CN109347829A - A kind of intelligent perception network true value discovery method based on secret protection - Google Patents

A kind of intelligent perception network true value discovery method based on secret protection Download PDF

Info

Publication number
CN109347829A
CN109347829A CN201811233139.5A CN201811233139A CN109347829A CN 109347829 A CN109347829 A CN 109347829A CN 201811233139 A CN201811233139 A CN 201811233139A CN 109347829 A CN109347829 A CN 109347829A
Authority
CN
China
Prior art keywords
terminal
true value
cloud server
server
aes
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811233139.5A
Other languages
Chinese (zh)
Other versions
CN109347829B (en
Inventor
祝烈煌
张川
徐畅
张璨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Institute of Technology BIT
Original Assignee
Beijing Institute of Technology BIT
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Institute of Technology BIT filed Critical Beijing Institute of Technology BIT
Priority to CN201811233139.5A priority Critical patent/CN109347829B/en
Publication of CN109347829A publication Critical patent/CN109347829A/en
Application granted granted Critical
Publication of CN109347829B publication Critical patent/CN109347829B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0478Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/045Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC

Abstract

The invention proposes a kind of, and the intelligent perception network true value based on secret protection finds method, belongs to Internet of Things intelligent perception technical field.By guaranteeing the privacy of message using improved Paillier Encryption Algorithm in message is transmitted, guarantee the authentication of user using one-way hash chain, guarantees the high efficiency of output using superlinearity sequence.Wherein, authentication procedures can adapt to the certification demand of terminal device in true value discovery environment, resist the attack of external attacker;Safe true value discovery procedure can obtain true perception data and meet the safety and secret protection of whole system.It is compared with the traditional method, the present invention can protect the data and weight privacy of user, greatly reduce the calculating and bandwidth consumption of terminal device, promote the efficiency and safety of whole system.

Description

A kind of intelligent perception network true value discovery method based on secret protection
Technical field
The present invention relates to a kind of, and the intelligent perception network true value based on secret protection finds method, belongs to Internet of Things gunz sense Know technical field.
Background technique
Intelligent perception network integrates the communication technology, sensor technology etc., is carried by a large amount of mobile terminals various Intelligent terminal terminal (such as smart phone, tablet computer, smartwatch) is perceived, is acquired, transmits, handles each of Covering domain Kind environmental data and social information.With the continuous development of these intelligent terminals and universal, intelligent perception network can be widely applied Highest attention in every field such as environment sensing, communal facility perception, society's perception, by industry and academia.
However, environmental noise, quality of hardware, even malice deception etc. due to, the collected perception number of mobile terminal According to usually false.For example, when collecting roadway congestion information, in order to obtain preferably trip experience, some terminal meetings The traffic information of mistake is provided.These error messages can mislead other pedestrians and vehicle, and even they bring life danger.Cause This is highly desirable to screen collected data when carrying out intelligent perception, to obtain true perception data.For Solution this problem, in recent years, true value discovery are widely studied.Although the realization algorithm of true value discovery is varied, its A most fundamental principle is all followed, as soon as that is, if the data of terminal offer are closer to truthful data, then the terminal It is endowed a higher weight;If a terminal has higher weight, when calculating true value, to the meter of true value Contribution is calculated than higher.
True value discovery technique can be precisely calculated true perception data, however, existing true value finds work but very The secret protection of terminal is considered less.In fact, terminal will not energetically participate in various if the privacy of people cannot be protected Perception task.Hospital can be helped preferably to provide medical services for example, collecting the feedback information of drug, but be possible to reveal The health status of terminal.For another example, answer is collected to the public, can more effectively solves some stubborn problems, but be possible to Reveal the education level of participation terminal.Therefore, it is very necessary for designing the true value discovery method an of highly effective and safe.
Method is found for safe and efficient true value, is all conducted extensive research both at home and abroad.For example, Miao et al. exists A true value discovery secret protection scheme based on cloud is proposed within 2015, threshold Paillier Encryption Algorithm is utilized The perception data of terminal is encrypted, by the way that encryption key distribution is completed decryption oprerations to t terminal.Although the program can be very The privacy of terminal is protected well, but brings huge computing cost to mobile terminal terminal.The Zhou etc. of Shanghai Communications University People proposed the data aggregation scheme based on wearable wireless communication terminal in 2015.In this scenario, each terminal It is assigned fixed a key and random number all to disturb to initial data.Based on this scheme, University of Electronic Science and Technology Xu et al. proposed the true value discovery scheme an of highly effective and safe in 2017, and each terminal distribution random number is come to original number According to being encrypted, to initial data and encrypted by the way that the sum of random number is sent to Cloud Server.However, if certain Terminal cannot submit data in time, their scheme just cisco unity malfunction.In order to improve efficiency, Miao et al. was mentioned in 2017 One is gone out and algorithm is found based on the lightweight true value for not conspiring cloud platform.Similar with the scheme of Xu et al., perception data is same It is encrypted using random number.Specifically, noisy data is uploaded to cloud a, and random number is uploaded to cloud b, passes through the cooperation of a and b To calculate true value.However the problem of above scheme, is, cloud b can be restored the perception data of terminal with random number.Cause This, currently still lacks safe and efficient, fault tolerant a true value discovery method.
Summary of the invention
It is an object of the invention to for the authenticity of perception data and the privacy of terminal in intelligent perception network Protection proposes a kind of intelligent perception network true value discovery method based on secret protection.The basic principle is that by being passed in message The defeated middle privacy for guaranteeing message using improved Paillier Encryption Algorithm guarantees terminal using one-way hash chain Authentication guarantees the high efficiency of output using superlinearity sequence.
The purpose of the present invention is what is be achieved through the following technical solutions.
A kind of intelligent perception network true value discovery method based on secret protection, comprising the following steps:
Step 1: terminal is registered to trust center, trust center selects system security parameter ξ, and according to this security parameter Two Big primes p and q are generated, wherein p=2p '+1, the digit of q=2q '+1, p ' and q ' are ξ;Trust center calculates n in turn =pq, λ=p ' q ';Terminal will be registered before participation task in trust center, and obtain relevant key hn, wherein h is random Number;Obtain a random number zk;Obtain superlinearity sequenceTrust center by the key λ of decryption and Superlinearity sequenceIt is sent to Cloud Server.
Wherein, superlinearity sequenceCreate-rule it is as follows: it is assumed that the weight of terminal k be wk, observation to observed entity m Data areIt is assumed that the maximum value of the weighted data sum of most K terminals is not more than Q in a gunz perception task, i.e.,ThenInJ ∈ [2, M], wherein M represents most M sights Survey entity.
Meanwhile trust center selects system security parameter l, and generates a secure hash function according to this security parameterTrust center is that each terminal k distributes a hash chain Hk, and by the Hash head of all terminalsIt is sent to mist server.Wherein, k represents k-th of terminal in intelligent perception;Hash chain HkRepresent k-th of terminal The Hash array held, wherein cryptographic HashW is iteration total degree.
Step 2: mist server generates the true value of all observed entities at randomAnd send it to all ginsengs With the terminal of task.Each terminal calculates the Euclidean distance of true value and observation, i.e.,Its InGC group connector k to the observation of entity m, Then, terminal selects random number rk The distance is encrypted Ciphertext is decrypted in Cloud Server in order to prevent, respectively Terminal carries out AES symmetric cryptography to ciphertext, and wherein the symmetric key of iteration j isCiphertext is AES (E (sk)).After executing double encryption operations, terminal is by ciphertext AES (E (sk)) and authentication information HkjIt is uploaded to mist service Device.
Step 3: verifying the identity of terminal by the preceding cryptographic Hash once received after mist server receives message, that is, seeing Examine HkjWhether it is equal toIf the two is equal, it is verified, otherwise authentication does not pass through. After having verified terminal identity, mist server is decrypted all ciphertexts received according to the AES symmetric key of each terminal, and right It is obtained after decryptionTire out and multiply polymerization, that is, calculatesAfter the completion of polymerization, mist server will be tied Fruit is sent to Cloud Server.Cloud Server decrypts polymerization result using λ, i.e.,Obtain all terminals away from From with that is,And decrypted result is sent to each terminal.Terminal calculates respective weight according to polymerization result
Step 4: being based on weight, terminal calculates the weighted value of all observed entities, and uses the superlinearity sequence of setting The weighted value of each entity is polymerize, i.e., Later, Terminal selects random number rk2To swkIt is encrypted to obtain Select random number rk3 To weight wkIt is encrypted to obtain Terminal carries out AES encryption to the two ciphertexts, Obtain AES (E (swk)) and AES (E (wk)), and the two ciphertexts are uploaded to mist server.
Step 5: first ciphertext is decrypted to obtain using the AES symmetric key of each terminal after mist server receives ciphertext E(swk) and E (wk).Mist server tire out to the weighted value and weight of terminal in turn multiplies polymerization, i.e.,WithAnd result is sent to Cloud Server.After Cloud Server receives ciphertext, restored using key λ, i.e.,WithAs a result it isWithThereafter, Cloud Server utilizes super Linear order is to the weighted values of all observed entities and restores, obtain each observed entity weighted value and, i.e.,Cloud Server updates true valueAnd send it to each terminal.
Wherein the weighted value restoring operation of each observed entity is defined as follows:
Cloud Server is decrypted to obtain DefinitionCloud Server is to XmCarry out am Modulo operation come restore observed entity m weighted data and, it may be assumed that
Step 6: terminal repeats step 2 to step 5 according to updated true value.
Step 7: the above process terminates when the true value difference before and after iteration is no more than given threshold.So far safety is completed Efficient true value discovery.The given threshold is preferably 0.0001.
The fault-tolerant realization of complex environment specifically, when certain terminals because the reasons such as network situation or terminal are damaged without When method continues to upload data, because each terminal is encrypted using identical public key, each other and onrelevant, therefore certain The loss of a little terminal encryption data can't impact the final result of system.
Beneficial effect
The method of the present invention has the following beneficial effects: compared with existing safe true value discovery technique
1. this method is based on existing true value and finds algorithm, encrypted in message transmitting procedure using improved Paillier Algorithm ensure that the privacy of message and the efficiency of encryption;
2. agreement is synchronized using the number of iterations, ensure that the data received every time all is needed for current iteration number Data, ensure that can resist Replay Attack in the larger situation of message transmission time delay;
3. agreement uses one-way hash chain, guarantees that mist server can verify the identity of terminal, resist external attack;
4. agreement polymerize weighted data using superlinearity sequence, reduce calculating and the communication overhead of terminal;
By the performance test on true mobile terminal, this programme is compared with traditional public key scheme, can be with Obtain: when observed entity is at 5 to 25, it is 0.020s to 0.037s that this programme, which calculates time-consuming, and communication overhead arrives for 0.041KB 0.061KB;It is 0.151s to 0.219s that traditional scheme, which calculates time-consuming, and time-consuming communication is 2.712KB to 8.746KB.
By the performance test on mist server and Cloud Server, this programme is compared with traditional public key scheme Compared with, it can be deduced that, it is assumed that there are 1000 terminals, when observed entity is at 10 to 100, calculating of this programme in server end Expense is 0.428s to 0.775s, and when observed entity is fixed on 100, for terminal at 100 to 1000, this programme is in server end Computing cost be 0.096s to 0.428s;It being corresponding to it, the calculating time-consuming of traditional scheme is 280.03s to 1269.72s, 244.283s to 280.03s.
Detailed description of the invention
Fig. 1 is system flow chart of the invention;
Fig. 2 is the flow chart of calculating process of the present invention;
Fig. 3 is the present invention when physical quantities are 5 to 25, the calculating of this programme and traditional scheme on a mobile terminal Expense compares figure;
Fig. 4 is the present invention when terminal quantity is 100 to 1000, and this programme and traditional scheme are opened in the calculating of server end Pin compares figure;
Fig. 5 is the present invention when physical quantities are 100 to 500, and this programme and traditional scheme are opened in the calculating of server end Pin compares figure.
Specific embodiment
With reference to the accompanying drawings and examples, the method for the present invention is described in further details.
Embodiment
The present embodiment illustrates specific implementation process of the method for the present invention under intelligent perception scene.
It tests the Android mobile phone at one configured with 1.5GHz 2GB RAM and two is configured with 2.5GHz Intel Core It is carried out on the notebook of i7 16GB RAM.
Fig. 1 is the system flow chart of the method for the present invention, and Fig. 2 is the specific implementation process of true value discovery process, from Fig. 1 and figure 2 find that the process of system is as follows as can be seen that terminal is added to true value:
Step a, terminal is registered to trust center, obtains hash chain HkWith relevant key (the public key h of PailliernWith one A random number zk).At the same time, trust center sends the Hash head of all terminals to mist serverAnd random numberThe private key λ of decryption is sent to Cloud Server;
Step b, after terminal receives information as above, the symmetric key of iteration j process is generated according to hash chainAccording to true value, the distance of terminal calculating observation value and true value, and Paillier public key is carried out to this distance and is added Close and symmetric key encryption.After the completion of calculating, the identity information of terminal ciphertext and terminal, i.e. AES (E (sk)) and Hkj, send To mist server;
Step c, it after mist server receives data, first verifies that the identity of terminal, is calculated according to cryptographic Hash and random number every The symmetric key of a terminalAnd ciphertext is decrypted to obtain by the close of Pailier public key encryption with this ciphertext Literary E (sk).After the completion of decryption, mist server, which tire out to all ciphertext data, multiplies polymerization i.e.Concurrently It send to Cloud Server;
Step d, it after Cloud Server receives data, is decrypted to obtain using private key λAnd result is sent to All terminals;
Step e, terminal calculates respective weight information w according to the sum of the distance receivedk, using superlinearity sequence by institute Some weighted datas are polymerize.Then, terminal carries out Paillier public key encryption and symmetric key to weight and weighted data Encryption, obtains ciphertext AES (E (wk)), AES (E (swk)) and identity information.After completing the above operation, terminal sends out these information It send to mist server;
Step f, after mist server receives these information, first check for the legitimacy of terminal, and execute key decryption and it is close Literary converging operation obtainsWithAfter the completion of calculating, the data after polymerization are sent to cloud service by terminal Device;
Step g, the accumulation ciphertext received is decrypted in Cloud Server, obtain weight and and polymerization weighted information, Cloud Server uses superlinearity sequence by all terminal weighted datas of each entity and reduction.Based on weight and and each reality The weighted data of body and, Cloud Server calculates the true value of each entity, and sends it to terminal.
Step h, step b to step g is repeated, when the true value difference before and after iteration is no more than given threshold, iteration ends.
Fig. 3 is the efficiency line chart that Android mobile phone participates in true value discovery procedure, and abscissa is the quantity of observed entity, indulges and sits Mark is calculating time-consuming in total.The line of black is that the calculating under the present invention is time-consuming, and red line is the time delay under traditional scheme.From Fig. 3 can be seen that compared with traditional scheme, and a kind of safe and efficient true value discovery agreement of the invention is at Android mobile phone end It is lower to calculate time-consuming, it is more efficient.
Fig. 4 is that cloud, mist server participate in the efficiency line chart of true value discovery procedure, set observed entity quantity as 100, cross Coordinate is terminal quantity, and ordinate is to calculate time-consuming.From fig. 4, it can be seen that compared with traditional scheme, with the increasing of terminal quantity Add, the calculating time-consuming of two schemes is all increasing, but a kind of safe and efficient true value discovery agreement of the invention is in cloud, mist service The calculating time-consuming at device end is lower, more efficient, such as when terminal quantity is 1000, the calculating time-consuming of this programme is 280.03s, And the calculating time-consuming of traditional scheme is only 0.428s.
Fig. 5 is that cloud, mist server participate in the efficiency line chart of true value discovery procedure, sets participation number as 1000, horizontal seat Physical quantities are marked, ordinate is to calculate time-consuming.From fig. 5, it can be seen that the calculating of two schemes consumes with the growth of physical quantities When all increasing.Compared with traditional scheme, a kind of of the invention safe and efficient true value discovery agreement is in cloud, mist server end It is lower to calculate time-consuming, it is more efficient.Specifically, when physical quantities are 500, the calculating time-consuming of this programme is 0.775s, and The calculating time-consuming of traditional scheme needs 1269.72s.
The above is only a preferred embodiment of the present invention, it is noted that for the ordinary skill people of the art For member, without departing from the principle of the present invention, several improvement can also be made, or to part of technical characteristic into Row equivalent replacement, these are improved and replacement also should be regarded as protection scope of the present invention.

Claims (2)

1. a kind of intelligent perception network true value based on secret protection finds method, which comprises the following steps:
Step 1: terminal is registered to trust center, trust center selects system security parameter ξ, and is generated according to this security parameter The digit of two Big primes p and q, wherein p=2p '+1, q=2q '+1, p ' and q ' are ξ;Trust center calculates n=pq in turn, λ=p ' q ';Terminal will be registered before participation task in trust center, and obtain relevant key hn, wherein h is random number;It obtains Take a random number zk;Obtain superlinearity sequenceTrust center is by the key λ and superlinearity of decryption SequenceIt is sent to Cloud Server;
Wherein, superlinearity sequenceCreate-rule it is as follows: it is assumed that the weight of terminal k be wk, to the observation data of observed entity m ForIt is assumed that the maximum value of the weighted data sum of most K terminals is not more than Q in a gunz perception task, i.e.,ThenInWherein M represents most M Observed entity;
Meanwhile trust center selects system security parameter l, and generates a secure hash function according to this security parameterTrust center is that each terminal k distributes a hash chain Hk, and by the Hash head of all terminalsIt is sent to mist server;Wherein, k represents k-th of terminal in intelligent perception;Hash chain HkRepresent k-th of terminal The Hash array held, wherein cryptographic Hash W is iteration total degree;
Step 2: mist server generates the true value of all observed entities at randomAnd it sends it to all participations and appoints The terminal of business;Each terminal calculates the Euclidean distance of true value and observation, i.e., Wherein GC group connector k to the observation of entity m,Then, terminal selects random number rkTo this away from From being encryptedTo prevent Cloud Server that ciphertext is decrypted, each terminal is to close Text carries out AES symmetric cryptography, and wherein the symmetric key of iteration j isCiphertext is AES (E (sk));It is holding After row double encryption operations, terminal is by ciphertext AES (E (sk)) and authentication information HkjIt is uploaded to mist server;
Step 3: the identity of terminal is verified by the preceding cryptographic Hash once received after mist server receives message, i.e. observation Hkj Whether it is equal toIf the two is equal, it is verified, otherwise authentication does not pass through;Verifying After complete terminal identity, mist server is decrypted all ciphertexts received according to the AES symmetric key of each terminal, and to decryption It obtains afterwardsTire out and multiply polymerization, that is, calculatesAfter the completion of polymerization, mist server sends out result It send to Cloud Server;Cloud Server decrypts polymerization result using λ, i.e.,Obtain the distance of all terminals With that is,And decrypted result is sent to each terminal;Terminal calculates respective weight according to polymerization result
Step 4: being based on weight, terminal calculates the weighted value of all observed entities, and uses the superlinearity sequence of settingTo each The weighted value of entity is polymerize, i.e., Later, terminal Select random number rk2To swkIt is encrypted to obtainSelect random number rk3To power Weight wkIt is encrypted to obtainTerminal carries out AES encryption to the two ciphertexts, obtains AES(E(swk)) and AES (E (wk)), and the two ciphertexts are uploaded to mist server;
Step 5: first ciphertext is decrypted to obtain E using the AES symmetric key of each terminal after mist server receives ciphertext (swk) and E (wk);Mist server tire out to the weighted value and weight of terminal in turn multiplies polymerization, i.e.,WithAnd result is sent to Cloud Server;After Cloud Server receives ciphertext, restored using code key λ, i.e.,WithAs a result it isWithThereafter, Cloud Server utilizes super Linear order is to the weighted values of all observed entities and restores, obtain each observed entity weighted value and, i.e.,Cloud Server updates true valueAnd send it to each terminal;
Wherein, the weighted value restoring operation of each observed entity is defined as follows:
Cloud Server is decrypted to obtainDefinitionCloud Server is to XmCarry out amModulus Operate restore observed entity m weighted data and, it may be assumed that
Step 6: terminal repeats step 2 to step 5 according to updated true value;
Step 7: the above process terminates when the true value difference before and after iteration is no more than given threshold.
2. a kind of intelligent perception network true value based on secret protection as described in claim 1 finds method, which is characterized in that Given threshold described in step 7 is 0.0001.
CN201811233139.5A 2018-10-23 2018-10-23 Group intelligence perception network truth value discovery method based on privacy protection Active CN109347829B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811233139.5A CN109347829B (en) 2018-10-23 2018-10-23 Group intelligence perception network truth value discovery method based on privacy protection

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811233139.5A CN109347829B (en) 2018-10-23 2018-10-23 Group intelligence perception network truth value discovery method based on privacy protection

Publications (2)

Publication Number Publication Date
CN109347829A true CN109347829A (en) 2019-02-15
CN109347829B CN109347829B (en) 2020-06-26

Family

ID=65311556

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811233139.5A Active CN109347829B (en) 2018-10-23 2018-10-23 Group intelligence perception network truth value discovery method based on privacy protection

Country Status (1)

Country Link
CN (1) CN109347829B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110008752A (en) * 2019-04-12 2019-07-12 北京理工大学 A kind of platooning's evaluation method based on secret protection
CN110198216A (en) * 2019-07-10 2019-09-03 安徽大学 A kind of increment true value discovery method, apparatus, computer equipment and storage medium for protecting privacy
CN111585990A (en) * 2020-04-26 2020-08-25 安徽师范大学 Mobile crowd sensing privacy protection truth value discovery method based on safety summation
CN112104609A (en) * 2020-08-20 2020-12-18 电子科技大学 Method for verifiable privacy-aware true phase discovery in a mobile crowd-sourcing awareness system
CN112787809A (en) * 2020-12-31 2021-05-11 华南理工大学 Efficient crowd sensing data stream privacy protection truth value discovery method
CN113553614A (en) * 2021-06-29 2021-10-26 福建师范大学 Privacy protection mobile crowd-sourcing perception method based on reinforcement learning
CN113596015A (en) * 2021-07-27 2021-11-02 同济大学 Identity authentication method supporting privacy protection in crowd sensing based on fog calculation

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120278297A1 (en) * 2011-04-29 2012-11-01 Microsoft Corporation Semi-supervised truth discovery
CN105187139A (en) * 2015-09-30 2015-12-23 中国人民解放军后勤工程学院 Outdoor wireless received signal strength (RSS) map building method based on crowd sensing
US20160050541A1 (en) * 2014-05-29 2016-02-18 Egypt-Japan University Of Science And Technology Fine-Grained Indoor Location-Based Social Network
CN105407482A (en) * 2015-11-04 2016-03-16 上海交通大学 Protection method for user location privacy in mobile crowd sensing network
CN105844168A (en) * 2015-01-14 2016-08-10 清华大学 Method and device for privacy protection used for crowd sensing
CN105912602A (en) * 2016-04-05 2016-08-31 南京邮电大学 True-value finding method based on entity attributes
CN107749836A (en) * 2017-09-15 2018-03-02 江苏大学 User oriented secret protection and the mobility aware system and its mobile awareness method of data reliability
CN108494760A (en) * 2018-03-14 2018-09-04 安徽大学 A kind of intelligent perception true value discovery method of protection privacy

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120278297A1 (en) * 2011-04-29 2012-11-01 Microsoft Corporation Semi-supervised truth discovery
US20160050541A1 (en) * 2014-05-29 2016-02-18 Egypt-Japan University Of Science And Technology Fine-Grained Indoor Location-Based Social Network
CN105844168A (en) * 2015-01-14 2016-08-10 清华大学 Method and device for privacy protection used for crowd sensing
CN105187139A (en) * 2015-09-30 2015-12-23 中国人民解放军后勤工程学院 Outdoor wireless received signal strength (RSS) map building method based on crowd sensing
CN105407482A (en) * 2015-11-04 2016-03-16 上海交通大学 Protection method for user location privacy in mobile crowd sensing network
CN105912602A (en) * 2016-04-05 2016-08-31 南京邮电大学 True-value finding method based on entity attributes
CN107749836A (en) * 2017-09-15 2018-03-02 江苏大学 User oriented secret protection and the mobility aware system and its mobile awareness method of data reliability
CN108494760A (en) * 2018-03-14 2018-09-04 安徽大学 A kind of intelligent perception true value discovery method of protection privacy

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
C. MIAO,W. JIANG,L. SU,Y. LI,S. GUO,Z. QIN,H. XIAO,J. GAO,K. REN: "Cloud-enabled privacy-preserving truth discovery in crowd sensing systems", 《PROCEEDINGS OF THE 13TH ACM CONFERENCE ON EMBEDDED NETWORKED SENSOR SYSTEMS, SENSYS 2015》 *
CHENGLIN MIAO;LU SU;WENJUN JIANG;YALIANG LI;MIAOMIAO TIAN: "A lightweight privacy-preserving truth discovery framework for mobile crowd sensing systems", 《IEEE INFOCOM 2017 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS》 *
孙洪山,陆雪,徐嵘,程孝泗,吴佩敏: "一种高效的隐私保护群智感知真值发现机制", 《物联网技术》 *
李天义, 谷峪, 马茜, 李芳芳, 于戈: "一种多源感知数据流上的连续真值发现技术", 《软件学报》 *

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110008752A (en) * 2019-04-12 2019-07-12 北京理工大学 A kind of platooning's evaluation method based on secret protection
CN110008752B (en) * 2019-04-12 2020-10-09 北京理工大学 Vehicle formation evaluation method based on privacy protection
CN110198216A (en) * 2019-07-10 2019-09-03 安徽大学 A kind of increment true value discovery method, apparatus, computer equipment and storage medium for protecting privacy
CN110198216B (en) * 2019-07-10 2022-03-04 安徽大学 Incremental truth value discovery method and device for protecting privacy, computer equipment and storage medium
CN111585990A (en) * 2020-04-26 2020-08-25 安徽师范大学 Mobile crowd sensing privacy protection truth value discovery method based on safety summation
CN111585990B (en) * 2020-04-26 2022-04-15 安徽师范大学 Mobile crowd sensing privacy protection truth value discovery method based on safety summation
CN112104609A (en) * 2020-08-20 2020-12-18 电子科技大学 Method for verifiable privacy-aware true phase discovery in a mobile crowd-sourcing awareness system
CN112104609B (en) * 2020-08-20 2021-12-03 电子科技大学 Method for verifiable privacy-aware truth discovery in mobile crowd-sourcing awareness systems
CN112787809A (en) * 2020-12-31 2021-05-11 华南理工大学 Efficient crowd sensing data stream privacy protection truth value discovery method
CN113553614A (en) * 2021-06-29 2021-10-26 福建师范大学 Privacy protection mobile crowd-sourcing perception method based on reinforcement learning
CN113553614B (en) * 2021-06-29 2023-07-14 福建师范大学 Privacy protection mobile crowd intelligent sensing method based on reinforcement learning
CN113596015A (en) * 2021-07-27 2021-11-02 同济大学 Identity authentication method supporting privacy protection in crowd sensing based on fog calculation

Also Published As

Publication number Publication date
CN109347829B (en) 2020-06-26

Similar Documents

Publication Publication Date Title
CN111294366B (en) Statistical analysis method for aggregation of encrypted data for resisting secret key leakage in smart power grid
CN109347829A (en) A kind of intelligent perception network true value discovery method based on secret protection
Wang et al. Fault-tolerant multisubset aggregation scheme for smart grid
Chen et al. PDAFT: A privacy-preserving data aggregation scheme with fault tolerance for smart grid communications
CN105812369B (en) A kind of traceable anonymous authentication method based on elliptic curve
Aman et al. Low power data integrity in IoT systems
Zuo et al. Privacy-preserving multidimensional data aggregation scheme without trusted authority in smart grid
CN111092717B (en) Group authentication-based safe and reliable communication method in smart home environment
CN108964919A (en) The lightweight anonymous authentication method with secret protection based on car networking
CN110138538A (en) The smart grid security and secret protection data aggregation method calculated based on mist
CN104270249A (en) Signcryption method from certificateless environment to identity environment
CN104219056A (en) Privacy protection type real-time electric charge collecting method for intelligent power grid
CN105245326A (en) Intelligent power grid safety communication method based on combination cipher
CN103118363B (en) A kind of method of mutual biography secret information, system, terminal unit and platform device
CN110830251B (en) Method for safely transmitting electricity consumption information in ubiquitous power Internet of things environment
CN104301108A (en) Signcryption method based from identity environment to certificateless environment
CN105163309A (en) Method for secure communication of wireless sensor network based on combined password
CN105577356A (en) Data collection method in smart power grid based on user privacy protection
Zhang et al. Efficient and privacy-aware power injection over AMI and smart grid slice in future 5G networks
CN104954390A (en) Cloud storage integrity detection method for recovering lost secret keys and system applying cloud storage integrity detection method
Zhang et al. An energy-efficient authentication scheme based on Chebyshev chaotic map for smart grid environments
CN110489982A (en) A kind of smart grid data aggregate and encryption method with forward security
CN108989309A (en) Encryption communication method and its encrypted communication device based on narrowband Internet of Things
Xiong et al. Scalable and forward secure network attestation with privacy-preserving in cloud-assisted internet of things
CN104636672A (en) Security data reporting method and security data reporting system on basis of Hash trees and anonymity technologies

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant