to 1 and less than or equal to n, participant wiAccording to cost c of collecting perception dataiAnd minimum reward for the taskDetermines whether to participate in the task and collects perception data, the perception service provider collecting perception data for each participant wiProviding a token for submitting datamod p, whereinxiIs to perceive the service provider as a participant wiThe random value is selected to be a value,represents a set of positive integers in cyclic group G;
s2, participant wiCalculating an anonymous identitymod p,Sending privacy-preserving perceptual data quality assessment requestsWherein y isiIs participant wiSelf-selected random value, zero-knowledge proof of challenge-response protocol iZKM (D) by perceptual service providers with privacy preserving data quality assessmenti,pkzR) determining perception data DiWhether the task is within a reasonable range of the task requirement, namely within a quality evaluation standard interval R;
s3, the perception service provider evaluates the participation data to obtain qualified participant informationIs sent to the task publisher, and the task publisher,mod p is participant wiIdentity information of S0,iIs participant wiFor perception data DiStructural commitment, perception of service provider in receiving task publisher's prepaid remunerationImmediately thereafter, the participant is informed to submit the encrypted perception data Enc (D)i,pkd) And a random number Enc (r)i,pkd) To the task publisher, riIs participant wiA random value of choice;
s4, the task publisher encrypts the received encrypted perception data Enc (D)i,pkd) Decrypting and verifying to confirm the perception data DiAfter passing the verification, informing the perception service provider according toDistributing rewards to participantsRepresenting payment confirmation parameters,. pi.is an incentive reward control parameter,. qiIs to the perception data DiBy Euclidean distance functionThe value of the metric being evaluated is,is the average of the sum of all the perceptual data,is the average value of the summation calculation of all the measurement values, otherwise, the perception service provider is informed not to send the task reportRemuneration to participant wi。
The step S1 includes the steps of:
s11, the task publisher initializes the public and private key pair (pk) of the parameter for the task content Td,skd) WhereinAndcontrol incentive reward control parameter pi, number of persons recruiting participants n and budget B, and quality assessment criteria interval R of collected data [ a, B ═]The task publisher sends a task request { T, pkdPi, n, B, R } to a perceptual service provider;
s12, sensing parameters T, pk in service provider broadcast task requestdN, B } and recruiting n participants;
s13 participant w with intention to participateiWhen a request is made to a aware service provider to participate in a task, then the aware service provider computesmod p as a data submission token to participant wi,
S14, participant wiFirst, the cost of executing the task is judgedWhether or not this is true becauseIs the minimum reward for performing the task, thereby ensuring the benefit of the participant ifIf true, then participant wiFor perceiving tasksCollecting data Di。
Step S2 includes the following steps:
s21, participant generates anonymous identityZero-knowledge proof challenge-response protocol iZKM (D) for privacy preserving data quality assessment with mod p participating in zero-knowledge proof constructioni,pkzR), detailed procedures including construction commitments, challenge-response and verification evaluation;
s22, iZKM construction commitment: participant wiSelecting a random value ri,Construct a commitmentIs sent to the provider of the awareness service,is thatIs determined by the fact that the factors of confusion,is to the perception data DiP, G and h are public parameters, p is a large prime number, G is a cyclic group of p prime orders, and G and h are generating elements of the cyclic group G; the reasonable interval is expressed as [ a, b],If the perception data uploaded by the participantsThe participator and the perception service provider prove that the uploaded perception data are in a reasonable interval through interaction [ a, b ]]Within the range;
s23, iZKM challenge: whenever a aware service provider receives participant wiSent commitment S0,iThe perceptual service provider then returns the value of the lower bound a and the value of the upper bound b of the evaluation range as a challenge to the participant;
s24, iZKM response: after the participants receive the challenge containing the values a and b sent by the perception service provider, the participants judge the perception data D of the participantsiWhether or not in [ a, b ]]Interval, if the perception data D of the participantiIn [ a, b ]]If the interval is not within the interval, the participant exits the task and returns to the perception service provider, the data quality evaluation of the participant is terminated, and if the perception data D of the participanti∈[a,b]Then the participant calculatesAndas a response to the challenge, whereinAndare respectivelyAndin the context of the confusion that is,andis to DiA and | b-DiHiding of |, S1,iAnd S2,iResponses to the challenge lower limit a and upper limit b, respectively, and then transmitted (S)1,i,S2,i) To the aware service provider;
s25, iZKM validation evaluation: sensing the response returned by the service provider to the challenge based on the participant (S)1,i,S2,i) Verifying commitments submitted by participants S0,iBy calculating S1,i=S0,i·(ga)-1mod p and S2,i=gb·(S0,i)-1mod p,S0,i、S1,iAnd S2,iAre respectively the participant wiCommitment of constructs and response to challenges, (g)a)-1And gbIs a structural factor, (S)0,i)-1Is S0,iIn the reverse of the loop group G, a computational validation that is true indicates that the participant uses the same perceptual data values in constructing commitments and response challenges, that the perceptual service provider is not spoofed, and that the perceptual service provider trusts the perceptual data D uploaded by the participanti∈[a,b]The perception data uploaded by the participant proves the challenge-response protocol iZKM through zero knowledge of privacy protection data quality evaluation, otherwise the data quality evaluation of the participant is failed.
