CN109743727A - Big data collection method is perceived based on the efficient secret protection that mist calculates - Google Patents

Big data collection method is perceived based on the efficient secret protection that mist calculates Download PDF

Info

Publication number
CN109743727A
CN109743727A CN201811596901.6A CN201811596901A CN109743727A CN 109743727 A CN109743727 A CN 109743727A CN 201811596901 A CN201811596901 A CN 201811596901A CN 109743727 A CN109743727 A CN 109743727A
Authority
CN
China
Prior art keywords
data
mist
matrix
node
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811596901.6A
Other languages
Chinese (zh)
Other versions
CN109743727B (en
Inventor
陈思光
朱曦
汤蓓
王晓玲
王堃
代海波
孙雁飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Post and Telecommunication University
Original Assignee
Nanjing Post and Telecommunication University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Post and Telecommunication University filed Critical Nanjing Post and Telecommunication University
Priority to CN201811596901.6A priority Critical patent/CN109743727B/en
Publication of CN109743727A publication Critical patent/CN109743727A/en
Application granted granted Critical
Publication of CN109743727B publication Critical patent/CN109743727B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention discloses a kind of efficient secret protections calculated based on mist to perceive big data collection method; mist by devising layering calculates auxiliary data and collects framework; calculating task is handled on local device or network edge device; to avoid long haul communication with cloud center, correlation provides effective support when sky to explore perception data.Meanwhile encryption method is disturbed by sampling, protect data-privacy from the infringement of listener-in and active attack person, this encryption method will not destroy the correlation of data, and simplify the decryption and reconstruction operation to encryption sampled data.Meanwhile the model of the mist node data tupe of design and observing matrix optimization, redundant data transmissions amount is greatly reduced, spatial coherence is effectively explored, it is ensured that data can accurately be rebuild.

Description

Big data collection method is perceived based on the efficient secret protection that mist calculates
Technical field
The invention belongs to cordless communication networks, wireless sensor network technology field, and in particular to one kind is calculated based on mist Efficient secret protection perceive big data collection method.
Background technique
For wireless sensor network (Wireless sensor network, WSN), ad hoc and Internet of Things For (Internetofthings, IoT) application, data collection is indispensable.In general, the component in these networks is (such as Sensor etc.) it is limitation by resource, therefore how to overcome these restraining factors, develop energy-efficient data collection and structure Green communications network is built as a huge challenge.The scheme for realizing efficient data collection currently having proposed can substantially divide At following three types: based on mathematical model, based on compressed sensing (Compressive sensing, CS) and based on query driven Approximate data collection scheme.However, these traditional data handling procedures or structure, with being unable to satisfy under big data scene The demand of efficient data collection and processing.Large-scale data is usually along with data collection, processing and the great burden of storage.Such as It is a huge challenge that, which is alleviated these pressure, improves service quality,.
It is the new mould by executing data processing in network edge (local) equipment that mist, which calculates (to the supplement of cloud computing), Type.It can mitigate the data processing load at cloud center, reduce telecommunication expense, significantly improve user experience.What mist calculated Advantage allows to be applied to every field, proposes following three kinds of representational schemes thus:
The service-oriented mist computing architecture of first kind conceptual design is analyzed for remote health mining data, and is assessed Different data is excavated and influence of the compress technique to data collection.But this kind of scheme is not studied specific data and is dug Pick and compression method, and do not account for the highly important Privacy Protection for health data.
A kind of method of data capture calculated based on mobile mist of the second class conceptual design, in conjunction with mist structure design, minimum Cost dispatch algorithm and routing algorithm reduce propagation delay time to the maximum extent, reduce transmission energy consumption.But the program has ignored Using perception data sky when correlation, by reduce sensor read transmission quantity, further reduce energy consumption.
Third class scheme considers the temporal correlation of perception data, by CS theory and low complex degree sensing frame, network Coding, energy consumption model and Clustering combine, and significantly reduce the communication overhead of data acquisition.Second class scheme and third class Scheme has very big performance advantage, but the secret protection to sensitive data is had ignored in the transmission and treatment process of data.
Summary of the invention
In view of the above technical problems, the present invention devises a kind of efficient secret protection perception big data receipts calculated based on mist Set method can reduce the transmission quantity of redundant data, reduce network data transmission energy consumption and improve the mist meter of data reconstruction precision Calculate the efficient secret protection big data cognitive method of auxiliary.
The present invention solves its technical problem and is achieved through the following technical solutions:
A kind of efficient secret protection perception big data collection method calculated based on mist, is included the following steps:
(1) the perception mist computing architecture of design layering, the perception mist computing architecture is divided into from bottom to top mutually to be interconnected Logical sensing layer, mist layer and client layer;
Sensing layer is made of K cluster, and each cluster includes L sensing node, and the sampling period of sensing node is N;
Mist layer corresponds to each other the mist node i carried out data transmission with cluster by K and forms;
(2) sensing node obtains compressed data in data sampling process, and is sent to after encrypting to compressed data Mist layer;
(3) the mist node i in mist layer executes space compression operation, and mist node to the encryption data received from sensing layer Obtained space compression data are sent client layer by i;
(4) client layer is rebuild and is decrypted to the space compression data being collected into from mist layer.
Further, step (2) specifically:
The initial data of sensing node p ∈ { 1,2 ..., L } its time dimension assuming that cluster i ∈ in { 1,2 ... K } is Xi,p=[xi,p1xi,p2...xi,pN], wherein xi,pq, q ∈ { 1,2 ..., N } indicates in cluster i sensing node p in time slot q Data;According to compression sampling theory, sensing node p can obtain compressed data Y in data sampling processi,p=Φ Xi,p= Φ·Ψ·Θi,p, wherein Φ ∈ Rn×NFor observing matrix, Ψ ∈ RN×NFor the sparse basis of corresponding Φ, Θi,p∈RNFor sparse system Number vector, wherein R indicates that set of real numbers, n indicate the size of data after compression sampling on time dimension, is a natural number;
For compressed data Yi,pIt carries out sampling disturbance encryption and obtains encryption data Y 'i,p, the sampling disturbance encryption method It is as follows:
Wherein Y 'i,p∈RnIndicate encryption data,Indicate that key E and observing matrix Φ does the knot of matrix multiplication Fruit, i.e.,The element of key E meets Gaussian Profile N (0,1/n), finally, sensing node p is by encryption data Y 'i,pHair Mist node i is sent to be further processed.
Further, the encryption data Y ' received mist node i in step (3)i,pIt is arranged as matrix Y 'i=[Y 'i,1 Y′i,2 ... Y′i,L], i.e., each cluster has L sensing node, and Y ' ∈ Rn×L, mist node i is to the matrix Y ' receivediIt executes Space compression operation, as follows:
Wherein,Indicate Y 'iTransposition, Φ ' ∈ Rl×LRepresentation space observing matrix, l are indicated by pressing on Spatial Dimension The size of L after contracting sampling, Ψ ' ∈ RL×LIndicate the sparse basis of corresponding Φ ', Θ 'i,q∈RL, q ' ∈ 1,2 ..., and n } indicate empty Between dimension sparse coefficient vector,Indicate the space compression data on n time slot.
Further, based on spatial observation matrix Φ ' and the sparse basis Ψ ' of corresponding Φ ' in step (3), pass through minimum Change the correlation of matrix Φ ' and Ψ ' to construct following optimization problem:
Wherein, H and HμIt is to meet the matrix of above-mentioned condition, and habIndicate the element of H a row b column;
When H is fixed, the solution of above-mentioned optimization problem can be converted following format, i.e., optimal observing matrix Φ′*Solve problems:By gradient descent method can in the hope of with sparse basis Ψ ' The minimum optimal observing matrix Φ ' of correlation*, thus the space compression data Y updatediTIt is sent to client layer.
It further, can be in the hope of the optimal observing matrix minimum with sparse basis Ψ ' correlation by gradient descent method Φ′*, specifically: the objective function optimized will be needed to be defined as following format firstIt is then right Φ ' seeks local derviation, i.e.,Then the iteration of observing matrix Φ ' is updated is defined as: - 4 β Φ ' (t ', t) Ψ ' (Ψ ' of Φ ' (t ', t+1)=Φ ' (t ', t)TΦ′T(t′,t)Φ(t′,t)Ψ-H)Ψ′T, In, t and t ' are the number of inner iterative and outer iteration respectively, and symbol beta indicates iteration step length, in order to reduce between Φ ' and Ψ ' Correlation, the upper limit of the off diagonal element of G is set, i.e., | gab|≤μ, μ are given threshold value, and the update of H is depending on μ's Value, and the renewal process is described as follows:
Wherein, gabIt is G=Ψ 'TΦ′TThe element of a row b column of Φ ' Ψ ';
This method obtains optimal observing matrix Φ '*, the space compression data of mist node i are updated to YiT=Φ '*·YiT =Φ '*·Ψ′·Θ′i
Further, step (4) specifically:
Firstly, to rebuild data Y 'iIt need to solve following optimization problem:
Wherein,Representation space compressed data YiTThe q ' column, time slot q ' ∈ { 1,2 ..., n }, due to vector Θ′i,q′It is sparse, and space compression data YiTWith Φ '*Ψ ' is known, therefore can use CS algorithm for reconstructing Reconstructed coefficients matrix Θ 'i;Above-mentioned optimization problem has been solved, Θ ' is obtainediApproximationWhen, Y ' is obtained by following equalitiesi Approximation
Wherein Θ 'iFor sparse coefficient vector Θ 'i,q′By column composition matrix,Indicate that all encryptions are adopted in cluster i The reconstruction data of sample data rebuild data in exportAfterwards, it is decrypted and rebuilds initial data Xi,p, following optimize need to be solved Problem:
Wherein,Due to coefficient vector Θi,pIt is sparse, and key E, observing matrix Φ, corresponding Φ sparse basis Ψ andBe it is known, can use compressed sensing reconstruction algorithm and solve approximation coefficient vector
The invention has the benefit that
(1) the hierarchical perception mist computing architecture that the present invention designs, avoids the length between sensing node and cloud server Distance communication effectively reduces communication energy consumption.In addition, compressing original perception data respectively from time and Spatial Dimension, reduce The transmission of redundant data, further reduced communication overhead;
(2) the sampling disturbance encryption method that the present invention designs, realizes secret protection, and will not destroy phase between data Guan Xing;
(3) the mist node data tupe that the present invention designs, significantly reduces redundant data transmissions amount.The observation of building Matrix optimizing model ensure that the successful reconstitution of initial data, and further improve the reconstruction precision of data.
Detailed description of the invention
Fig. 1 is that the individual-layer data for calculating auxiliary for the mist under big data sensing network that the present invention designs collects framework;
Fig. 2 is that the comparison between sampling disturbance encryption method institute sampled data and original sampling data is utilized in the present invention;
Fig. 3 is the comparison of data reconstruction result between user and attacker in the present invention;
Fig. 4 is design method of the present invention compared with other two schemes are on opposite reconstruction error, wherein Privacy Preserving data collection indicates method proposed by the invention.
Specific embodiment
Below by specific embodiment, the invention will be further described, and it is not limit that following embodiment, which is descriptive, Qualitatively, this does not limit the scope of protection of the present invention.
As shown in Figure 1, a kind of efficient secret protection calculated based on mist perceives big data collection method, including walk as follows It is rapid:
(1) the perception mist computing architecture of design layering, perception mist computing architecture are divided into interconnected from bottom to top Sensing layer, mist layer and client layer.
Sensing layer is made of various awareness apparatus, for monitoring specified region.According to the location information of awareness apparatus, by it It is divided into multiple clusters.I.e. sensing layer is made of K cluster, and each cluster includes L sensing node, and the sampling period of sensing node is N. Awareness apparatus carries out disturbance encryption sampling to data, the squeeze operation of initial data is realized, later, by the sampling data transmitting of encryption It is sent to the corresponding node of mist layer, i.e. mist node and sensing node belongs to the same cluster, so mist layer is mutually right with cluster by K The mist node i composition that should carry out data transmission.
Each cluster in mist layer can dispose mist node, and mist node serves as following two role.1) data processing: when mist node When receiving data harvesting request from the user in local user or other regions, it can be acquired from local sensing node encrypted Sampled data, and data sended over using the spatial observation matrix compression optimized from local sensing node.Finally, will Encrypted compressed data is sent to user terminal or next mist node.2) data relay: when some mist node is from other mists It, can be by the data forwarding received to next mist node, until data reach and request user when node receives data Belong to the mist node of the same area.
Client layer is made of a large number of users terminal in network monitoring region.User terminal is connected with mist layer, has one Fixed computing capability.If user wants to obtain perception data from self zone or near zone, request is committed to local Mist node.Later, mist node will provide corresponding data service.Due to the data received from mist node be it is encrypted, because (reconstruction) operation need to be decrypted in this user by the ciphertext that the key pair shared with awareness apparatus receives.
(2) assume the initial data of sensing node p ∈ { 1,2 ..., L } its time dimension in cluster i ∈ { 1,2 ... K } For Xi,p=[xi,p1 xi,p2 ... xi,pN], wherein xi,pq, q ∈ { 1,2 ..., N } be expressed as in cluster i sensing node p when Data when gap q.According to compression sampling theory, sensing node p can obtain compressed data Y in data sampling processi,p= Φ·Xi,p=Φ Ψ Θi,p, wherein Φ ∈ Rn×NFor observing matrix, Ψ ∈ RN×NFor the sparse basis of corresponding Φ, Θi,p∈RN For sparse coefficient vector, wherein R indicates that set of real numbers, n indicate the size of data after compression sampling on time dimension, is one A natural number.For the privacy of the sensitive data of guarantee user's request, i.e. the confidentiality of data, the present invention devises a kind of sampling Encryption method is disturbed, to prevent the acquisition of listener-in and active attack person to data.For compressed data Yi,pCarry out sampling disturbance Encryption obtains encryption data Y 'i,p, it is as follows which disturbs encryption method:
Wherein Y 'i,p∈RnIt indicates encryption data (i.e. ciphertext),Indicate that key E and observing matrix Φ does Matrix Multiplication Method as a result, i.e.The element of key E meets Gaussian Profile N (0,1/n), finally, sensing node p is by encryption data Y′i,pMist node i is sent to be further processed.
(3) mist node i is introduced into network with reduction and cloud long haul communication energy consumption, and by mist node The redundant data transmissions amount that data are handled to be further reduced between mist node and user.According to adding for sensing node p Close sampled result, the encryption data Y ' that mist node i is receivedi,pIt is arranged as Y 'i=[Y 'i,1 Y′i,2 ... Y′i,L], i.e., often A cluster i has L sensing node, and Y ' ∈ Rn×L.In order to be further reduced redundant data transmissions amount, mist node i is to receiving Data Y 'iSpace compression operation is executed, as follows:
Wherein,Indicate Y 'iTransposition, Φ ' ∈ Rl×LRepresentation space observing matrix, l are indicated by pressing on Spatial Dimension The size of L, Ψ ' ∈ R after contracting samplingL×LIndicate the sparse basis of corresponding Φ ', Θ 'i,q∈RL, q ' ∈ 1,2 ..., and n } representation space The sparse coefficient vector of dimension,Indicate the space compression data on n time slot.
The height of data reconstruction precision is wanted since the spatial observation matrix Φ ' of above-mentioned setting is not able to satisfy partial task It asks, the present invention constructs and solved an observing matrix optimization problem thus.Based on spatial observation matrix Φ ' with corresponding Φ's ' Sparse basis Ψ ' constructs following optimization problem by minimizing the correlation of matrix Φ ' and Ψ ':
Wherein, H and HμIt is to meet the matrix of above-mentioned condition, and habIndicate the element of H a row b column;
When H is fixed, the solution of above-mentioned optimization problem can be converted following format, i.e., optimal observing matrix Φ′*Solve problems:By gradient descent method can in the hope of with sparse basis Ψ ' The minimum optimal observing matrix Φ ' of correlation*, thus the space compression data Y updatediTIt is sent to client layer.
The objective function optimized will be needed to be defined as following format firstThen to Φ ' Local derviation is sought, i.e.,Then the iteration of observing matrix Φ ' is updated is defined as: Φ ' - 4 β Φ ' (t ', t) Ψ ' (Ψ ' of (t ', t+1)=Φ ' (t ', t)TΦ′T(t′,t)Φ(t′,t)Ψ-H)Ψ′T, wherein t It is the number of inner iterative and outer iteration respectively with t ', symbol beta indicates iteration step length.In order to reduce the phase between Φ ' and Ψ ' The upper limit of the off diagonal element of G is arranged in Guan Xing, i.e., | gab|≤μ, μ are given threshold value, and the update of H depends on the value of μ, and The renewal process is described as follows:
Wherein, gabIt is G=Ψ 'TΦ′TThe element of a row b column of Φ ' Ψ '.
This method obtains optimal observing matrix Φ '*, the space compression data of mist node i are updated to YiT=Φ '*·YiT =Φ '*·Ψ′·Θ′i, mist node i is by the space compression data Y of updateiTIt is sent to client layer.
(4) for user convenience from the data of mist node i, the encryption data for needing to be collected into user carries out weight It builds and decrypts.Firstly, to rebuild data Y 'iIt need to solve following optimization problem:
Wherein Θ 'iFor sparse coefficient vector Θ 'i,q′By column composition matrix,Representation space compressed data YiT The q ' column, time slot q ' ∈ { 1,2 ..., n }, due to vector theta 'i,q′It is sparse, and space compression data YiTWith Φ′*Ψ ' is known, therefore can use CS algorithm for reconstructing reconstructed coefficients matrix Θ 'i;Above-mentioned optimization problem has been solved, has been obtained To Θ 'iApproximationWhen, Y ' is obtained by following equalitiesiApproximation
Wherein Θ 'iFor sparse coefficient vector Θ 'i,q′By column composition matrix,Indicate that all encryptions are adopted in cluster i The reconstruction data of sample data rebuild data in exportAfterwards, it is decrypted and rebuilds initial data Xi,p, following optimize need to be solved Problem:
Wherein,Due to coefficient vector Θi,pIt is sparse, and key E, observing matrix Φ, sparse basis Ψ andBe it is known, can use suitable compressed sensing reconstruction algorithm and solve approximation coefficient vector
For current research scheme that there are energy consumptions is high, Privacy Safeguarding is low and temporal correlation there are the performance deficiencies such as error Problem, we incorporate encryption sampling, mist calculates and CS is theoretical, and the invention discloses a kind of efficient privacy guarantors calculated based on mist Shield perception big data collection method.Mist by devising layering calculates auxiliary data and collects framework, so that calculating task can be with It is handled on local device or network edge device, so that the long haul communication with cloud center is avoided, to explore perception data Sky when correlation provide effective support.Meanwhile encryption method is disturbed by sampling, protect data-privacy from listener-in With the infringement of active attack person, this encryption method will not destroy the correlation of data, and simplify to encryption sampled data Decryption and reconstruction operation.Meanwhile the model of the mist node data tupe of design and observing matrix optimization, it greatly reduces Redundant data transmissions amount, effectively explores spatial coherence, it is ensured that data can accurately be rebuild.
The application of the efficient secret protection perception big data collection method that mist calculates in practice, as shown in Fig. 2, of the invention Design method shows: existing between encryption data and original sampling data compared with large disturbances, it means that eavesdropping can effectively be defendd to attack It hits;Encryption data and initial data keep like attribute, it means that it is in plain text or close that the data obtained, which cannot be distinguished, in listener-in Text.Therefore, listener-in is obscured while this programme can provide the secret protection of data.In addition, as shown in figure 3, institute of the present invention The reconstruction data and initial data of user terminal are several in the efficient secret protection perception big data collection method that the mist of design calculates Consistent, i.e., reconstruction precision is higher;And the reconstructed results rapid fluctuation of attacker, and differ greatly with initial data.This meaning Taste, the sampling disturbance encryption method of this programme design can also preferably protect data while will not destroying data dependence Privacy.Moreover, as shown in figure 4, this programme (Privacy preserving data collection) and remaining two Kind scheme (Clustered compressive data collection, Big spatio-temporal Datacollection it) compares, there is lower Relative reconstruction error, while the application effect of data is influenced smaller.
The above is only a preferred embodiment of the present invention, it is noted that for the ordinary skill people of the art For member, various improvements and modifications may be made without departing from the principle of the present invention, these improvements and modifications are also answered It is considered as protection scope of the present invention.

Claims (6)

1. a kind of efficient secret protection calculated based on mist perceives big data collection method, characterized by the following steps:
(1) the perception mist computing architecture of design layering, the perception mist computing architecture is divided into interconnected from bottom to top Sensing layer, mist layer and client layer;
Sensing layer is made of K cluster, and each cluster includes L sensing node, and the sampling period of sensing node is N;
Mist layer corresponds to each other the mist node i carried out data transmission with cluster by K and forms;
(2) sensing node obtains compressed data in data sampling process, and mist layer is sent to after encrypting to compressed data;
(3) the mist node i in mist layer executes space compression operation to the encryption data received from sensing layer, and mist node i will Obtained space compression data are sent to client layer;
(4) client layer is rebuild and is decrypted to the space compression data being collected into from mist layer.
2. a kind of efficient secret protection calculated based on mist as described in claim 1 perceives big data collection method, feature It is: step (2) specifically:
The initial data of sensing node p ∈ { 1,2 ..., L } its time dimension assuming that cluster i ∈ in { 1,2 ... K } is Xi,p= [xi,p1xi,p2…xi,pN], wherein xi,pq, q ∈ 1,2 ..., and N } indicate data of the sensing node p in time slot q in cluster i;Root According to compression sampling theory, sensing node p can obtain compressed data Y in data sampling processi,p=Φ Xi,p=Φ Ψ·Θi,p, wherein Φ ∈ Rn×NFor observing matrix, Ψ ∈ RN×NFor the sparse basis of corresponding Φ, Θi,p∈RNFor sparse coefficient to Amount, wherein R indicates that set of real numbers, n indicate the size of data after compression sampling on time dimension, is a natural number;
For compressed data Yi,pIt carries out sampling disturbance encryption and obtains encryption data Y 'i,p, it is as follows that the sampling disturbs encryption method:
Wherein Y 'i,p∈RnIndicate encryption data,Indicate key E and observing matrix Φ do matrix multiplication as a result, i.e.The element of key E meets Gaussian Profile N (0,1/n), finally, sensing node p is by encryption data Y 'i,pIt is sent to mist Node i is to be further processed.
3. a kind of efficient secret protection calculated based on mist as claimed in claim 2 perceives big data collection method, feature It is: the encryption data Y ' for receiving mist node i in step (3)i,pIt is arranged as matrix Yi'=[Y 'i,1 Y′i,2 … Y ′i,L], i.e., each cluster has L sensing node, and Y ' ∈ Rn×L, mist node i is to the matrix Y receivedi' execute space compression behaviour Make, as follows:
YiT=Φ ' YiT
=Φ ' [Y 'i,1 Y′i,2 … Y′i,L]T
=Φ ' Ψ ' Θ 'i
=Φ ' Ψ ' [Θ 'i,1 Θ′i,2 … Θ′i,n],
Wherein, YiTIndicate Yi' transposition, Φ ' ∈ Rl×LRepresentation space observing matrix, l indicate to adopt by compressing on Spatial Dimension The size of L after sample, Ψ ' ∈ RL×LIndicate the sparse basis of corresponding Φ ', Θ 'i,q∈RL, q ' ∈ 1,2 ..., and n } representation space dimension The sparse coefficient vector of degree, YiT∈Rl×nIndicate the space compression data on n time slot.
4. a kind of efficient secret protection calculated based on mist as claimed in claim 3 perceives big data collection method, feature Be: based on spatial observation matrix Φ ' and the sparse basis Ψ ' of corresponding Φ ' in step (3), by minimum matrix Φ ' and The correlation of Ψ ' constructs following optimization problem:
Wherein, H and HμIt is to meet the matrix of above-mentioned condition, and habIndicate the element of H a row b column;
When H is fixed, the solution of above-mentioned optimization problem can be converted following format, i.e., optimal observing matrix Φ '*'s Solve problems:By gradient descent method can in the hope of with sparse basis Ψ ' correlation Minimum optimal observing matrix Φ '*, thus the space compression data Y updatediTIt is sent to client layer.
5. a kind of efficient secret protection calculated based on mist as claimed in claim 4 perceives big data collection method, feature It is: can be in the hope of the optimal observing matrix Φ ' minimum with sparse basis Ψ ' correlation by gradient descent method*, specifically: it is first First the objective function optimized will be needed to be defined as following formatLocal derviation then is asked to Φ ', i.e.,Then the iteration of observing matrix Φ ' is updated is defined as: Φ ' (t ', t+1) - 4 β Φ ' (t ', t) Ψ ' (Ψ ' of=Φ ' (t ', t)TΦ′T(t′,t)Φ(t′,t)Ψ-H)Ψ′T, wherein t and t ' is respectively It is the number of inner iterative and outer iteration, symbol beta indicates iteration step length, in order to reduce the correlation between Φ ' and Ψ ', if Set the upper limit of the off diagonal element of G, i.e., | gab|≤μ, μ are given threshold value, and the update of H depends on the value of μ, and this is updated Journey is described as follows:
Wherein, gabIt is G=Ψ 'TΦ′TThe element of a row b column of Φ ' Ψ ';
This method obtains optimal observing matrix Φ '*, the space compression data of mist node i are updated to YiT=Φ '*·YiT= Φ′*·Ψ′·Θ′i
6. a kind of efficient secret protection calculated based on mist as claimed in claim 5 perceives big data collection method, feature It is: step (4) specifically:
Firstly, to rebuild data Yi' following optimization problem need to be solved:
Wherein,Representation space compressed data YiTThe q ' column, time slot q ' ∈ { 1,2 ..., n }, due to vector Θ′i,q′It is sparse, and space compression data YiTWith Φ '*Ψ ' is known, therefore can use CS algorithm for reconstructing Reconstructed coefficients matrix Θ 'i;Above-mentioned optimization problem has been solved, Θ ' is obtainediApproximationWhen, Y is obtained by following equalitiesi′ Approximation
Wherein Θ 'iFor sparse coefficient vector Θ 'i,q′By column composition matrix,Indicate all encryption hits in cluster i According to reconstruction data, export rebuild dataAfterwards, it is decrypted and rebuilds initial data Xi,p, following optimization problem need to be solved:
Wherein,Due to coefficient vector Θi,pIt is sparse, and key E, observing matrix Φ, right Answer Φ sparse basis Ψ andBe it is known, can use compressed sensing reconstruction algorithm and solve approximation coefficient vector
CN201811596901.6A 2018-12-26 2018-12-26 Efficient privacy protection perception big data collection method based on fog calculation Active CN109743727B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811596901.6A CN109743727B (en) 2018-12-26 2018-12-26 Efficient privacy protection perception big data collection method based on fog calculation

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811596901.6A CN109743727B (en) 2018-12-26 2018-12-26 Efficient privacy protection perception big data collection method based on fog calculation

Publications (2)

Publication Number Publication Date
CN109743727A true CN109743727A (en) 2019-05-10
CN109743727B CN109743727B (en) 2022-06-10

Family

ID=66361238

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811596901.6A Active CN109743727B (en) 2018-12-26 2018-12-26 Efficient privacy protection perception big data collection method based on fog calculation

Country Status (1)

Country Link
CN (1) CN109743727B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110300159A (en) * 2019-06-10 2019-10-01 华侨大学 A kind of sensing cloud data safety low cost storage method based on edge calculations
CN110519776A (en) * 2019-08-07 2019-11-29 东南大学 Balanced cluster and federated resource distribution method in a kind of mist computing system
CN110839028A (en) * 2019-11-14 2020-02-25 南京邮电大学 Privacy protection method for fog-assisted industrial Internet of things
CN111835830A (en) * 2020-06-16 2020-10-27 北京邮电大学 Data perception system, method and device
CN111954236A (en) * 2020-07-27 2020-11-17 河海大学 Hierarchical edge calculation unloading method based on priority
CN113033026A (en) * 2021-04-26 2021-06-25 上海交通大学 Industrial edge sensing method with observability guarantee
CN113742779A (en) * 2021-09-18 2021-12-03 湖北工业大学 Service customization system and method with privacy protection function

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130070624A1 (en) * 2010-01-11 2013-03-21 Research In Motion Limited Sensor-based wireless communication systems using compressed sensing with sparse data
CN105025498A (en) * 2015-06-08 2015-11-04 南京邮电大学 A sensing network clustering type space time compression method based on network coding and compression sensing
CN107786959A (en) * 2017-10-18 2018-03-09 北京京航计算通讯研究所 The compressed data collection method based on adaptive measuring in wireless sensor network

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130070624A1 (en) * 2010-01-11 2013-03-21 Research In Motion Limited Sensor-based wireless communication systems using compressed sensing with sparse data
CN105025498A (en) * 2015-06-08 2015-11-04 南京邮电大学 A sensing network clustering type space time compression method based on network coding and compression sensing
CN107786959A (en) * 2017-10-18 2018-03-09 北京京航计算通讯研究所 The compressed data collection method based on adaptive measuring in wireless sensor network

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
SIGUANG CHEN ET AL.: "Fog Computing Assisted Efficient Privacy Preserving Data Collection for Big Sensory Data", 《2018 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM)》 *
SIGUANG CHEN ET AL.: "Fog Computing based Optimized Compressive Data Collection for Big Sensory Data", 《2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC)》 *

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110300159B (en) * 2019-06-10 2021-08-31 华侨大学 Sensing cloud data safe low-cost storage method based on edge computing
CN110300159A (en) * 2019-06-10 2019-10-01 华侨大学 A kind of sensing cloud data safety low cost storage method based on edge calculations
CN110519776A (en) * 2019-08-07 2019-11-29 东南大学 Balanced cluster and federated resource distribution method in a kind of mist computing system
CN110519776B (en) * 2019-08-07 2021-09-17 东南大学 Balanced clustering and joint resource allocation method in fog computing system
CN110839028A (en) * 2019-11-14 2020-02-25 南京邮电大学 Privacy protection method for fog-assisted industrial Internet of things
CN110839028B (en) * 2019-11-14 2022-04-05 南京邮电大学 Privacy protection method for fog-assisted industrial Internet of things
CN111835830A (en) * 2020-06-16 2020-10-27 北京邮电大学 Data perception system, method and device
CN111835830B (en) * 2020-06-16 2022-06-21 北京邮电大学 Data perception system, method and device
CN111954236B (en) * 2020-07-27 2021-11-09 河海大学 Hierarchical edge calculation unloading method based on priority
CN111954236A (en) * 2020-07-27 2020-11-17 河海大学 Hierarchical edge calculation unloading method based on priority
CN113033026A (en) * 2021-04-26 2021-06-25 上海交通大学 Industrial edge sensing method with observability guarantee
CN113033026B (en) * 2021-04-26 2022-03-15 上海交通大学 Industrial edge sensing method with observability guarantee
CN113742779A (en) * 2021-09-18 2021-12-03 湖北工业大学 Service customization system and method with privacy protection function
CN113742779B (en) * 2021-09-18 2024-03-22 湖北工业大学 Service customization system and method with privacy protection function

Also Published As

Publication number Publication date
CN109743727B (en) 2022-06-10

Similar Documents

Publication Publication Date Title
CN109743727A (en) Big data collection method is perceived based on the efficient secret protection that mist calculates
Chen et al. Efficient privacy preserving data collection and computation offloading for fog-assisted IoT
CN105812126A (en) Lightweight back-up and efficient restoration method of health block chain data encryption keys
Wang et al. Achieve privacy-preserving priority classification on patient health data in remote eHealthcare system
Liu et al. Mobile-edge computing framework with data compression for wireless network in energy internet
CN103259787B (en) Safety interactive method of cloud and terminal based on JSON protocol packet in medical field
KR20150115778A (en) Privacy against interference attack for large data
CN112600697B (en) QoS prediction method and system based on federal learning, client and server
Song et al. Autoregressive integrated moving average model–based secure data aggregation for wireless sensor networks
CN115766159A (en) Private data processing method and device and electronic equipment
CN110300159A (en) A kind of sensing cloud data safety low cost storage method based on edge calculations
CN108566369A (en) Data collecting system based on industrial big data and method
Wei et al. Image compression scheme based on PCA for wireless multimedia sensor networks
Ifzarne et al. Secure data collection for wireless sensor network
Kuldeep et al. Multi-class privacy-preserving cloud computing based on compressive sensing for IoT
CN110855512A (en) Ultra-large-scale DPI data processing system based on edge calculation
Chen et al. Fog computing based optimized compressive data collection for big sensory data
CN106470212A (en) A kind of method based on LZW compression algorithm, EIGRP protocol massages being compressed and encrypting
Chen et al. Fog computing assisted efficient privacy preserving data collection for big sensory data
Sukanya et al. Integration of wireless sensor networks and mobile cloud-A survey
CN115134080B (en) Data transmission method and device based on security encryption chip
CN106792876A (en) End to end network perception evaluating method and system
Yu et al. Verifiable, privacy-assured, and accurate signal collection for cloud-assisted wireless sensor networks
Hung et al. Privacy-preserving data collection and recovery of compressive sensing
CN103327363A (en) System and method for realizing control over video information encryption on basis of semantic granularity

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant