CN109347829A - A kind of intelligent perception network true value discovery method based on secret protection - Google Patents
A kind of intelligent perception network true value discovery method based on secret protection Download PDFInfo
- Publication number
- CN109347829A CN109347829A CN201811233139.5A CN201811233139A CN109347829A CN 109347829 A CN109347829 A CN 109347829A CN 201811233139 A CN201811233139 A CN 201811233139A CN 109347829 A CN109347829 A CN 109347829A
- Authority
- CN
- China
- Prior art keywords
- terminal
- true value
- cloud server
- server
- aes
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0478—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/045—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0631—Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
Abstract
The invention proposes a kind of, and the intelligent perception network true value based on secret protection finds method, belongs to Internet of Things intelligent perception technical field.By guaranteeing the privacy of message using improved Paillier Encryption Algorithm in message is transmitted, guarantee the authentication of user using one-way hash chain, guarantees the high efficiency of output using superlinearity sequence.Wherein, authentication procedures can adapt to the certification demand of terminal device in true value discovery environment, resist the attack of external attacker;Safe true value discovery procedure can obtain true perception data and meet the safety and secret protection of whole system.It is compared with the traditional method, the present invention can protect the data and weight privacy of user, greatly reduce the calculating and bandwidth consumption of terminal device, promote the efficiency and safety of whole system.
Description
Technical field
The present invention relates to a kind of, and the intelligent perception network true value based on secret protection finds method, belongs to Internet of Things gunz sense
Know technical field.
Background technique
Intelligent perception network integrates the communication technology, sensor technology etc., is carried by a large amount of mobile terminals various
Intelligent terminal terminal (such as smart phone, tablet computer, smartwatch) is perceived, is acquired, transmits, handles each of Covering domain
Kind environmental data and social information.With the continuous development of these intelligent terminals and universal, intelligent perception network can be widely applied
Highest attention in every field such as environment sensing, communal facility perception, society's perception, by industry and academia.
However, environmental noise, quality of hardware, even malice deception etc. due to, the collected perception number of mobile terminal
According to usually false.For example, when collecting roadway congestion information, in order to obtain preferably trip experience, some terminal meetings
The traffic information of mistake is provided.These error messages can mislead other pedestrians and vehicle, and even they bring life danger.Cause
This is highly desirable to screen collected data when carrying out intelligent perception, to obtain true perception data.For
Solution this problem, in recent years, true value discovery are widely studied.Although the realization algorithm of true value discovery is varied, its
A most fundamental principle is all followed, as soon as that is, if the data of terminal offer are closer to truthful data, then the terminal
It is endowed a higher weight;If a terminal has higher weight, when calculating true value, to the meter of true value
Contribution is calculated than higher.
True value discovery technique can be precisely calculated true perception data, however, existing true value finds work but very
The secret protection of terminal is considered less.In fact, terminal will not energetically participate in various if the privacy of people cannot be protected
Perception task.Hospital can be helped preferably to provide medical services for example, collecting the feedback information of drug, but be possible to reveal
The health status of terminal.For another example, answer is collected to the public, can more effectively solves some stubborn problems, but be possible to
Reveal the education level of participation terminal.Therefore, it is very necessary for designing the true value discovery method an of highly effective and safe.
Method is found for safe and efficient true value, is all conducted extensive research both at home and abroad.For example, Miao et al. exists
A true value discovery secret protection scheme based on cloud is proposed within 2015, threshold Paillier Encryption Algorithm is utilized
The perception data of terminal is encrypted, by the way that encryption key distribution is completed decryption oprerations to t terminal.Although the program can be very
The privacy of terminal is protected well, but brings huge computing cost to mobile terminal terminal.The Zhou etc. of Shanghai Communications University
People proposed the data aggregation scheme based on wearable wireless communication terminal in 2015.In this scenario, each terminal
It is assigned fixed a key and random number all to disturb to initial data.Based on this scheme, University of Electronic Science and Technology
Xu et al. proposed the true value discovery scheme an of highly effective and safe in 2017, and each terminal distribution random number is come to original number
According to being encrypted, to initial data and encrypted by the way that the sum of random number is sent to Cloud Server.However, if certain
Terminal cannot submit data in time, their scheme just cisco unity malfunction.In order to improve efficiency, Miao et al. was mentioned in 2017
One is gone out and algorithm is found based on the lightweight true value for not conspiring cloud platform.Similar with the scheme of Xu et al., perception data is same
It is encrypted using random number.Specifically, noisy data is uploaded to cloud a, and random number is uploaded to cloud b, passes through the cooperation of a and b
To calculate true value.However the problem of above scheme, is, cloud b can be restored the perception data of terminal with random number.Cause
This, currently still lacks safe and efficient, fault tolerant a true value discovery method.
Summary of the invention
It is an object of the invention to for the authenticity of perception data and the privacy of terminal in intelligent perception network
Protection proposes a kind of intelligent perception network true value discovery method based on secret protection.The basic principle is that by being passed in message
The defeated middle privacy for guaranteeing message using improved Paillier Encryption Algorithm guarantees terminal using one-way hash chain
Authentication guarantees the high efficiency of output using superlinearity sequence.
The purpose of the present invention is what is be achieved through the following technical solutions.
A kind of intelligent perception network true value discovery method based on secret protection, comprising the following steps:
Step 1: terminal is registered to trust center, trust center selects system security parameter ξ, and according to this security parameter
Two Big primes p and q are generated, wherein p=2p '+1, the digit of q=2q '+1, p ' and q ' are ξ;Trust center calculates n in turn
=pq, λ=p ' q ';Terminal will be registered before participation task in trust center, and obtain relevant key hn, wherein h is random
Number;Obtain a random number zk;Obtain superlinearity sequenceTrust center by the key λ of decryption and
Superlinearity sequenceIt is sent to Cloud Server.
Wherein, superlinearity sequenceCreate-rule it is as follows: it is assumed that the weight of terminal k be wk, observation to observed entity m
Data areIt is assumed that the maximum value of the weighted data sum of most K terminals is not more than Q in a gunz perception task, i.e.,ThenInJ ∈ [2, M], wherein M represents most M sights
Survey entity.
Meanwhile trust center selects system security parameter l, and generates a secure hash function according to this security parameterTrust center is that each terminal k distributes a hash chain Hk, and by the Hash head of all terminalsIt is sent to mist server.Wherein, k represents k-th of terminal in intelligent perception;Hash chain HkRepresent k-th of terminal
The Hash array held, wherein cryptographic HashW is iteration total degree.
Step 2: mist server generates the true value of all observed entities at randomAnd send it to all ginsengs
With the terminal of task.Each terminal calculates the Euclidean distance of true value and observation, i.e.,Its
InGC group connector k to the observation of entity m, Then, terminal selects random number rk
The distance is encrypted Ciphertext is decrypted in Cloud Server in order to prevent, respectively
Terminal carries out AES symmetric cryptography to ciphertext, and wherein the symmetric key of iteration j isCiphertext is AES (E
(sk)).After executing double encryption operations, terminal is by ciphertext AES (E (sk)) and authentication information HkjIt is uploaded to mist service
Device.
Step 3: verifying the identity of terminal by the preceding cryptographic Hash once received after mist server receives message, that is, seeing
Examine HkjWhether it is equal toIf the two is equal, it is verified, otherwise authentication does not pass through.
After having verified terminal identity, mist server is decrypted all ciphertexts received according to the AES symmetric key of each terminal, and right
It is obtained after decryptionTire out and multiply polymerization, that is, calculatesAfter the completion of polymerization, mist server will be tied
Fruit is sent to Cloud Server.Cloud Server decrypts polymerization result using λ, i.e.,Obtain all terminals away from
From with that is,And decrypted result is sent to each terminal.Terminal calculates respective weight according to polymerization result
Step 4: being based on weight, terminal calculates the weighted value of all observed entities, and uses the superlinearity sequence of setting
The weighted value of each entity is polymerize, i.e., Later,
Terminal selects random number rk2To swkIt is encrypted to obtain Select random number rk3
To weight wkIt is encrypted to obtain Terminal carries out AES encryption to the two ciphertexts,
Obtain AES (E (swk)) and AES (E (wk)), and the two ciphertexts are uploaded to mist server.
Step 5: first ciphertext is decrypted to obtain using the AES symmetric key of each terminal after mist server receives ciphertext
E(swk) and E (wk).Mist server tire out to the weighted value and weight of terminal in turn multiplies polymerization, i.e.,WithAnd result is sent to Cloud Server.After Cloud Server receives ciphertext, restored using key λ, i.e.,WithAs a result it isWithThereafter, Cloud Server utilizes super
Linear order is to the weighted values of all observed entities and restores, obtain each observed entity weighted value and, i.e.,Cloud Server updates true valueAnd send it to each terminal.
Wherein the weighted value restoring operation of each observed entity is defined as follows:
Cloud Server is decrypted to obtain
DefinitionCloud Server is to XmCarry out am
Modulo operation come restore observed entity m weighted data and, it may be assumed that
Step 6: terminal repeats step 2 to step 5 according to updated true value.
Step 7: the above process terminates when the true value difference before and after iteration is no more than given threshold.So far safety is completed
Efficient true value discovery.The given threshold is preferably 0.0001.
The fault-tolerant realization of complex environment specifically, when certain terminals because the reasons such as network situation or terminal are damaged without
When method continues to upload data, because each terminal is encrypted using identical public key, each other and onrelevant, therefore certain
The loss of a little terminal encryption data can't impact the final result of system.
Beneficial effect
The method of the present invention has the following beneficial effects: compared with existing safe true value discovery technique
1. this method is based on existing true value and finds algorithm, encrypted in message transmitting procedure using improved Paillier
Algorithm ensure that the privacy of message and the efficiency of encryption;
2. agreement is synchronized using the number of iterations, ensure that the data received every time all is needed for current iteration number
Data, ensure that can resist Replay Attack in the larger situation of message transmission time delay;
3. agreement uses one-way hash chain, guarantees that mist server can verify the identity of terminal, resist external attack;
4. agreement polymerize weighted data using superlinearity sequence, reduce calculating and the communication overhead of terminal;
By the performance test on true mobile terminal, this programme is compared with traditional public key scheme, can be with
Obtain: when observed entity is at 5 to 25, it is 0.020s to 0.037s that this programme, which calculates time-consuming, and communication overhead arrives for 0.041KB
0.061KB;It is 0.151s to 0.219s that traditional scheme, which calculates time-consuming, and time-consuming communication is 2.712KB to 8.746KB.
By the performance test on mist server and Cloud Server, this programme is compared with traditional public key scheme
Compared with, it can be deduced that, it is assumed that there are 1000 terminals, when observed entity is at 10 to 100, calculating of this programme in server end
Expense is 0.428s to 0.775s, and when observed entity is fixed on 100, for terminal at 100 to 1000, this programme is in server end
Computing cost be 0.096s to 0.428s;It being corresponding to it, the calculating time-consuming of traditional scheme is 280.03s to 1269.72s,
244.283s to 280.03s.
Detailed description of the invention
Fig. 1 is system flow chart of the invention;
Fig. 2 is the flow chart of calculating process of the present invention;
Fig. 3 is the present invention when physical quantities are 5 to 25, the calculating of this programme and traditional scheme on a mobile terminal
Expense compares figure;
Fig. 4 is the present invention when terminal quantity is 100 to 1000, and this programme and traditional scheme are opened in the calculating of server end
Pin compares figure;
Fig. 5 is the present invention when physical quantities are 100 to 500, and this programme and traditional scheme are opened in the calculating of server end
Pin compares figure.
Specific embodiment
With reference to the accompanying drawings and examples, the method for the present invention is described in further details.
Embodiment
The present embodiment illustrates specific implementation process of the method for the present invention under intelligent perception scene.
It tests the Android mobile phone at one configured with 1.5GHz 2GB RAM and two is configured with 2.5GHz Intel Core
It is carried out on the notebook of i7 16GB RAM.
Fig. 1 is the system flow chart of the method for the present invention, and Fig. 2 is the specific implementation process of true value discovery process, from Fig. 1 and figure
2 find that the process of system is as follows as can be seen that terminal is added to true value:
Step a, terminal is registered to trust center, obtains hash chain HkWith relevant key (the public key h of PailliernWith one
A random number zk).At the same time, trust center sends the Hash head of all terminals to mist serverAnd random numberThe private key λ of decryption is sent to Cloud Server;
Step b, after terminal receives information as above, the symmetric key of iteration j process is generated according to hash chainAccording to true value, the distance of terminal calculating observation value and true value, and Paillier public key is carried out to this distance and is added
Close and symmetric key encryption.After the completion of calculating, the identity information of terminal ciphertext and terminal, i.e. AES (E (sk)) and Hkj, send
To mist server;
Step c, it after mist server receives data, first verifies that the identity of terminal, is calculated according to cryptographic Hash and random number every
The symmetric key of a terminalAnd ciphertext is decrypted to obtain by the close of Pailier public key encryption with this ciphertext
Literary E (sk).After the completion of decryption, mist server, which tire out to all ciphertext data, multiplies polymerization i.e.Concurrently
It send to Cloud Server;
Step d, it after Cloud Server receives data, is decrypted to obtain using private key λAnd result is sent to
All terminals;
Step e, terminal calculates respective weight information w according to the sum of the distance receivedk, using superlinearity sequence by institute
Some weighted datas are polymerize.Then, terminal carries out Paillier public key encryption and symmetric key to weight and weighted data
Encryption, obtains ciphertext AES (E (wk)), AES (E (swk)) and identity information.After completing the above operation, terminal sends out these information
It send to mist server;
Step f, after mist server receives these information, first check for the legitimacy of terminal, and execute key decryption and it is close
Literary converging operation obtainsWithAfter the completion of calculating, the data after polymerization are sent to cloud service by terminal
Device;
Step g, the accumulation ciphertext received is decrypted in Cloud Server, obtain weight and and polymerization weighted information,
Cloud Server uses superlinearity sequence by all terminal weighted datas of each entity and reduction.Based on weight and and each reality
The weighted data of body and, Cloud Server calculates the true value of each entity, and sends it to terminal.
Step h, step b to step g is repeated, when the true value difference before and after iteration is no more than given threshold, iteration ends.
Fig. 3 is the efficiency line chart that Android mobile phone participates in true value discovery procedure, and abscissa is the quantity of observed entity, indulges and sits
Mark is calculating time-consuming in total.The line of black is that the calculating under the present invention is time-consuming, and red line is the time delay under traditional scheme.From
Fig. 3 can be seen that compared with traditional scheme, and a kind of safe and efficient true value discovery agreement of the invention is at Android mobile phone end
It is lower to calculate time-consuming, it is more efficient.
Fig. 4 is that cloud, mist server participate in the efficiency line chart of true value discovery procedure, set observed entity quantity as 100, cross
Coordinate is terminal quantity, and ordinate is to calculate time-consuming.From fig. 4, it can be seen that compared with traditional scheme, with the increasing of terminal quantity
Add, the calculating time-consuming of two schemes is all increasing, but a kind of safe and efficient true value discovery agreement of the invention is in cloud, mist service
The calculating time-consuming at device end is lower, more efficient, such as when terminal quantity is 1000, the calculating time-consuming of this programme is 280.03s,
And the calculating time-consuming of traditional scheme is only 0.428s.
Fig. 5 is that cloud, mist server participate in the efficiency line chart of true value discovery procedure, sets participation number as 1000, horizontal seat
Physical quantities are marked, ordinate is to calculate time-consuming.From fig. 5, it can be seen that the calculating of two schemes consumes with the growth of physical quantities
When all increasing.Compared with traditional scheme, a kind of of the invention safe and efficient true value discovery agreement is in cloud, mist server end
It is lower to calculate time-consuming, it is more efficient.Specifically, when physical quantities are 500, the calculating time-consuming of this programme is 0.775s, and
The calculating time-consuming of traditional scheme needs 1269.72s.
The above is only a preferred embodiment of the present invention, it is noted that for the ordinary skill people of the art
For member, without departing from the principle of the present invention, several improvement can also be made, or to part of technical characteristic into
Row equivalent replacement, these are improved and replacement also should be regarded as protection scope of the present invention.
Claims (2)
1. a kind of intelligent perception network true value based on secret protection finds method, which comprises the following steps:
Step 1: terminal is registered to trust center, trust center selects system security parameter ξ, and is generated according to this security parameter
The digit of two Big primes p and q, wherein p=2p '+1, q=2q '+1, p ' and q ' are ξ;Trust center calculates n=pq in turn,
λ=p ' q ';Terminal will be registered before participation task in trust center, and obtain relevant key hn, wherein h is random number;It obtains
Take a random number zk;Obtain superlinearity sequenceTrust center is by the key λ and superlinearity of decryption
SequenceIt is sent to Cloud Server;
Wherein, superlinearity sequenceCreate-rule it is as follows: it is assumed that the weight of terminal k be wk, to the observation data of observed entity m
ForIt is assumed that the maximum value of the weighted data sum of most K terminals is not more than Q in a gunz perception task, i.e.,ThenInWherein M represents most M
Observed entity;
Meanwhile trust center selects system security parameter l, and generates a secure hash function according to this security parameterTrust center is that each terminal k distributes a hash chain Hk, and by the Hash head of all terminalsIt is sent to mist server;Wherein, k represents k-th of terminal in intelligent perception;Hash chain HkRepresent k-th of terminal
The Hash array held, wherein cryptographic Hash W is iteration total degree;
Step 2: mist server generates the true value of all observed entities at randomAnd it sends it to all participations and appoints
The terminal of business;Each terminal calculates the Euclidean distance of true value and observation, i.e., Wherein
GC group connector k to the observation of entity m,Then, terminal selects random number rkTo this away from
From being encryptedTo prevent Cloud Server that ciphertext is decrypted, each terminal is to close
Text carries out AES symmetric cryptography, and wherein the symmetric key of iteration j isCiphertext is AES (E (sk));It is holding
After row double encryption operations, terminal is by ciphertext AES (E (sk)) and authentication information HkjIt is uploaded to mist server;
Step 3: the identity of terminal is verified by the preceding cryptographic Hash once received after mist server receives message, i.e. observation Hkj
Whether it is equal toIf the two is equal, it is verified, otherwise authentication does not pass through;Verifying
After complete terminal identity, mist server is decrypted all ciphertexts received according to the AES symmetric key of each terminal, and to decryption
It obtains afterwardsTire out and multiply polymerization, that is, calculatesAfter the completion of polymerization, mist server sends out result
It send to Cloud Server;Cloud Server decrypts polymerization result using λ, i.e.,Obtain the distance of all terminals
With that is,And decrypted result is sent to each terminal;Terminal calculates respective weight according to polymerization result
Step 4: being based on weight, terminal calculates the weighted value of all observed entities, and uses the superlinearity sequence of settingTo each
The weighted value of entity is polymerize, i.e., Later, terminal
Select random number rk2To swkIt is encrypted to obtainSelect random number rk3To power
Weight wkIt is encrypted to obtainTerminal carries out AES encryption to the two ciphertexts, obtains
AES(E(swk)) and AES (E (wk)), and the two ciphertexts are uploaded to mist server;
Step 5: first ciphertext is decrypted to obtain E using the AES symmetric key of each terminal after mist server receives ciphertext
(swk) and E (wk);Mist server tire out to the weighted value and weight of terminal in turn multiplies polymerization, i.e.,WithAnd result is sent to Cloud Server;After Cloud Server receives ciphertext, restored using code key λ, i.e.,WithAs a result it isWithThereafter, Cloud Server utilizes super
Linear order is to the weighted values of all observed entities and restores, obtain each observed entity weighted value and, i.e.,Cloud Server updates true valueAnd send it to each terminal;
Wherein, the weighted value restoring operation of each observed entity is defined as follows:
Cloud Server is decrypted to obtainDefinitionCloud Server is to XmCarry out amModulus
Operate restore observed entity m weighted data and, it may be assumed that
Step 6: terminal repeats step 2 to step 5 according to updated true value;
Step 7: the above process terminates when the true value difference before and after iteration is no more than given threshold.
2. a kind of intelligent perception network true value based on secret protection as described in claim 1 finds method, which is characterized in that
Given threshold described in step 7 is 0.0001.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811233139.5A CN109347829B (en) | 2018-10-23 | 2018-10-23 | Group intelligence perception network truth value discovery method based on privacy protection |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811233139.5A CN109347829B (en) | 2018-10-23 | 2018-10-23 | Group intelligence perception network truth value discovery method based on privacy protection |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109347829A true CN109347829A (en) | 2019-02-15 |
CN109347829B CN109347829B (en) | 2020-06-26 |
Family
ID=65311556
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811233139.5A Active CN109347829B (en) | 2018-10-23 | 2018-10-23 | Group intelligence perception network truth value discovery method based on privacy protection |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109347829B (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110008752A (en) * | 2019-04-12 | 2019-07-12 | 北京理工大学 | A kind of platooning's evaluation method based on secret protection |
CN110198216A (en) * | 2019-07-10 | 2019-09-03 | 安徽大学 | A kind of increment true value discovery method, apparatus, computer equipment and storage medium for protecting privacy |
CN111585990A (en) * | 2020-04-26 | 2020-08-25 | 安徽师范大学 | Mobile crowd sensing privacy protection truth value discovery method based on safety summation |
CN112104609A (en) * | 2020-08-20 | 2020-12-18 | 电子科技大学 | Method for verifiable privacy-aware true phase discovery in a mobile crowd-sourcing awareness system |
CN112787809A (en) * | 2020-12-31 | 2021-05-11 | 华南理工大学 | Efficient crowd sensing data stream privacy protection truth value discovery method |
CN113553614A (en) * | 2021-06-29 | 2021-10-26 | 福建师范大学 | Privacy protection mobile crowd-sourcing perception method based on reinforcement learning |
CN113596015A (en) * | 2021-07-27 | 2021-11-02 | 同济大学 | Identity authentication method supporting privacy protection in crowd sensing based on fog calculation |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120278297A1 (en) * | 2011-04-29 | 2012-11-01 | Microsoft Corporation | Semi-supervised truth discovery |
CN105187139A (en) * | 2015-09-30 | 2015-12-23 | 中国人民解放军后勤工程学院 | Outdoor wireless received signal strength (RSS) map building method based on crowd sensing |
US20160050541A1 (en) * | 2014-05-29 | 2016-02-18 | Egypt-Japan University Of Science And Technology | Fine-Grained Indoor Location-Based Social Network |
CN105407482A (en) * | 2015-11-04 | 2016-03-16 | 上海交通大学 | Protection method for user location privacy in mobile crowd sensing network |
CN105844168A (en) * | 2015-01-14 | 2016-08-10 | 清华大学 | Method and device for privacy protection used for crowd sensing |
CN105912602A (en) * | 2016-04-05 | 2016-08-31 | 南京邮电大学 | True-value finding method based on entity attributes |
CN107749836A (en) * | 2017-09-15 | 2018-03-02 | 江苏大学 | User oriented secret protection and the mobility aware system and its mobile awareness method of data reliability |
CN108494760A (en) * | 2018-03-14 | 2018-09-04 | 安徽大学 | A kind of intelligent perception true value discovery method of protection privacy |
-
2018
- 2018-10-23 CN CN201811233139.5A patent/CN109347829B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120278297A1 (en) * | 2011-04-29 | 2012-11-01 | Microsoft Corporation | Semi-supervised truth discovery |
US20160050541A1 (en) * | 2014-05-29 | 2016-02-18 | Egypt-Japan University Of Science And Technology | Fine-Grained Indoor Location-Based Social Network |
CN105844168A (en) * | 2015-01-14 | 2016-08-10 | 清华大学 | Method and device for privacy protection used for crowd sensing |
CN105187139A (en) * | 2015-09-30 | 2015-12-23 | 中国人民解放军后勤工程学院 | Outdoor wireless received signal strength (RSS) map building method based on crowd sensing |
CN105407482A (en) * | 2015-11-04 | 2016-03-16 | 上海交通大学 | Protection method for user location privacy in mobile crowd sensing network |
CN105912602A (en) * | 2016-04-05 | 2016-08-31 | 南京邮电大学 | True-value finding method based on entity attributes |
CN107749836A (en) * | 2017-09-15 | 2018-03-02 | 江苏大学 | User oriented secret protection and the mobility aware system and its mobile awareness method of data reliability |
CN108494760A (en) * | 2018-03-14 | 2018-09-04 | 安徽大学 | A kind of intelligent perception true value discovery method of protection privacy |
Non-Patent Citations (4)
Title |
---|
C. MIAO,W. JIANG,L. SU,Y. LI,S. GUO,Z. QIN,H. XIAO,J. GAO,K. REN: "Cloud-enabled privacy-preserving truth discovery in crowd sensing systems", 《PROCEEDINGS OF THE 13TH ACM CONFERENCE ON EMBEDDED NETWORKED SENSOR SYSTEMS, SENSYS 2015》 * |
CHENGLIN MIAO;LU SU;WENJUN JIANG;YALIANG LI;MIAOMIAO TIAN: "A lightweight privacy-preserving truth discovery framework for mobile crowd sensing systems", 《IEEE INFOCOM 2017 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS》 * |
孙洪山,陆雪,徐嵘,程孝泗,吴佩敏: "一种高效的隐私保护群智感知真值发现机制", 《物联网技术》 * |
李天义, 谷峪, 马茜, 李芳芳, 于戈: "一种多源感知数据流上的连续真值发现技术", 《软件学报》 * |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110008752A (en) * | 2019-04-12 | 2019-07-12 | 北京理工大学 | A kind of platooning's evaluation method based on secret protection |
CN110008752B (en) * | 2019-04-12 | 2020-10-09 | 北京理工大学 | Vehicle formation evaluation method based on privacy protection |
CN110198216A (en) * | 2019-07-10 | 2019-09-03 | 安徽大学 | A kind of increment true value discovery method, apparatus, computer equipment and storage medium for protecting privacy |
CN110198216B (en) * | 2019-07-10 | 2022-03-04 | 安徽大学 | Incremental truth value discovery method and device for protecting privacy, computer equipment and storage medium |
CN111585990A (en) * | 2020-04-26 | 2020-08-25 | 安徽师范大学 | Mobile crowd sensing privacy protection truth value discovery method based on safety summation |
CN111585990B (en) * | 2020-04-26 | 2022-04-15 | 安徽师范大学 | Mobile crowd sensing privacy protection truth value discovery method based on safety summation |
CN112104609A (en) * | 2020-08-20 | 2020-12-18 | 电子科技大学 | Method for verifiable privacy-aware true phase discovery in a mobile crowd-sourcing awareness system |
CN112104609B (en) * | 2020-08-20 | 2021-12-03 | 电子科技大学 | Method for verifiable privacy-aware truth discovery in mobile crowd-sourcing awareness systems |
CN112787809A (en) * | 2020-12-31 | 2021-05-11 | 华南理工大学 | Efficient crowd sensing data stream privacy protection truth value discovery method |
CN113553614A (en) * | 2021-06-29 | 2021-10-26 | 福建师范大学 | Privacy protection mobile crowd-sourcing perception method based on reinforcement learning |
CN113553614B (en) * | 2021-06-29 | 2023-07-14 | 福建师范大学 | Privacy protection mobile crowd intelligent sensing method based on reinforcement learning |
CN113596015A (en) * | 2021-07-27 | 2021-11-02 | 同济大学 | Identity authentication method supporting privacy protection in crowd sensing based on fog calculation |
Also Published As
Publication number | Publication date |
---|---|
CN109347829B (en) | 2020-06-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111294366B (en) | Statistical analysis method for aggregation of encrypted data for resisting secret key leakage in smart power grid | |
CN109347829A (en) | A kind of intelligent perception network true value discovery method based on secret protection | |
Wang et al. | Fault-tolerant multisubset aggregation scheme for smart grid | |
Chen et al. | PDAFT: A privacy-preserving data aggregation scheme with fault tolerance for smart grid communications | |
CN105812369B (en) | A kind of traceable anonymous authentication method based on elliptic curve | |
Aman et al. | Low power data integrity in IoT systems | |
Zuo et al. | Privacy-preserving multidimensional data aggregation scheme without trusted authority in smart grid | |
CN111092717B (en) | Group authentication-based safe and reliable communication method in smart home environment | |
CN108964919A (en) | The lightweight anonymous authentication method with secret protection based on car networking | |
CN110138538A (en) | The smart grid security and secret protection data aggregation method calculated based on mist | |
CN104270249A (en) | Signcryption method from certificateless environment to identity environment | |
CN104219056A (en) | Privacy protection type real-time electric charge collecting method for intelligent power grid | |
CN105245326A (en) | Intelligent power grid safety communication method based on combination cipher | |
CN103118363B (en) | A kind of method of mutual biography secret information, system, terminal unit and platform device | |
CN110830251B (en) | Method for safely transmitting electricity consumption information in ubiquitous power Internet of things environment | |
CN104301108A (en) | Signcryption method based from identity environment to certificateless environment | |
CN105163309A (en) | Method for secure communication of wireless sensor network based on combined password | |
CN105577356A (en) | Data collection method in smart power grid based on user privacy protection | |
Zhang et al. | Efficient and privacy-aware power injection over AMI and smart grid slice in future 5G networks | |
CN104954390A (en) | Cloud storage integrity detection method for recovering lost secret keys and system applying cloud storage integrity detection method | |
Zhang et al. | An energy-efficient authentication scheme based on Chebyshev chaotic map for smart grid environments | |
CN110489982A (en) | A kind of smart grid data aggregate and encryption method with forward security | |
CN108989309A (en) | Encryption communication method and its encrypted communication device based on narrowband Internet of Things | |
Xiong et al. | Scalable and forward secure network attestation with privacy-preserving in cloud-assisted internet of things | |
CN104636672A (en) | Security data reporting method and security data reporting system on basis of Hash trees and anonymity technologies |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |