CN107360146B - 一种接受保证的隐私保护空间众包任务分配系统及方法 - Google Patents
一种接受保证的隐私保护空间众包任务分配系统及方法 Download PDFInfo
- Publication number
- CN107360146B CN107360146B CN201710533887.4A CN201710533887A CN107360146B CN 107360146 B CN107360146 B CN 107360146B CN 201710533887 A CN201710533887 A CN 201710533887A CN 107360146 B CN107360146 B CN 107360146B
- Authority
- CN
- China
- Prior art keywords
- worker
- workers
- task
- server
- encrypted
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 238000000034 method Methods 0.000 title claims abstract description 31
- 238000004364 calculation method Methods 0.000 claims abstract description 25
- 238000004422 calculation algorithm Methods 0.000 claims description 15
- 239000004576 sand Substances 0.000 claims description 10
- 230000008569 process Effects 0.000 claims description 9
- 230000001174 ascending effect Effects 0.000 claims description 4
- 238000013507 mapping Methods 0.000 claims description 3
- 238000012545 processing Methods 0.000 claims description 3
- 241001640034 Heteropterys Species 0.000 claims 1
- 239000004094 surface-active agent Substances 0.000 claims 1
- 238000004891 communication Methods 0.000 description 13
- 230000003247 decreasing effect Effects 0.000 description 13
- 238000010586 diagram Methods 0.000 description 10
- 238000004458 analytical method Methods 0.000 description 5
- 238000002474 experimental method Methods 0.000 description 5
- 238000007726 management method Methods 0.000 description 4
- 238000013459 approach Methods 0.000 description 3
- 230000008859 change Effects 0.000 description 3
- 238000013461 design Methods 0.000 description 3
- 238000011156 evaluation Methods 0.000 description 3
- 238000010276 construction Methods 0.000 description 2
- 230000006378 damage Effects 0.000 description 2
- 230000007423 decrease Effects 0.000 description 2
- 230000005802 health problem Effects 0.000 description 2
- 238000012544 monitoring process Methods 0.000 description 2
- 238000011160 research Methods 0.000 description 2
- 238000012358 sourcing Methods 0.000 description 2
- 229920000459 Nitrile rubber Polymers 0.000 description 1
- 241000233805 Phoenix Species 0.000 description 1
- 241000382349 White tip die-back phytoplasma Species 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 238000002507 cathodic stripping potentiometry Methods 0.000 description 1
- 239000003795 chemical substances by application Substances 0.000 description 1
- 238000000354 decomposition reaction Methods 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000004069 differentiation Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000007689 inspection Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012946 outsourcing Methods 0.000 description 1
- 238000005192 partition Methods 0.000 description 1
- 230000012846 protein folding Effects 0.000 description 1
- 230000007115 recruitment Effects 0.000 description 1
- 238000004088 simulation Methods 0.000 description 1
- 208000011580 syndromic disease Diseases 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
- 238000002560 therapeutic procedure Methods 0.000 description 1
- 238000013518 transcription Methods 0.000 description 1
- 230000035897 transcription Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0407—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
- H04L63/0421—Anonymous communication, i.e. the party's identifiers are hidden from the other party or parties, e.g. using an anonymizer
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/063—Operations research, analysis or management
- G06Q10/0631—Resource planning, allocation, distributing or scheduling for enterprises or organisations
- G06Q10/06311—Scheduling, planning or task assignment for a person or group
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0464—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload using hop-by-hop encryption, i.e. wherein an intermediate entity decrypts the information and re-encrypts it before forwarding it
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/008—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving homomorphic encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0872—Generation of secret information including derivation or calculation of cryptographic keys or passwords using geo-location information, e.g. location data, time, relative position or proximity to other entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Business, Economics & Management (AREA)
- Human Resources & Organizations (AREA)
- Entrepreneurship & Innovation (AREA)
- Economics (AREA)
- Strategic Management (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- Game Theory and Decision Science (AREA)
- Theoretical Computer Science (AREA)
- Educational Administration (AREA)
- Tourism & Hospitality (AREA)
- Development Economics (AREA)
- Quality & Reliability (AREA)
- Operations Research (AREA)
- Marketing (AREA)
- Power Engineering (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710533887.4A CN107360146B (zh) | 2017-07-03 | 2017-07-03 | 一种接受保证的隐私保护空间众包任务分配系统及方法 |
PCT/CN2017/113468 WO2019006968A1 (fr) | 2017-07-03 | 2017-11-29 | Système d'attribution de tâches justifiables et procédé d'externalisation ouverte spatiale à confidentialité protégée |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710533887.4A CN107360146B (zh) | 2017-07-03 | 2017-07-03 | 一种接受保证的隐私保护空间众包任务分配系统及方法 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107360146A CN107360146A (zh) | 2017-11-17 |
CN107360146B true CN107360146B (zh) | 2021-03-26 |
Family
ID=60292821
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710533887.4A Expired - Fee Related CN107360146B (zh) | 2017-07-03 | 2017-07-03 | 一种接受保证的隐私保护空间众包任务分配系统及方法 |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN107360146B (fr) |
WO (1) | WO2019006968A1 (fr) |
Families Citing this family (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107360146B (zh) * | 2017-07-03 | 2021-03-26 | 深圳大学 | 一种接受保证的隐私保护空间众包任务分配系统及方法 |
CN109033865B (zh) * | 2018-06-20 | 2021-10-01 | 苏州大学 | 一种空间众包中隐私保护的任务分配方法 |
CN109003172A (zh) * | 2018-07-09 | 2018-12-14 | 中国科学技术大学苏州研究院 | 保护隐私的空间众包任务竞拍方法 |
CN109600709B (zh) * | 2018-11-27 | 2021-01-26 | 南方科技大学 | 空间众包任务分配方法及系统 |
CN110062042B (zh) * | 2019-04-16 | 2021-09-24 | 南京信息工程大学 | 一种移动众包支持的去中心化的视频流服务方法及系统 |
CN110232507B (zh) * | 2019-05-28 | 2021-07-27 | 中国人民解放军国防科技大学 | 基于智能合约的众包活动全过程监管方法及系统 |
CN110620774B (zh) * | 2019-09-20 | 2021-06-08 | 西安电子科技大学 | 区块链下空间众包的位置策略隐私保护方法 |
CN111563789B (zh) * | 2020-03-30 | 2022-03-25 | 华东师范大学 | 基于隐私保护的推荐方法 |
CN112488577B (zh) * | 2020-12-17 | 2024-05-24 | 多点(深圳)数字科技有限公司 | 信息生成的方法、装置、电子设备和计算机可读介质 |
CN113761555B (zh) * | 2021-07-20 | 2024-04-09 | 杭州师范大学 | 一种基于智能合约的安全可靠的车联网空间众包任务匹配方法 |
CN114978492B (zh) * | 2022-05-11 | 2024-05-14 | 西安电子科技大学 | 空间信息网中集中式空间众包任务分配的隐私保护方法 |
CN114944960B (zh) * | 2022-06-20 | 2023-07-25 | 成都卫士通信息产业股份有限公司 | 一种密码应用方法、装置、设备及存储介质 |
CN115587716B (zh) * | 2022-12-12 | 2023-03-14 | 哈尔滨工业大学(深圳)(哈尔滨工业大学深圳科技创新研究院) | 一种隐私保护空间众包任务分配方法及系统 |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104731860A (zh) * | 2015-02-04 | 2015-06-24 | 北京邮电大学 | 隐私保护的空间关键字查询方法 |
CN105243501A (zh) * | 2015-10-13 | 2016-01-13 | 重庆大学 | 空间众包网络节点位置隐私保护方法 |
CN105825333A (zh) * | 2016-03-14 | 2016-08-03 | 南京邮电大学 | 基于云平台匿名地点的众包服务系统及任务分配方法 |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120046995A1 (en) * | 2009-04-29 | 2012-02-23 | Waldeck Technology, Llc | Anonymous crowd comparison |
US20140343984A1 (en) * | 2013-03-14 | 2014-11-20 | University Of Southern California | Spatial crowdsourcing with trustworthy query answering |
CN107360146B (zh) * | 2017-07-03 | 2021-03-26 | 深圳大学 | 一种接受保证的隐私保护空间众包任务分配系统及方法 |
-
2017
- 2017-07-03 CN CN201710533887.4A patent/CN107360146B/zh not_active Expired - Fee Related
- 2017-11-29 WO PCT/CN2017/113468 patent/WO2019006968A1/fr active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104731860A (zh) * | 2015-02-04 | 2015-06-24 | 北京邮电大学 | 隐私保护的空间关键字查询方法 |
CN105243501A (zh) * | 2015-10-13 | 2016-01-13 | 重庆大学 | 空间众包网络节点位置隐私保护方法 |
CN105825333A (zh) * | 2016-03-14 | 2016-08-03 | 南京邮电大学 | 基于云平台匿名地点的众包服务系统及任务分配方法 |
Non-Patent Citations (1)
Title |
---|
支持工作者位置隐私保护的众包质量控制模型;初翔,仲秋雁;《系统工程理论与实践 基础科学专辑》;20160825;第36卷(第8期);第2047-2055页 * |
Also Published As
Publication number | Publication date |
---|---|
WO2019006968A1 (fr) | 2019-01-10 |
CN107360146A (zh) | 2017-11-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107257381B (zh) | 一种隐私保护空间众包的任务分配系统模型及实现方法 | |
CN107360146B (zh) | 一种接受保证的隐私保护空间众包任务分配系统及方法 | |
Belguith et al. | Phoabe: Securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted iot | |
Song et al. | Eppda: An efficient privacy-preserving data aggregation federated learning scheme | |
Liu et al. | Efficient task assignment in spatial crowdsourcing with worker and task privacy protection | |
Xing et al. | Mutual privacy preserving $ k $-means clustering in social participatory sensing | |
Li et al. | Privacy-preserving-outsourced association rule mining on vertically partitioned databases | |
Van Den Hooff et al. | Vuvuzela: Scalable private messaging resistant to traffic analysis | |
Zhou et al. | TR-MABE: White-box traceable and revocable multi-authority attribute-based encryption and its applications to multi-level privacy-preserving e-healthcare cloud computing systems | |
Paulet et al. | Privacy-preserving and content-protecting location based queries | |
Li et al. | Efficient and privacy-preserving data aggregation in mobile sensing | |
Ruan et al. | Secure and privacy-preserving average consensus | |
CN107222302B (zh) | 用部分同态加密方案构建的空间众包任务分配系统及方法 | |
Jayapandian et al. | Secure and efficient online data storage and sharing over cloud environment using probabilistic with homomorphic encryption | |
Chen et al. | Private data aggregation with integrity assurance and fault tolerance for mobile crowd-sensing | |
Tang et al. | Achieve privacy-preserving truth discovery in crowdsensing systems | |
Junejo et al. | A Lightweight Attribute‐Based Security Scheme for Fog‐Enabled Cyber Physical Systems | |
Karl et al. | Cryptonite: a framework for flexible time-series secure aggregation with online fault tolerance | |
Vishwakarma et al. | A secure three-party authentication protocol for wireless body area networks | |
Li et al. | Epps: Efficient privacy-preserving scheme in distributed deep learning | |
Yuvaraju et al. | Energy proficient hybrid secure scheme for wireless sensor networks | |
Al-Zumia et al. | A novel fault-tolerant privacy-preserving cloud-based data aggregation scheme for lightweight health data | |
Zhang et al. | Privacy‐friendly weighted‐reputation aggregation protocols against malicious adversaries in cloud services | |
Raeisi-Varzaneh et al. | Internet of Things: Security, Issues, Threats, and Assessment of Different Cryptographic Technologies | |
Karl et al. | Cryptonite: A framework for flexible time-series secure aggregation with non-interactive fault recovery |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20210326 |