CN108307344A - One kind being based on the matched intelligent perception method for secret protection of alliance and system - Google Patents

One kind being based on the matched intelligent perception method for secret protection of alliance and system Download PDF

Info

Publication number
CN108307344A
CN108307344A CN201810085524.3A CN201810085524A CN108307344A CN 108307344 A CN108307344 A CN 108307344A CN 201810085524 A CN201810085524 A CN 201810085524A CN 108307344 A CN108307344 A CN 108307344A
Authority
CN
China
Prior art keywords
perception
alliance
user
task
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810085524.3A
Other languages
Chinese (zh)
Inventor
熊金波
马蓉
姚志强
王丽丽
林立
金彪
王敏燊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujian Normal University
Original Assignee
Fujian Normal University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujian Normal University filed Critical Fujian Normal University
Priority to CN201810085524.3A priority Critical patent/CN108307344A/en
Publication of CN108307344A publication Critical patent/CN108307344A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data

Abstract

The present invention relates to one kind being based on the matched intelligent perception method for secret protection of alliance and system; it passes sequentially through and encourages perception step, Bloom filter generation step including prestige, obscures inner product of vectors calculating step, perception alliance subject determining step, perception data random permutation processing step, data acquisition system uploading step and perception data set calculating step; both mechanism of effective incentive had been established with reasonable distribution perception task, and the long-term perception data quality for participating in enthusiasm and being provided of perception user is provided;What is more important can be effectively protected perception individual subscriber private data from leakage.It is relatively low that it is related to algorithm computing cost, has reached safe and efficient design object, is suitable for large-scale promotion and uses, can be applied in actual production life process.

Description

One kind being based on the matched intelligent perception method for secret protection of alliance and system
Technical field
The present invention relates to intelligent perception fields, more particularly to one kind being based on the matched intelligent perception method for secret protection of alliance And system.
Background technology
With the fast lifting of sensor capability and the widely available of mobile intelligent terminal equipment so that mobile gunz sense Hownet network is pervasive by using a large amount of mobile intelligent terminals and movable sensor etc. as a kind of completely new Internet of Things perceptual model Awareness apparatus acquires individual, scene and environment sensing data etc. in particular range, to complete those to only rely on individual to be difficult real Existing extensive, complicated ubiquitous depth society perception task.Simultaneously as the very big potential value of its perception data so that Its application range constantly extends and extends, and can realize and largely innovate and valuable new application.But multi-party There is also new problem and challenges in face, and especially prominent is the personal secrets problem of mobile gunz sensing network.
In mobile gunz sensing network, the data perceived are sent to aware platform by perception user in real time, and perception is flat Platform collects the data of all perception users of participated in perception task certain moment Nei and carries out preliminary data processing, then is carried with service Carry out perception data transaction for quotient, and by service provider the obtained perception data of merchandising is further analyzed and Reason can be that user formulates personalized service strategy and realization user's behavior prediction etc..The receipts of data in the process Collection and processing can give the privacy of perception user to threaten.On the one hand, if perception user directly uploads Sensitive Information Hidden Perception data, without using proper data protection technique, it would be possible to cause personal privacy leakage.On the other hand, after to upload Data handled the privacy also to data and bring threat.Therefore, how perception user selects before uploading perception data The Data Privacy Protection Strategies and aware platform are processed into how the perception data being collected into carries out safe privacy-preserving data computation One of the severe challenge faced for intelligent perception network Development.
The secret protection scheme of mobile gunz sensing network in existing research is to assume that aware platform is completely credible, perception User takes secret protection measure in perception task, and true perception data is provided in the t times perception task to each user, One data level of anonymity of simultaneous selection.Data anonymous is available to sides such as true perception data addition noise, k-anonymity Formula.Each user under the privacy and preference for not knowing other users by after secret protection data and data level of anonymity be uploaded to Aware platform is polymerize.Aware platform is collected into all anonymous treated data sets and user's from all perception users It merchandises again to service provider after level of anonymity, though certain secret protection effect can be played, there are still many not yet It solves the problems, such as.First, intelligent perception network user data amount is huge, if each user uses certain method for secret protection It is uploaded again after handling truthful data, the data validity and availability that perception data collected by aware platform is concentrated It will have a greatly reduced quality.Second, it is in practical applications and invalid to the completely believable hypothesis of aware platform, in some existing data The mode that homomorphic cryptography is commonly used in aggregation scheme realizes that non-fully believable aware platform is not knowing any perception user upload Private data polymerization is carried out in the case of data.But the huge limited computing capability of data volume and sensing terminal is faced, homomorphism adds Close computational efficiency will no longer satisfy demand.Third, in mobile gunz sensing network, protection perceives the same of user data privacy When also need to Construct question in view of reasonable effective incentive mechanism, ensure perception participating user's (use especially with a high reputation Family) quantity, and to efficiently control estimated expenditure on the basis of raising task treatment effeciency.
In conclusion the problem of for privacy leakage present in mobile intelligent perception and structure mechanism of effective incentive, Existing solution simply solves the problems, such as a certain from considering in a certain respect, seriously ignores other challenges, cannot integrate solution Perception data secret protection in mobile intelligent perception and perception data transaction issues.It can be simultaneously therefore, it is necessary to invent one kind Solve the method for above-mentioned safety problem and corresponding system.
Invention content
In view of this, the purpose of the present invention is to provide one kind based on the matched intelligent perception method for secret protection of alliance and System, being capable of effective protection perception individual subscriber private data.
To achieve the above object, the present invention adopts the following technical scheme that:
One kind being based on the matched intelligent perception method for secret protection of alliance comprising:Perceive prestige excitation, perception alliance With with perception data intersection calculate;
The perception prestige excitation includes the following steps:
Step S11:It is performed before in each perception task, aware platform is appointed to perception user or perception alliance i publications Business processing request;
Step S12:An independent threshold value T is arranged to each perception user or perception alliance in aware platformi
Step S13:According to the threshold value T and single perception user of all perception users or perception alliance or the threshold for perceiving alliance Value TiFor each perception user or perception alliance, one credit value Q is seti
Step S14:For the difference of issued perception task, value of utility u is set for each perception taskk
Step S15:User or perception alliance i are perceived when participating in perception task k, certain participation cost c can be paidi; User or perception alliance i are perceived in the step S15 when participating in perception task k, can pay certain participation cost ci, generation Valence ciIt is influenced by the perception task size and perception user or perception alliance credit value distributed, it is proportional with task size, Inversely with perception user or perception alliance credit value.
Step S16:It participates in perceiving user or perceiving alliance i providing remuneration P to be corresponding after each perception taskk; Very high remuneration P can be provided when aware platform is initial in the step S16kTask is participated in encourage perception user or perceive alliance Processing, as perception user or the ratio for perceiving alliance's participation are higher and higher, remuneration can slowly tend to be steady.
Step S17:Required cost c when according to participation task kiThe remuneration P paid for task k with aware platformk, Perception user or perception alliance i may determine whether to receive the processing request of current perception task;
Step S18:When handling perception task, aware platform can choose the big perception user of credit value or perception alliance every time (i.e. QiThe maximum) participate in the perception of the task;
Step S19:Perception user or sense are updated using the value of utility of task k handled by perception user or perception alliance i Know alliance's credit value, and participate in the processing request of competition task k+1, until all processing completion or the task budgets of all tasks It runs out.
In an embodiment of the present invention, user or perception alliance i are perceived in the step S15 when participating in perception task k, Certain participation cost c can be paidi, cost ciThe perception task size distributed and perception user or perception alliance credit value It influences, it is proportional with task size, inversely with perception user or perception alliance credit value.
In an embodiment of the present invention, very high remuneration P can be provided when aware platform is initial in the step S16kTo rouse It encourages perception user or perceives alliance and participate in task processing, as perception user or the ratio for perceiving alliance's participation are higher and higher, report Reward can slowly tend to be steady.
In an embodiment of the present invention, the perception alliance matching includes the following steps:
Step S21:Perception alliance matching one of promoter user a and respondent user b be set separately the attribute of oneself to Duration set A and B;The content of attribute vector set and number are by user's sets itself in the step S21, it is sufficient to indicate user All properties and distinguish to the preference difference of each attribute.In order to simplify perception alliance matching problem, it is assumed that institute is useful Family is unique to the expression way of some attribute.
Step S22:Utilize the attribute vector of step S21 perception alliance matching one of promoter user a and respondent user b Set A and B generate corresponding Bloom filter BF offlineAAnd BFB
Step S23:BF obtained by user's a input steps S22A, obscure array D using the generation of binary vector method is obscured;
Step S24:User's a broadcast perception alliance matching request, and disclose parameter θ and obscure array D;
Step S25:One of respondent user b agrees to matching, receives parameter θ and obscures array D;
Step S26:User b is by BF obtained by step S22BInformation be added to received in step S25 obscure array D In, it obtains binary vector inner product and obscures value E;
Step S27:User b is to E obtained by user's a forwarding steps S26;
Step S28:User a receives E, reduction binary vector inner product G;
Step S29:User a is calculated using the similarity function p (A, B) of polynary bivector set with one of respondent's The similarity of user b and other respondents select the higher user of similarity to form perception alliance.
Further, the content of attribute vector set and number are used for table by user's sets itself in the step S21 Show all properties of user and distinguishes the preference difference to each attribute;In order to simplify perception alliance matching problem, it is assumed that all User is unique to the expression way of some attribute.
In an embodiment of the present invention, the perception data intersection calculating includes the following steps:
Step S31:It is pseudo-random permutation function that function F, which is arranged,;
Step S32:Perception user or the perception obtained perception data collection of the participated in perception task k of alliance i are combined into Si
Step S33:Each perception user perceives the key k that alliance i cooperates with generating function F with aware platform;
Step S34:Each perception user or perception alliance i utilize pseudo-random permutation function Fk(Si) respectively in set Each element carry out the randomization set S that obtains that treatedi′;
Step S35:The set S as obtained by pseudo-random permutation π upset steps S34i' in order of elements, obtain data Collect Ti
Step S36:User or perception alliance i are perceived by the data obtained collection T in step S35iUpload to aware platform;It is described In different times, its perception data collection can be uploaded to asynchronous execution, each perception user or perception alliance in step S36 Aware platform obtains output again later.
Step S37:Aware platform calculates the data set intersection I for respectively perceiving that user or perception alliance i are uploaded in step S36 And store, carrying out data trade with service provider later obtains income.In the step S37 aware platform only carry out one it is hidden Personal friendship, which collects, to be calculated without cryptographic operation, there is larger odds for effectiveness in mass data.
In an embodiment of the present invention, asynchronous execution in the step S36, each perception user or perception alliance are in difference Time, its perception data collection is uploaded to aware platform, obtains output again later;Aware platform is only held in the step S37 One privacy intersection of row calculates and does not have cryptographic operation.
The present invention also provides a kind of intimacy protection systems of mobile intelligent perception comprising prestige encourages sensing module, cloth Grand filter generation module obscures inner product of vectors computing module, perception alliance object determining module, at perception data random permutation Manage module, data acquisition system uploading module and perception data set calculation module;The prestige encourages sensing module, for utilizing letter Reputation value excitation perception user persistently participates in perception task and provides high quality perception data;The Bloom filter generation module, For the attribute vector set for perceiving user to be generated as binary vector;It is described to obscure inner product of vectors computing module, for not Its attribute vector inner product is calculated under the premise of any privacy information of leakage alliance matching promoter and respondent;The perception connection Alliance's object determining module, the inner product of vectors for matching promoter and respondent according to alliance, calculates vector set between the two successively The similarity of conjunction, and similarity the higher person is selected to form perception alliance;The perception data random permutation processing module, for pair It perceives user or perceives the perception data progress pseudo-random permutation processing that alliance participates in perception task;The data acquisition system uploads mould Block, for the data acquisition system obtained by perception data random permutation processing module to be uploaded to aware platform;The perception data collection Computing module is closed, calculates and stores for carrying out set intersection to set obtained by data acquisition system uploading module.
Further, described to obscure in inner product of vectors computing module, perception user is using special parameter and random number to it The calculating of binary vector inner product is obscured, but its parameter setting its confusion in next resume module can be offset by calculating, Its true binary vector inner product value can be restored.
Further, in the data acquisition system uploading module, each perceive does not interact between user or perception alliance, Ta Menwei One possible malicious act is exactly to change themselves pseudo-random permutation functional value, that is, changes their input set.Half can Letter aware platform only receives the functional value of information of the pseudo-randomness due to pseudo-random permutation function without showing setting element, There is higher-security to perception data.
The present invention has the advantages that compared with prior art:The present invention is effectively prevented from perception individual subscriber privacy The problems such as leaking data, the false data of preventing malice user.It is relatively low that it is related to algorithm computing cost, has reached safe and efficient Design object is suitable for large-scale promotion and uses, can be applied in actual production life process.
Description of the drawings
Fig. 1 is the mobile gunz sensing network schematic diagram of the present invention;
Fig. 2 is a kind of step flow chart based on the matched intelligent perception method for secret protection of alliance of the present invention.
Fig. 3 is one embodiment of the invention perception alliance matching main flow schematic diagram.
Fig. 4 is that one embodiment of the invention perception data intersection calculates.
Specific implementation mode
The present invention will be further described with reference to the accompanying drawings and embodiments.
The present invention in mobile gunz sensing network by it is initial when setting perception user or perceive the credit value of alliance, sense Know that user or perception alliance choose whether to participate according to task effectiveness, the perception to enjoy a good reputation is selected to use in task assignment procedure Family or perception alliance are handled to participate in task, realize that budget is controllable on the basis of improving task treatment effeciency.Using based on cloth Grand filter carries out perception alliance and matches so that perception user forms perception alliance effective protection personal data before uploading data Also perception income is improved while privacy to a certain extent.To being formed by the privacy intersection meter of perception alliance data acquisition system It calculates, considers computational efficiency and secret protection, under the premise of not revealing any alliance's data acquisition system information, cooperated computing is each After alliance's data acquisition system intersection acquisition income is traded with service provider.And as shown in Figure 1 it is mobile gunz sensing network Schematic diagram, including:
100, user or perception alliance are perceived;110, aware platform;120, service provider;130, opponent;
Perceive user or perception alliance 100, be using mobile awareness equipment (e.g., intelligent terminal, wearable device, Mobile unit etc.) social ordinary user or perception alliance, upload perception data and simultaneously maximize and obtain corresponding income, need to protect The a large amount of sensitive and privacy informations contained in perception data.
Aware platform 110 is mainly responsible for and is interacted with perception user or perception alliance and service provider, had certain Computing capability.
Service provider 120, mainly buy perception data by aware platform, are used for machine learning, data visualization etc. Field provides service for the user of different demands.
The opponent 130 indicates to that may launch a offensive in aware platform and perception data upload procedure.
Fig. 2-4 is please referred to, the present invention also provides one kind being based on the matched intelligent perception method for secret protection of alliance, including sense Know prestige excitation phase, perception alliance's matching stage and perception data intersection calculation stages;
Wherein perception prestige excitation phase includes the following steps:
(1) prestige excitation perception step
S11, it is performed before in each perception task, the aware platform is sent out to the perception user or perception alliance i The processing request of cloth task;
An independent threshold value T is arranged to perceiving user or perception alliance described in each in S12, the aware platformi
S13, threshold value T and the single perception user according to all perception users or perception alliance or perception alliance Threshold value TiFor each perception user or perception alliance, one credit value Q is seti
S14, for the difference of issued perception task, for each perception task, value of utility u is setk
S15, the perception user or perception alliance i can pay certain participation cost c when participating in perception task ki
S16, to correspond to, participation perceives the perception user or perception alliance i provides remuneration after each perception task Pk
S17, according to required cost c when participating in task kiThe remuneration P paid for task k with the aware platformk, The perception user or perception alliance i may determine whether to receive the processing request of current perception task;
When S18, processing perception task, the aware platform can choose the big perception user of credit value or perception every time Alliance (i.e. QiThe maximum) participate in the perception of the task;
S19, the perception user is updated using the value of utility of task k handled by the perception user or perception alliance i Or perception alliance credit value, and the processing request of competition task k+1 is participated in, until all tasks all handle completion or task Budget runs out.
Perception alliance matching stage includes the following steps:
(2) Bloom filter generation step:
S21, the perception alliance matching one of promoter user a and respondent user b be set separately the attribute of oneself to Duration set A and B;
S22, using S21 perception alliance matching one of promoter user a and respondent user b attribute vector set A and B generates corresponding Bloom filter BF offlineAAnd BFB
(3) obscure inner product of vectors and calculate step
S23, the user a input BF obtained by S22A, obscure array D using the generation of binary vector method is obscured;
S24, the user a broadcast perception alliance matching request, and disclose parameter θ and obscure array D;
One of S25, the respondent user b agree to matching, receive parameter θ and obscure array D;
S26, the user b are by BF obtained by S22BInformation be added to obscuring in array D of being received in S25, obtain two First inner product of vectors obscures value E;
(4) perception alliance subject determining step
S27, the user b send E obtained by S26 to user a;
S28, the user a receive E, reduction binary vector inner product G;
S29, the user a are calculated using the similarity function p (A, B) of polynary bivector set with one of respondent's The similarity of user b and other respondents select the higher user of similarity to form perception alliance.
Perception data intersection calculation stages include the following steps:
(5) perception data random permutation processing step
S31, setting function F are pseudo-random permutation function;
S32, the perception user or the perception obtained perception data collection of the participated in perception task k of alliance i are combined into Si
S33, each perception user perceive the key k that alliance i cooperates with generating function F with the aware platform;
S34, each described perception user or perception alliance i utilize pseudo-random permutation function Fk(Si) respectively in set Each element carry out the randomization set S that obtains that treatedi′;
S35, the set S as obtained by pseudo-random permutation π upset steps S34i' in order of elements, obtain data set Ti
(6) data acquisition system uploading step
S36, the perception user perceive alliance i by the data obtained collection T in step S35iUpload to the aware platform;
(7) perception data set calculates step
S37, the aware platform calculate each perception user in step S36 or perceive the data set that alliance i is uploaded Intersection I is simultaneously stored, and carrying out data trade with the service provider later obtains income.
The present invention also provides a kind of systems based on the matched intelligent perception secret protection of alliance:It encourages and perceives including prestige Module, Bloom filter generation module, obscure inner product of vectors computing module, perception alliance object determining module, perception data with Machine replacement Treatment module, data acquisition system uploading module and perception data set calculation module;
The prestige encourages sensing module, for utilizing credit value excitation perception user persistently to participate in perception task and providing High quality perception data;
The Bloom filter generation module, for the attribute vector set for perceiving user to be generated as binary vector;
It is described to obscure inner product of vectors computing module, in any privacy for not revealing alliance matching promoter and respondent Its attribute vector inner product is calculated under the premise of information;
Perception alliance object determining module, in the vector according to perception alliance matching promoter and respondent Product, calculates the similarity of vector set between the two successively, and similarity the higher person is selected to form perception alliance;
The perception data random permutation processing module, the sense for participating in perception task to perception user or perception alliance Primary data carries out pseudo-random permutation processing;
The data acquisition system uploading module, for uploading the data acquisition system obtained by perception data random permutation processing module To aware platform;
The perception data set calculation module, by being carried out based on set intersection to set obtained by data acquisition system uploading module It calculates and stores.
Further, described to obscure in inner product of vectors computing module, perception user is using special parameter and random number to it The calculating of binary vector inner product is obscured, but its parameter setting its confusion in next resume module can be offset by calculating, Its true binary vector inner product value can be restored.In the data acquisition system uploading module, each perceive does not have between user or perception alliance There is interaction, their only possible malicious acts are exactly to change themselves pseudo-random permutation functional value, that is, change theirs Input set.Half credible aware platform only receives the pseudo-randomness due to pseudo-random permutation function without showing setting element The functional value of information has higher-security to perception data.
The foregoing is merely presently preferred embodiments of the present invention, all equivalent changes done according to scope of the present invention patent with Modification should all belong to the covering scope of the present invention.

Claims (10)

1. one kind being based on the matched intelligent perception method for secret protection of alliance, it is characterised in that:Including the excitation of perception prestige, perception Alliance matches and perception data intersection calculates;
The perception prestige excitation includes the following steps:
Step S11:It is performed before in each perception task, aware platform is to perception user or perceives at alliance's i release tasks Reason request;
Step S12:An independent threshold value T is arranged to each perception user or perception alliance in aware platformi
Step S13:According to the threshold value T and single perception user of all perception users or perception alliance or the threshold value T for perceiving alliancei For each perception user or perception alliance, one credit value Q is seti
Step S14:For the difference of issued perception task, value of utility u is set for each perception taskk
Step S15:As perception user or alliance i is perceived when participating in perception task k, can pay certain participation cost ci
Step S16:It participates in perceiving user or perceiving alliance i providing remuneration P to be corresponding after each perception taskk
Step S17:Required cost c when according to participation task kiThe remuneration P paid for task k with aware platformk, perception User or perception alliance i may determine whether to receive the processing request of current perception task;
Step S18:When handling perception task, aware platform can choose the big perception user of credit value or perception alliance, i.e. Q every timei The maximum participates in the perception of the task;
Step S19:Using perception user or the value of utility of task k handled by alliance i is perceived to update perception user or perceives connection Alliance's credit value, and participate in the processing request of competition task k+1, until all task all processing complete or task budget by with It is complete.
2. according to claim 1 be based on the matched intelligent perception method for secret protection of alliance, it is characterised in that:The step Perception user or perception alliance i can pay certain participation cost c when participating in perception task k in rapid S15i, cost ciBy The perception task size of distribution and perception user or perception alliance credit value influence, proportional with task size, with perception User or perception alliance credit value are inversely.
3. according to claim 1 be based on the matched intelligent perception method for secret protection of alliance, it is characterised in that:The step Very high remuneration P can be provided when aware platform is initial in rapid S16kTask processing is participated in encourage perception user or perceive alliance, As perception user or the ratio for perceiving alliance's participation are higher and higher, remuneration can slowly tend to be steady.
4. according to claim 1 be based on the matched intelligent perception method for secret protection of alliance, it is characterised in that:
The perception alliance matching includes the following steps:
Step S21:The attribute vector collection of oneself is set separately in perception alliance matching one of promoter user a and respondent user b Close A and B;
Step S22:Utilize the attribute vector set of step S21 perception alliance matching one of promoter user a and respondent user b A and B generates corresponding Bloom filter BF offlineAAnd BFB
Step S23:BF obtained by user's a input steps S22A, obscure array D using the generation of binary vector method is obscured;
Step S24:User's a broadcast perception alliance matching request, and disclose parameter θ and obscure array D;
Step S25:One of respondent user b agrees to matching, receives parameter θ and obscures array D;
Step S26:User b is by BF obtained by step S22BInformation be added to obscuring in array D of being received in step S25, obtain Binary vector inner product obscures value E;
Step S27:User b is to E obtained by user's a forwarding steps S26;
Step S28:User a receives E, reduction binary vector inner product G;
Step S29:User a calculates the user with one of respondent using the similarity function p (A, B) of polynary bivector set The similarity of b and other respondents select the higher user of similarity to form perception alliance.
5. according to claim 1 be based on the matched intelligent perception method for secret protection of alliance, it is characterised in that:The step The content of attribute vector set and number are by user's sets itself in rapid S21, for indicating all properties of perception user simultaneously Distinguish the preference difference to each attribute;In order to simplify perception alliance matching problem, it is assumed that all users are to some attribute Expression way is unique.
6. according to claim 1 be based on the matched intelligent perception method for secret protection of alliance, it is characterised in that:
The perception data intersection calculating includes the following steps:
Step S31:It is pseudo-random permutation function that function F, which is arranged,;
Step S32:Perception user or the perception obtained perception data collection of the participated in perception task k of alliance i are combined into Si
Step S33:Each perception user perceives the key k that alliance i cooperates with generating function F with aware platform;
Step S34:Each perception user or perception alliance i utilize pseudo-random permutation function Fk(Si) respectively to every in set A element carries out the randomization set S that obtains that treatedi′;
Step S35:The set S as obtained by pseudo-random permutation π upset steps S34i' in order of elements, obtain data set Ti
Step S36:User or perception alliance i are perceived by the data obtained collection T in step S35iUpload to aware platform;
Step S37:The data set intersection I that user or perception alliance i are uploaded respectively is perceived in aware platform calculating step S36 and is deposited Storage carries out data trade with service provider later and obtains income.
7. according to claim 1 be based on the matched intelligent perception method for secret protection of alliance, it is characterised in that:The step It is flat that asynchronous execution in rapid S36, each perception user or perception alliance are uploaded to perception in different times, by its perception data collection Platform obtains output again later;Aware platform only carries out a privacy intersection and calculates and do not have cryptographic operation in the step S37.
8. a kind of intimacy protection system of mobile intelligent perception, which is characterized in that including prestige excitation sensing module, the grand filtering of cloth Device generation module obscures inner product of vectors computing module, perception alliance object determining module, perception data random permutation processing mould Block, data acquisition system uploading module and perception data set calculation module;
The prestige encourages sensing module, for utilizing credit value excitation perception user persistently to participate in perception task and providing high-quality Measure perception data;
The Bloom filter generation module, for the attribute vector set for perceiving user to be generated as binary vector;
It is described to obscure inner product of vectors computing module, in any privacy for not revealing perception alliance matching promoter and respondent Its attribute vector inner product is calculated under the premise of information;
Perception alliance object determining module, the inner product of vectors for matching promoter and respondent according to perception alliance, according to The secondary calculating similarity that vector is gathered between the two, and similarity the higher person is selected to form perception alliance;
The perception data random permutation processing module, the perception number for participating in perception task to perception user or perception alliance According to progress pseudo-random permutation processing;
The data acquisition system uploading module, for the data acquisition system obtained by perception data random permutation processing module to be uploaded to sense Know platform;The perception data set calculation module, by being carried out based on set intersection to set obtained by data acquisition system uploading module It calculates and stores.
9. the intimacy protection system of mobile intelligent perception according to claim 8, it is characterised in that:It is described to obscure in vector In product computing module, perception user obscures the calculating of its binary inner product of vectors using special parameter and random number, but it is joined Number is arranged in next resume module its confusion and is offset by calculating, that is, restores its true binary vector inner product value.
10. the intimacy protection system of mobile intelligent perception according to claim 8, it is characterised in that:The data acquisition system In uploading module, respectively perceives and do not interacted between user or perception alliance, it is each to perceive evil only possible between user or perception alliance Meaning behavior is exactly to change themselves pseudo-random permutation functional value, that is, changes input set;Half credible aware platform only receives Due to pseudo-random permutation function pseudo-randomness without show setting element information functional value.
CN201810085524.3A 2018-01-29 2018-01-29 One kind being based on the matched intelligent perception method for secret protection of alliance and system Pending CN108307344A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810085524.3A CN108307344A (en) 2018-01-29 2018-01-29 One kind being based on the matched intelligent perception method for secret protection of alliance and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810085524.3A CN108307344A (en) 2018-01-29 2018-01-29 One kind being based on the matched intelligent perception method for secret protection of alliance and system

Publications (1)

Publication Number Publication Date
CN108307344A true CN108307344A (en) 2018-07-20

Family

ID=62867094

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810085524.3A Pending CN108307344A (en) 2018-01-29 2018-01-29 One kind being based on the matched intelligent perception method for secret protection of alliance and system

Country Status (1)

Country Link
CN (1) CN108307344A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109068288A (en) * 2018-09-06 2018-12-21 福建师范大学 A kind of method and system selecting mobile intelligent perception incentive mechanism based on more properties users
CN109214205A (en) * 2018-08-01 2019-01-15 安徽师范大学 Position and data-privacy guard method in a kind of intelligent perception based on k- anonymity
CN110119635A (en) * 2019-04-25 2019-08-13 武汉大学 A kind of secret protection incentive mechanism method towards insincere platform
CN112417497A (en) * 2020-11-11 2021-02-26 北京邮电大学 Privacy protection method and device, electronic equipment and storage medium
CN112789843A (en) * 2019-07-05 2021-05-11 谷歌有限责任公司 System and method for privacy protection determination of intersection of sets of user identifiers
CN113222720A (en) * 2021-05-17 2021-08-06 陕西师范大学 Reputation-based privacy protection incentive mechanism method, device and storage medium

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107196926A (en) * 2017-04-29 2017-09-22 河南师范大学 A kind of cloud outsourcing privacy set comparative approach and device

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107196926A (en) * 2017-04-29 2017-09-22 河南师范大学 A kind of cloud outsourcing privacy set comparative approach and device

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109214205A (en) * 2018-08-01 2019-01-15 安徽师范大学 Position and data-privacy guard method in a kind of intelligent perception based on k- anonymity
CN109214205B (en) * 2018-08-01 2021-07-02 安徽师范大学 K-anonymity-based position and data privacy protection method in crowd-sourcing perception
CN109068288A (en) * 2018-09-06 2018-12-21 福建师范大学 A kind of method and system selecting mobile intelligent perception incentive mechanism based on more properties users
CN109068288B (en) * 2018-09-06 2021-04-27 福建师范大学 Method and system for selecting mobile crowd sensing incentive mechanism based on multi-attribute user
CN110119635A (en) * 2019-04-25 2019-08-13 武汉大学 A kind of secret protection incentive mechanism method towards insincere platform
CN110119635B (en) * 2019-04-25 2022-12-16 武汉大学 Privacy protection incentive mechanism method facing to untrusted platform
CN112789843A (en) * 2019-07-05 2021-05-11 谷歌有限责任公司 System and method for privacy protection determination of intersection of sets of user identifiers
CN112417497A (en) * 2020-11-11 2021-02-26 北京邮电大学 Privacy protection method and device, electronic equipment and storage medium
CN112417497B (en) * 2020-11-11 2023-04-25 北京邮电大学 Privacy protection method, device, electronic equipment and storage medium
CN113222720A (en) * 2021-05-17 2021-08-06 陕西师范大学 Reputation-based privacy protection incentive mechanism method, device and storage medium
CN113222720B (en) * 2021-05-17 2023-10-17 陕西师范大学 Privacy protection incentive mechanism method and device based on reputation and storage medium

Similar Documents

Publication Publication Date Title
CN108307344A (en) One kind being based on the matched intelligent perception method for secret protection of alliance and system
CN107707530B (en) Privacy protection method and system for mobile crowd sensing
Chang et al. Incentive mechanism for edge-computing-based blockchain
CN107454441B (en) A kind of method, live streaming Platform Server and the computer readable storage medium of detection direct broadcasting room brush popularity behavior
US20230214870A1 (en) Consumer data and privacy controls in a social networking environment
CN102663047B (en) Method and device for mining social relationship during mobile reading
KR20130069395A (en) Privacy-preserving behavior targeting for digital coupons
CN109727031B (en) Anonymous digital currency transaction supervision method with hidden center
US20150371059A1 (en) Privacy-sensitive ranking of user data
Li et al. Pistis: A privacy-preserving content recommender system for online social communities
CN113127916A (en) Data set processing method, data processing device and storage medium
Bag et al. A privacy-aware decentralized and personalized reputation system
CN105205406B (en) A kind of common factor computational methods of secret protection
CN103827883A (en) Method to control the access of personal data of a user
CN104657133A (en) Single time window task excitation method for mobile crowd-sourcing perception
CN108259185A (en) A kind of group key agreement system and method for group communication moderate resistance leakage
CN107302521A (en) The sending method and method of reseptance of a kind of privacy of user data
CN107316223A (en) A kind of many quotation biddings documents towards many cooperation tasks move intelligent perception motivational techniques
CN106302367B (en) Transaction methods and system
Qamar Federated convolutional model with cyber blockchain in medical image encryption using Multiple Rossler lightweight Logistic sine mapping
CN107330754A (en) A kind of mobile intelligent perception motivational techniques towards cooperative task
Pang et al. Prota: A privacy-preserving protocol for real-time targeted advertising
Qiu et al. An improved collaborative filtering recommendation algorithm for microblog based on community detection
JP2013210933A (en) Recommendation support method, recommendation support device and program
Sekara et al. Temporal limits of privacy in human behavior

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180720