Step S3 includes the following steps:
s31, participant wiData D ofiThe data quality assessment by the perceptual service provider satisfies the scope of requirements R of the task, and subsequently the perceptual service provider will satisfy the participants w of the data quality assessmentiInformation ofIs sent to the task publisher, whereinThe representation of an anonymous identity is represented,represents the commitment of the construct while informing the participant wiData D ofiSatisfy reliability assessment of data quality, otherwise notify participant wiThe data evaluation fails, and the task is ended;
s32, task publisherReceiving participant w satisfying the data quality assessmentiAfter the information, a prepayment request is sentTo a perceptual service provider, whereinIs a prepayment to the participant;
s33, perception service provider receives and provides to participant wiImmediately after the prepayment, the participant w is notifiediSubmitting the perception data to a task publisher;
s34, participant wiEncrypted perception data Enc (D) after receipt of a prepayment noticei,pkd) And a random number Enc (r)i,pkd) And sending the task to the task publisher.
Step S4 includes the following steps:
s41, the task publisher uses the private key skdDecrypting participant submitted data D'i=Dec(Enc(Di,pkd),skd) And ri'=Dec(Enc(ri,pkd),skd);
S42, calculating by task publisherValidating participant wiThe reliability of the submitted data is such that,is thatIn the context of the confusion that is,is to D 'obtained after decryption'iIs hidden, D'iAnd ri'is decrypted D'i=Dec(Enc(Di,pkd),skd) And Dec (Enc (r)i,pkd),skd) Result of the acquisition, S0,iIs a commitment made by the participant to perform a privacy data quality assessment,is that the task publisher bases on the participant wiSubmitted data D'i=Dec(Enc(Di,pkd),skd) And ri'=Dec(Enc(ri,pkd),skd) Fabricated commitment as long as task publisher decrypts resulting data D'iAnd ri' satisfyThe submitted data meets the reliability, the surplus reward of the participants is paid, and the reward is refused to be paid if the verification is not passed;
s43, sending by the task publisher as long as the data passes the verificationTo a perception service provider, whereinRepresenting payment confirmation parameters,. pi.is an incentive reward control parameter,. qiIs to the perception data DiOf the Euclidean distance functionThe quality of the measurement of (a) is evaluated,is the average of the sum of all the perceptual data,is the average of the sum of all the metrics, and uses this parameter to inform the sensing service provider whether it is an anonymous usermod p payments;
s44 perception service provider as participant wiIssuing a true monetary amountm is less than or equal to n, i is less than or equal to 1 and less than or equal to m, m represents the number of users passing the verification of the task publisher, and B is the task budget.
Compared with the prior art, the invention has the following advantages and beneficial effects:
1. the method can effectively balance the reliability evaluation and privacy protection of the data, and the zero-knowledge proof challenge-response protocol iZKM for evaluating the privacy protection data quality can effectively determine whether the data meets the range constraint of a task requester on the data and does not leak the data content.
2. The invention coordinates the relationship between the reward and the data quality, realizes a reward distribution mechanism integrating data quality evaluation and data quality metric evaluation, and realizes reward distribution with data quality consciousness under the constraint of task budget.
3. The invention can effectively prevent some malicious behaviors of participants and task requesters. And the task publisher is prevented from uploading forged data to deceive the task publisher after the task publisher passes data evaluation. Meanwhile, the benefit of the participants is guaranteed through a mechanism of prepaying, and the malicious repudiation behavior of the task publisher is prevented.
Drawings
FIG. 1 is a flow chart of the method of the present invention.
Fig. 2 is a diagram of the architecture of the application of the method of the present invention.
Detailed Description
The present invention will be further described with reference to the following specific examples.
The data quality perception incentive method for privacy protection in group perception provided by the embodiment completes evaluation and incentive of privacy data quality in a semi-trusted perception service provider based on a zero-knowledge proof principle and identity anonymity. In the non-secure channel, submitted data is encrypted through a public key cryptographic algorithm, and the confidentiality of the data is protected. Under the budget constraint, the relation between the data quality and the incentive is effectively coordinated. Malicious behavior of the task publisher and the participant can be effectively prevented by two-level data quantity measurement and reward part incentive.
Firstly, a task publisher initializes a private-public key pair of the task publisher, publishes the content, the public key and the parameters of the task to a service provider, and recruits participants by broadcasting the content of a task request. And the interaction between the perception service provider and the participants is judged through the zero-knowledge proof challenge-response protocol iZKM interaction of privacy protection data quality evaluation, and whether the data participating in evaluation is in a task requirement range is judged.
And secondly, a data submitting part after the data quality evaluation is passed, wherein the perception service provider informs the task publisher of the participant passing the data quality evaluation, and simultaneously constructs an anonymous identity for the participant, the anonymous identity is used for committing the data participating in the evaluation to be sent to the task publisher, the task publisher prepaying part stimulates the reward to the perception service provider, the perception service provider informs the participant to send the encrypted data to the task publisher, and the task publisher decrypts the data and verifies the rationality of the decrypted data through the constructed commitment submitted by the participant.
Finally, the task publisher notifies the aware service provider of the list of participants who pass the data validation, while issuing the remaining portion of incentive rewards through the service provider.
As shown in fig. 1 and fig. 2, the data quality perception incentive method for privacy protection in group perception includes the following steps:
s1, the task publisher initializes the public and private key pair (pk)d,skd) Sending { T, pkdPi, n, B, R are respectively task content T and public key pkdThe incentive reward control parameter pi, the recruiter number n, the budget B and the quality evaluation standard interval R to a perception service provider, and the perception service provider generates a parameter pk of zero knowledge proof for the task Tz(p, G, h) where p is a large prime number, generating a cyclic group G at the base of p, G and h being generators of the cyclic group G, sensory apparelService provider broadcasts task information { T, pkd,pkzN, B recruiting participants wiI is more than or equal to 1 and less than or equal to n, participant wiAccording to cost c of collecting perception dataiAnd minimum reward for the taskDetermines whether to participate in the task and collects perception data, the perception service provider collecting perception data for each participant wiProviding a token for submitting datamod p, whereinxiIs to perceive the service provider as a participant wiThe random value is selected to be a value,represents a set of positive integers in cyclic group G; the specific process is as follows:
s11, the task publisher initializes the public and private key pair (pk) of the parameter for the task content Td,skd) WhereinAndcontrol incentive reward control parameter pi, number of persons recruiting participants n and budget B, and quality assessment criteria interval R of collected data [ a, B ═]The task publisher sends a task request { T, pkdPi, n, B, R } to a perceptual service provider;
s12, sensing parameters T, pk in service provider broadcast task requestdN, B } and recruiting n participants;
s13 participant w with intention to participateiWhen a request is made to a aware service provider to participate in a task, then the aware service provider computesmod p as a data submission token to participant wi,
S14, participant wiFirst, the cost of executing the task is judgedWhether or not this is true becauseIs the lowest reward for performing the task, thereby ensuring the benefit of the participant. If it is notIf true, then participant wiCollecting data D for perceptual tasksi。
