CN107360146B - 一种接受保证的隐私保护空间众包任务分配系统及方法 - Google Patents

一种接受保证的隐私保护空间众包任务分配系统及方法 Download PDF

Info

Publication number
CN107360146B
CN107360146B CN201710533887.4A CN201710533887A CN107360146B CN 107360146 B CN107360146 B CN 107360146B CN 201710533887 A CN201710533887 A CN 201710533887A CN 107360146 B CN107360146 B CN 107360146B
Authority
CN
China
Prior art keywords
worker
workers
task
server
encrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201710533887.4A
Other languages
English (en)
Chinese (zh)
Other versions
CN107360146A (zh
Inventor
毛睿
李荣华
陆敏华
王毅
罗秋明
商烁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen University
Original Assignee
Shenzhen University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen University filed Critical Shenzhen University
Priority to CN201710533887.4A priority Critical patent/CN107360146B/zh
Publication of CN107360146A publication Critical patent/CN107360146A/zh
Priority to PCT/CN2017/113468 priority patent/WO2019006968A1/fr
Application granted granted Critical
Publication of CN107360146B publication Critical patent/CN107360146B/zh
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • H04L63/0421Anonymous communication, i.e. the party's identifiers are hidden from the other party or parties, e.g. using an anonymizer
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0631Resource planning, allocation, distributing or scheduling for enterprises or organisations
    • G06Q10/06311Scheduling, planning or task assignment for a person or group
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0464Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload using hop-by-hop encryption, i.e. wherein an intermediate entity decrypts the information and re-encrypts it before forwarding it
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/008Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving homomorphic encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0872Generation of secret information including derivation or calculation of cryptographic keys or passwords using geo-location information, e.g. location data, time, relative position or proximity to other entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Economics (AREA)
  • Strategic Management (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Game Theory and Decision Science (AREA)
  • Theoretical Computer Science (AREA)
  • Educational Administration (AREA)
  • Tourism & Hospitality (AREA)
  • Development Economics (AREA)
  • Quality & Reliability (AREA)
  • Operations Research (AREA)
  • Marketing (AREA)
  • Power Engineering (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
CN201710533887.4A 2017-07-03 2017-07-03 一种接受保证的隐私保护空间众包任务分配系统及方法 Expired - Fee Related CN107360146B (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201710533887.4A CN107360146B (zh) 2017-07-03 2017-07-03 一种接受保证的隐私保护空间众包任务分配系统及方法
PCT/CN2017/113468 WO2019006968A1 (fr) 2017-07-03 2017-11-29 Système d'attribution de tâches justifiables et procédé d'externalisation ouverte spatiale à confidentialité protégée

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710533887.4A CN107360146B (zh) 2017-07-03 2017-07-03 一种接受保证的隐私保护空间众包任务分配系统及方法

Publications (2)

Publication Number Publication Date
CN107360146A CN107360146A (zh) 2017-11-17
CN107360146B true CN107360146B (zh) 2021-03-26

Family

ID=60292821

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710533887.4A Expired - Fee Related CN107360146B (zh) 2017-07-03 2017-07-03 一种接受保证的隐私保护空间众包任务分配系统及方法

Country Status (2)

Country Link
CN (1) CN107360146B (fr)
WO (1) WO2019006968A1 (fr)

Families Citing this family (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107360146B (zh) * 2017-07-03 2021-03-26 深圳大学 一种接受保证的隐私保护空间众包任务分配系统及方法
CN109033865B (zh) * 2018-06-20 2021-10-01 苏州大学 一种空间众包中隐私保护的任务分配方法
CN109003172A (zh) * 2018-07-09 2018-12-14 中国科学技术大学苏州研究院 保护隐私的空间众包任务竞拍方法
CN109600709B (zh) * 2018-11-27 2021-01-26 南方科技大学 空间众包任务分配方法及系统
CN110062042B (zh) * 2019-04-16 2021-09-24 南京信息工程大学 一种移动众包支持的去中心化的视频流服务方法及系统
CN110232507B (zh) * 2019-05-28 2021-07-27 中国人民解放军国防科技大学 基于智能合约的众包活动全过程监管方法及系统
CN110620774B (zh) * 2019-09-20 2021-06-08 西安电子科技大学 区块链下空间众包的位置策略隐私保护方法
CN111563789B (zh) * 2020-03-30 2022-03-25 华东师范大学 基于隐私保护的推荐方法
CN112488577B (zh) * 2020-12-17 2024-05-24 多点(深圳)数字科技有限公司 信息生成的方法、装置、电子设备和计算机可读介质
CN113761555B (zh) * 2021-07-20 2024-04-09 杭州师范大学 一种基于智能合约的安全可靠的车联网空间众包任务匹配方法
CN114978492B (zh) * 2022-05-11 2024-05-14 西安电子科技大学 空间信息网中集中式空间众包任务分配的隐私保护方法
CN114944960B (zh) * 2022-06-20 2023-07-25 成都卫士通信息产业股份有限公司 一种密码应用方法、装置、设备及存储介质
CN115587716B (zh) * 2022-12-12 2023-03-14 哈尔滨工业大学(深圳)(哈尔滨工业大学深圳科技创新研究院) 一种隐私保护空间众包任务分配方法及系统

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104731860A (zh) * 2015-02-04 2015-06-24 北京邮电大学 隐私保护的空间关键字查询方法
CN105243501A (zh) * 2015-10-13 2016-01-13 重庆大学 空间众包网络节点位置隐私保护方法
CN105825333A (zh) * 2016-03-14 2016-08-03 南京邮电大学 基于云平台匿名地点的众包服务系统及任务分配方法

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120046995A1 (en) * 2009-04-29 2012-02-23 Waldeck Technology, Llc Anonymous crowd comparison
US20140343984A1 (en) * 2013-03-14 2014-11-20 University Of Southern California Spatial crowdsourcing with trustworthy query answering
CN107360146B (zh) * 2017-07-03 2021-03-26 深圳大学 一种接受保证的隐私保护空间众包任务分配系统及方法

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104731860A (zh) * 2015-02-04 2015-06-24 北京邮电大学 隐私保护的空间关键字查询方法
CN105243501A (zh) * 2015-10-13 2016-01-13 重庆大学 空间众包网络节点位置隐私保护方法
CN105825333A (zh) * 2016-03-14 2016-08-03 南京邮电大学 基于云平台匿名地点的众包服务系统及任务分配方法

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
支持工作者位置隐私保护的众包质量控制模型;初翔,仲秋雁;《系统工程理论与实践 基础科学专辑》;20160825;第36卷(第8期);第2047-2055页 *

Also Published As

Publication number Publication date
WO2019006968A1 (fr) 2019-01-10
CN107360146A (zh) 2017-11-17

Similar Documents

Publication Publication Date Title
CN107257381B (zh) 一种隐私保护空间众包的任务分配系统模型及实现方法
CN107360146B (zh) 一种接受保证的隐私保护空间众包任务分配系统及方法
Belguith et al. Phoabe: Securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted iot
Song et al. Eppda: An efficient privacy-preserving data aggregation federated learning scheme
Liu et al. Efficient task assignment in spatial crowdsourcing with worker and task privacy protection
Xing et al. Mutual privacy preserving $ k $-means clustering in social participatory sensing
Li et al. Privacy-preserving-outsourced association rule mining on vertically partitioned databases
Van Den Hooff et al. Vuvuzela: Scalable private messaging resistant to traffic analysis
Zhou et al. TR-MABE: White-box traceable and revocable multi-authority attribute-based encryption and its applications to multi-level privacy-preserving e-healthcare cloud computing systems
Paulet et al. Privacy-preserving and content-protecting location based queries
Li et al. Efficient and privacy-preserving data aggregation in mobile sensing
Ruan et al. Secure and privacy-preserving average consensus
CN107222302B (zh) 用部分同态加密方案构建的空间众包任务分配系统及方法
Jayapandian et al. Secure and efficient online data storage and sharing over cloud environment using probabilistic with homomorphic encryption
Chen et al. Private data aggregation with integrity assurance and fault tolerance for mobile crowd-sensing
Tang et al. Achieve privacy-preserving truth discovery in crowdsensing systems
Junejo et al. A Lightweight Attribute‐Based Security Scheme for Fog‐Enabled Cyber Physical Systems
Karl et al. Cryptonite: a framework for flexible time-series secure aggregation with online fault tolerance
Vishwakarma et al. A secure three-party authentication protocol for wireless body area networks
Li et al. Epps: Efficient privacy-preserving scheme in distributed deep learning
Yuvaraju et al. Energy proficient hybrid secure scheme for wireless sensor networks
Al-Zumia et al. A novel fault-tolerant privacy-preserving cloud-based data aggregation scheme for lightweight health data
Zhang et al. Privacy‐friendly weighted‐reputation aggregation protocols against malicious adversaries in cloud services
Raeisi-Varzaneh et al. Internet of Things: Security, Issues, Threats, and Assessment of Different Cryptographic Technologies
Karl et al. Cryptonite: A framework for flexible time-series secure aggregation with non-interactive fault recovery

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20210326