S2, participant wiCalculating an anonymous identitymod p,Sending privacy-preserving perceptual data quality assessment requestsWherein y isiIs participant wiSelf-selected random value, zero-knowledge proof of challenge-response protocol iZKM (D) by perceptual service providers with privacy preserving data quality assessmenti,pkzR) determining perception data DiWhether the task is within a reasonable range of the task requirement, namely within a quality evaluation standard interval R; the specific process is as follows:
s21, participant generates anonymous identityZero-knowledge proof challenge-response protocol iZKM (D) for privacy preserving data quality assessment with mod p participating in zero-knowledge proof constructioni,pkzR), detailed procedures including construction commitments, challenge-response and verification evaluation;
s22, iZKM construction commitment: participant wiSelecting a random value ri,Construct a commitmentIs sent to the provider of the awareness service,is thatIs determined by the fact that the factors of confusion,is to the perception data DiP, G and h are public parameters, p is a large prime number, G is a cyclic group of p prime orders, and G and h are generating elements of the cyclic group G; assume a reasonable interval denoted as [ a, b ]],If the perception data uploaded by the participantsThe participator and the perception service provider prove that the uploaded perception data are in a reasonable interval through interaction [ a, b ]]Within the range;
s23, iZKM challenge: whenever a aware service provider receives participant wiSent commitment S0,iThe perceptual service provider then returns the value of the lower bound a and the value of the upper bound b of the evaluation range as a challenge to the participant;
s24, iZKM response: participate inAfter a participant receives a challenge containing a value and a value b sent by a perception service provider, the participant judges the perception data D of the participantiWhether or not in [ a, b ]]Interval, if the perception data D of the participantiIn [ a, b ]]If the interval is not within the interval, the participant exits the task and returns to the perception service provider, the data quality evaluation of the participant is terminated, and if the perception data D of the participanti∈[a,b]Then the participant calculatesAndas a response to the challenge, whereinAndare respectivelyAndin the context of the confusion that is,andis to DiA and | b-DiHiding of |, S1,iAnd S2,iResponses to the challenge lower limit a and upper limit b, respectively, and then transmitted (S)1,i,S2,i) To the aware service provider;
s25, iZKM validation evaluation: sensing the response returned by the service provider to the challenge based on the participant (S)1,i,S2,i) Verifying commitments submitted by participants S0,iBy calculating S1,i=S0,i·(ga)-1mod p and S2,i=gb·(S0,i)-1mod p,S0,i、S1,iAnd S2,iAre respectively the participant wiCommitment of constructs and response to challenges, (g)a)-1And gbIs a structural factor, (S)0,i)-1Is S0,iIn the reverse of the loop group G, a computational validation that is true indicates that the participant uses the same perceptual data values in constructing commitments and response challenges, that the perceptual service provider is not spoofed, and that the perceptual service provider trusts the perceptual data D uploaded by the participanti∈[a,b]The perception data uploaded by the participant proves the challenge-response protocol iZKM through zero knowledge of privacy protection data quality evaluation, otherwise the data quality evaluation of the participant is failed.
S3, the perception service provider evaluates the participation data to obtain qualified participant informationIs sent to the task publisher, and the task publisher,mod p is participant wiIdentity information of S0,iIs participant wiFor perception data DiStructural commitment, perception of service provider in receiving task publisher's prepaid remunerationImmediately thereafter, the participant is informed to submit the encrypted perception data Enc (D)i,pkd) And a random number Enc (r)i,pkd) To the task publisher, riIs participant wiA random value of choice; the specific process is as follows:
s31, participant wiData D ofiThe data quality assessment by the perceptual service provider satisfies the scope of requirements R of the task, and subsequently the perceptual service provider will satisfy the participants w of the data quality assessmentiInformation ofIs sent to the task publisher, whereinmod p represents the anonymous identity and,represents the commitment of the construct while informing the participant wiData D ofiSatisfy reliability assessment of data quality, otherwise notify participant wiThe data evaluation fails, and the task is ended;
s32, the task publisher receives the participant w meeting the data quality evaluationiAfter the information, a prepayment request is sentTo a perceptual service provider, whereinIs a prepayment to the participant;
s33, perception service provider receives and provides to participant wiImmediately after the prepayment, the participant w is notifiediSubmitting the perception data to a task publisher;
s34, participant wiEncrypted perception data Enc (D) after receipt of a prepayment noticei,pkd) And a random number Enc (r)i,pkd) And sending the task to the task publisher.
S4, the task publisher encrypts the received encrypted perception data Enc (D)i,pkd) Decrypting and verifying to confirm the perception data DiAfter passing the verification, informing the perception service provider according toDistributing rewards to participantsDenotes a payment confirmation parameter,. pi.Excitation reward control parameter, qiIs to the perception data DiBy Euclidean distance functionThe value of the metric being evaluated is,is the average of the sum of all the perceptual data,is the average of the sum of all metrics, otherwise the perception service provider is notified not to send task remuneration to participant wi(ii) a The specific process is as follows:
s41, the task publisher uses the private key skdDecrypting participant submitted data Di'=Dec(Enc(Di,pkd),skd) And ri'=Dec(Enc(ri,pkd),skd);
S42, calculating by task publisherValidating participant wiThe reliability of the submitted data is such that,is thatIn the context of the confusion that is,is to D 'obtained after decryption'iIs hidden, D'iAnd ri'is decrypted D'i=Dec(Enc(Di,pkd),skd) And Dec (Enc (r)i,pkd),skd) Result of the acquisition, S0,iIs a commitment made by the participant to perform a privacy data quality assessment,is that the task publisher bases on the participant wiSubmitted data D'i=Dec(Enc(Di,pkd),skd) And ri'=Dec(Enc(ri,pkd),skd) Fabricated commitment as long as task publisher decrypts resulting data D'iAnd ri' satisfyThe submitted data meets the reliability, the surplus reward of the participants is paid, and the reward is refused to be paid if the verification is not passed;
s43, sending by the task publisher as long as the data passes the verificationTo a perception service provider, whereinRepresenting payment confirmation parameters,. pi.is an incentive reward control parameter,. qiIs to the perception data DiOf the Euclidean distance functionThe quality of the measurement of (a) is evaluated,is the average of the sum of all the perceptual data,is the average of the sum of all the metrics, and uses this parameter to inform the sensing service provider whether it is an anonymous usermod p payments;
s44 perception service provider as participant wiIssuing a true monetary amountm is less than or equal to n, i is less than or equal to 1 and less than or equal to m, m represents the number of users passing the verification of the task publisher, and B is the task budget.
The task publisher: the system is used for initializing the public and private keys of the system, determining a reasonable interval of data, determining the number of people for recruiting participants and determining the reward for releasing tasks; issuing a prepaid fee to the participant for data quality assessment by the service provider; decrypting the encrypted data submitted by the participant and verifying the encrypted data according to a zero-knowledge proof principle; compensation is issued by the service provider to the participants who provide data that meets the task requirements.
The perception service provider: the method is used for data quality evaluation, and according to the commitment constructed by the sensing data used by the participants, the upper limit and the lower limit of a reasonable interval required by a sending task are used as a challenge to be sent to the participants; judging whether the data meets the requirements of the task or not according to the response of the participants to the challenge; the commitment and the anonymous identity of the participant passing the data quality evaluation are sent to a task publisher, and the participant is informed of passing the data quality evaluation, otherwise, the participant is informed of not passing the data quality evaluation and is ended; and after the task publisher verifies the data, issuing incentive compensation to the participants.
The participants: the system comprises a data acquisition module, a data processing module and a data processing module, wherein the data acquisition module is used for acquiring data for a perception task, constructing a commitment containing perception data according to task parameters broadcast by a service provider and submitting the commitment to the service provider for evaluation; simultaneously responding to challenges posed by the service provider with respect to the data commitments; and after the data quality evaluation is carried out, encrypting the sensing data by using the public key of the task publisher and sending the encrypted sensing data to the task publisher.
In summary, the present invention mainly includes privacy protection data quality assessment, participant identity privacy protection, two-level data quality metrics, and a data quality-based incentive function. In the initialization process, a task publisher initializes a public key and a private key, and gives a reasonable range of collected data, the number of recruited people and task incentive rewards; the service provider broadcasts task information and recruits participants, simultaneously performs quality evaluation on data of the participants, sets anonymous identities for users who pass the data quality evaluation, and forwards data commitments and the anonymous identities of the participants to a task publisher; the task publisher issues prepaid consideration to the participant who passes the data quality evaluation to the service provider, and the service provider informs the participant to submit the encrypted data to the task publisher; the task publisher decrypts the encrypted data and performs calculation verification with the data commitment of the user; the task publisher issues the remaining incentive rewards to the service provider for the verified participants; finally the service provider sends all the rewards this time to the participants.
The above embodiments are preferred embodiments of the present invention, but the present invention is not limited to the above embodiments, and any other changes, modifications, substitutions, combinations, and simplifications which do not depart from the spirit and principle of the present invention should be construed as equivalents thereof, and all such changes, modifications, substitutions, combinations, and simplifications are intended to be included in the scope of the present invention.
Claims (5)
1. A data quality perception incentive method aiming at privacy protection in group perception is characterized by comprising the following steps:
s1, the task publisher initializes the public and private key pair (pk)d,skd) Sending { T, pkdPi, n, B, R are respectively task content T and public key pkdThe incentive reward control parameter pi, the recruiter number n, the budget B and the quality evaluation standard interval R to a perception service provider, and the perception service provider generates a parameter pk of zero knowledge proof for the task Tz(p, G, h), where p is a large prime number, generating a cyclic group G at base p, G and h are generators of the cyclic group G, the perceptual service provider broadcasting task information { T, pkd,pkzN, B recruiting participants wiI is more than or equal to 1 and less than or equal to n, participant wiAccording to cost c of collecting perception dataiAnd minimum reward for the taskDetermines whether to participate in the task and collects perception data, the perception service provider collecting perception data for each participant wiProviding a token for submitting dataWhereinxiIs to perceive the service provider as a participant wiThe random value is selected to be a value,represents a set of positive integers in cyclic group G;
s2, participant wiCalculating an anonymous identitySending privacy-preserving perceptual data quality assessment requestsWherein y isiIs participant wiSelf-selected random value, zero-knowledge proof of challenge-response protocol iZKM (D) by perceptual service providers with privacy preserving data quality assessmenti,pkzR) determining perception data DiWhether the task is within a reasonable range of the task requirement, namely within a quality evaluation standard interval R;
s3, the perception service provider evaluates the participation data to obtain qualified participant informationIs sent to the task publisher, and the task publisher,is participant wiIdentity information of S0,iIs participant wiFor perception data DiStructural commitment, perception of service provider in receiving task publisher's prepaid remunerationImmediately thereafter, the participant is informed to submit the encrypted perception data Enc (D)i,pkd) And a random number Enc (r)i,pkd) To the task publisher, riIs participant wiA random value of choice;
s4, the task publisher encrypts the received encrypted perception data Enc (D)i,pkd) Decrypting and verifying to confirm the perception data DiAfter passing the verification, informing the perception service provider according toIssuing a reward to a participant wi,Representing payment confirmation parameters, qiIs to the perception data DiBy Euclidean distance functionThe value of the metric being evaluated is,is the average of the sum of all the perceptual data,is the average of the sum of all metrics, otherwise the perception service provider is notified not to send task remuneration to participant wi。
2. The data quality perception incentive method for privacy protection in community perception according to claim 1, wherein the step S1 comprises the following steps:
s11, the task publisher initializes the public and private key pair (pk) of the parameter for the task content Td,skd) WhereinAndcontrol incentive reward control parameter pi, number of persons recruiting participants n and budget B, and quality assessment criteria interval R of collected data [ a, B ═]A represents setting a lower limit of reasonable data, b represents setting an upper limit of reasonable data, and a task publisher sends a task request { T, pkdPi, n, B, R } to a perceptual service provider;
s12, sensing parameters T, pk in service provider broadcast task requestdN, B } and recruiting n participants;
s13 participant w with intention to participateiWhen a request is made to a aware service provider to participate in a task, then the aware service provider computesAs a data submission token to participant wi,
3. The data quality perception incentive method for privacy protection in community perception according to claim 1, wherein the step S2 comprises the following steps:
s21, participant generates anonymous identityZero-knowledge proof challenge-response protocol iZKM (D) for privacy preserving data quality assessment participating in zero-knowledge proof constructioni,pkzR), detailed procedures including construction commitments, challenge-response and verification evaluation;
s22, iZKM construction commitment: participant wiSelecting a random value ri,Construct a commitmentIs sent to the provider of the awareness service,is thatIs determined by the fact that the factors of confusion,is to the perception data DiP, G and h are public parameters, p is a large prime number, G is a cyclic group of p prime orders, and G and h are generating elements of the cyclic group G; the reasonable interval is expressed as [ a, b],If the perception data uploaded by the participantsThe participator and the perception service provider prove that the uploaded perception data are in a reasonable interval through interaction[a,b]Within the range;
s23, iZKM challenge: whenever a aware service provider receives participant wiSent commitment S0,iThe perceptual service provider then returns the value of the lower bound a and the value of the upper bound b of the evaluation range as a challenge to the participant;
s24, iZKM response: after the participants receive the challenge containing the values a and b sent by the perception service provider, the participants judge the perception data D of the participantsiWhether or not in [ a, b ]]Interval, if the perception data D of the participantiIn [ a, b ]]If the interval is not within the interval, the participant exits the task and returns to the perception service provider, the data quality evaluation of the participant is terminated, and if the perception data D of the participanti∈[a,b]Then the participant calculatesAndas a response to the challenge, whereinAndare respectivelyAndin the context of the confusion that is,andis to DiA and | b-DiHiding of |Tibetan, S1,iAnd S2,iResponses to the challenge lower limit a and upper limit b, respectively, and then transmitted (S)1,i,S2,i) To the aware service provider;
s25, iZKM validation evaluation: sensing the response returned by the service provider to the challenge based on the participant (S)1,i,S2,i) Verifying commitments submitted by participants S0,iBy calculating S1,i=S0,i·(ga)-1mod p and S2,i=gb·(S0,i)-1mod p,S0,i、S1,iAnd S2,iAre respectively the participant wiCommitment of constructs and response to challenges, (g)a)-1And gbIs a structural factor, (S)0,i)-1Is S0,iIn the reverse of the loop group G, a computational validation that is true indicates that the participant uses the same perceptual data values in constructing commitments and response challenges, that the perceptual service provider is not spoofed, and that the perceptual service provider trusts the perceptual data D uploaded by the participanti∈[a,b]The perception data uploaded by the participant proves the challenge-response protocol iZKM through zero knowledge of privacy protection data quality evaluation, otherwise the data quality evaluation of the participant is failed.
4. The data quality perception incentive method for privacy protection in community perception according to claim 1, wherein the step S3 comprises the following steps:
s31, participant wiData D ofiThe data quality assessment by the perceptual service provider satisfies the scope of requirements R of the task, and subsequently the perceptual service provider will satisfy the participants w of the data quality assessmentiInformation ofIs sent to the task publisher, whereinThe representation of an anonymous identity is represented,represents the commitment of the construct while informing the participant wiData D ofiSatisfy reliability assessment of data quality, otherwise notify participant wiThe data evaluation fails, and the task is ended;
s32, the task publisher receives the participant w meeting the data quality evaluationiAfter the information, a prepayment request is sentTo a perceptual service provider, whereinIs a prepayment to the participant;
s33, perception service provider receives and provides to participant wiImmediately after the prepayment, the participant w is notifiediSubmitting the perception data to a task publisher;
s34, participant wiEncrypted perception data Enc (D) after receipt of a prepayment noticei,pkd) And a random number Enc (r)i,pkd) And sending the task to the task publisher.
5. The data quality perception incentive method for privacy protection in community perception according to claim 1, wherein the step S4 comprises the following steps:
s41, the task publisher uses the private key skdDecrypting participant submitted data D'i=Dec(Enc(Di,pkd),skd) And r'i=Dec(Enc(ri,pkd),skd);
S42, calculating by task publisherValidating participant wiThe reliability of the submitted data is such that,is thatIn the context of the confusion that is,is to D 'obtained after decryption'iIs hidden, D'iAnd r'iIs decrypted D'i=Dec(Enc(Di,pkd),skd) And Dec (Enc (r)i,pkd),skd) The result of the acquisition is that,is that the task publisher bases on the participant wiSubmitted data D'i=Dec(Enc(Di,pkd),skd) And r'i=Dec(Enc(ri,pkd),skd) Fabricated commitment as long as task publisher decrypts resulting data D'iAnd r'iSatisfy the requirement ofThe submitted data meets the reliability, the surplus reward of the participants is paid, and the reward is refused to be paid if the verification is not passed;
s43, sending by the task publisher as long as the data passes the verificationTo the aware service provider, informing the aware service provider whether the user is anonymous or not using the parameterPaying;
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010035651.XA CN111246468B (en) | 2020-01-14 | 2020-01-14 | Data quality perception incentive method aiming at privacy protection in group perception |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010035651.XA CN111246468B (en) | 2020-01-14 | 2020-01-14 | Data quality perception incentive method aiming at privacy protection in group perception |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111246468A CN111246468A (en) | 2020-06-05 |
CN111246468B true CN111246468B (en) | 2021-03-30 |
Family
ID=70880802
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010035651.XA Active CN111246468B (en) | 2020-01-14 | 2020-01-14 | Data quality perception incentive method aiming at privacy protection in group perception |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111246468B (en) |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113139204B (en) * | 2021-01-27 | 2022-09-30 | 东南数字经济发展研究院 | Medical data privacy protection method using zero-knowledge proof and shuffling algorithm |
CN113034223B (en) * | 2021-03-10 | 2024-03-05 | 中国人民大学 | Crowd-sourced service transaction matching method, system and medium based on incentive mechanism |
CN113079486B (en) * | 2021-04-08 | 2022-05-27 | 青岛科技大学 | Vehicle networking crowd sensing and incentive method with privacy protection characteristic based on block chain |
CN114760067B (en) * | 2022-03-30 | 2023-09-12 | 西安电子科技大学 | Privacy security protection method for blockchain crowd sensing system by using zero knowledge proof |
CN116506845B (en) * | 2023-06-19 | 2023-09-15 | 暨南大学 | Privacy-protected Internet of vehicles crowd sensing excitation method and system |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9818136B1 (en) * | 2003-02-05 | 2017-11-14 | Steven M. Hoffberg | System and method for determining contingent relevance |
CN110602077A (en) * | 2019-09-03 | 2019-12-20 | 成都信息工程大学 | Quantum block chain network anonymous election method and system based on trust evaluation |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108023648B (en) * | 2017-11-02 | 2020-10-16 | 南京邮电大学 | Cooperative spectrum sensing method based on multitask crowd sensing |
-
2020
- 2020-01-14 CN CN202010035651.XA patent/CN111246468B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9818136B1 (en) * | 2003-02-05 | 2017-11-14 | Steven M. Hoffberg | System and method for determining contingent relevance |
CN110602077A (en) * | 2019-09-03 | 2019-12-20 | 成都信息工程大学 | Quantum block chain network anonymous election method and system based on trust evaluation |
Non-Patent Citations (1)
Title |
---|
面向车辆群体感知场景的隐私保护技术研究;孙丝雨;《CNKI中国硕士学位论文全文数据库信息科技辑》;20191215;全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN111246468A (en) | 2020-06-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111246468B (en) | Data quality perception incentive method aiming at privacy protection in group perception | |
Xiong et al. | A personalized privacy protection framework for mobile crowdsensing in IIoT | |
CN107749836B (en) | Mobile sensing system and mobile sensing method for user privacy protection and data reliability | |
CN107483211B (en) | Individualized k-anonymous privacy protection and excitation method based on block chain | |
CN107528835B (en) | User privacy protection method based on security intelligent contract k-anonymous incentive mechanism | |
Wu et al. | Enabling data trustworthiness and user privacy in mobile crowdsensing | |
JP5274096B2 (en) | Non-repudiation for digital content distribution | |
Lai et al. | SPIR: A secure and privacy-preserving incentive scheme for reliable real-time map updates | |
US20100229241A1 (en) | Method of accessing service, device and system thereof | |
CN110309634A (en) | A kind of credible advertisement data management system based on block chain | |
CN113595738B (en) | Block chain-based collaborative position privacy protection method | |
CN110825810B (en) | Block chain-based crowd sensing dual privacy protection method | |
CN105245345A (en) | High reliability perception data collection algorithm based on mobile perception user anonymity reputation in crowd sensing | |
Wang et al. | Towards privacy-driven truthful incentives for mobile crowdsensing under untrusted platform | |
CN110677395B9 (en) | Security-based incentive method with privacy protection function and real-time map updating system | |
CN109284623A (en) | The management method of intelligent perception task based on privacy of user protection | |
CN115801260B (en) | Block chain-assisted collaborative attack and defense game method in untrusted network environment | |
CN110502905B (en) | Privacy-protecting distributed account book transaction method and system | |
Hu et al. | Privacy-preserving combinatorial auction without an auctioneer | |
WO2021222669A1 (en) | Decentralized privacy-preserving rewards with cryptographic black box accumulators | |
Ismail et al. | A security architecture for reputation systems | |
CN110365671B (en) | Crowd sensing incentive mechanism method supporting privacy protection | |
JP4971917B2 (en) | Signature generation device, signature verification device, group management device, and program thereof | |
CN117081743B (en) | Secret key management and acquisition method for privacy calculation, blockchain and electronic equipment | |
CN117411730B (en) | Distributed position cache cooperation method based on excitation mechanism |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |