CN109769212A - Method for protecting track privacy based on slice in a kind of intelligent perception - Google Patents
Method for protecting track privacy based on slice in a kind of intelligent perception Download PDFInfo
- Publication number
- CN109769212A CN109769212A CN201910059756.6A CN201910059756A CN109769212A CN 109769212 A CN109769212 A CN 109769212A CN 201910059756 A CN201910059756 A CN 201910059756A CN 109769212 A CN109769212 A CN 109769212A
- Authority
- CN
- China
- Prior art keywords
- track
- tuple
- client
- server
- index
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 230000008447 perception Effects 0.000 title claims abstract description 28
- 238000000034 method Methods 0.000 title claims abstract description 26
- 238000013507 mapping Methods 0.000 claims abstract description 8
- 238000001514 detection method Methods 0.000 claims description 3
- 229910017435 S2 In Inorganic materials 0.000 claims 1
- 230000033001 locomotion Effects 0.000 description 3
- 230000008569 process Effects 0.000 description 3
- 230000009286 beneficial effect Effects 0.000 description 2
- 230000008901 benefit Effects 0.000 description 2
- 238000013480 data collection Methods 0.000 description 2
- 230000000977 initiatory effect Effects 0.000 description 2
- 241001269238 Data Species 0.000 description 1
- 208000003443 Unconsciousness Diseases 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 239000002360 explosive Substances 0.000 description 1
- 230000036541 health Effects 0.000 description 1
- 238000007689 inspection Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
Landscapes
- Storage Device Security (AREA)
- Alarm Systems (AREA)
Abstract
The present invention is suitable for secret protection technical field; provide the method for protecting track privacy based on slice in a kind of intelligent perception; include the following steps: S1, track data is sliced using position as minimum unit, obtains track tuple, generate the identifier of each track tuple;S2, the mapping of the index of track tuple and operation label is formed into query logic, and is stored in client;S3, track tuple and corresponding index are uploaded to server by the client of random number of thresholds;S4, the index sequence that track tuple is obtained based on query logic, are sent to server for index sequence;S5, the track tuple that server returns is received, the track tuple is the corresponding track tuple of index sequence.Track tuple iteration in participant; perception individual subscriber location privacy and track privacy can be effectively protected; and resist malicious user and server colludes with bring track privacy leakage problem, track can be rebuild in client, ensure that the practicability of client data.
Description
Technical field
The invention belongs to secret protection technical field, the protecting track privacy based on slice in a kind of intelligent perception is provided
Method.
Background technique
The concept of intelligent perception (Crowd Sensing, CS) is by being proposed based on the subjective initiative of people aprowl.
Specifically, the mobile intelligent terminal that their propositions can be held individual is local all kinds of for completing as mobile sensor node
The collection of data (such as sound, video, image etc.) is analyzed and is shared.Use healthy participatory sensing as data collection at present
Method rapidly becoming reality, this will thoroughly change the scale and type of data, these data can summarize for several
Population health, epidemiology, statistics and data analyze purpose.Intelligent perception application range possibility is very big, but intelligent perception
Previous work without considering the application that may generate under healthy background in detail.Wearable technology is the maximum application of Internet of Things
One of, the popularity of wearable device is in explosive growth at present, and more multisensor can be used and record our daily lifes
Various aspects, unconscious mode influences our life.But with the widespread deployment of wearable device, occur
Safety problem, the threat of most serious is the privacy leakage of wearable device data information and trace information, because of these information
Contain individual privacy information abundant.
Domestic and international researcher also proposed many solutions for the protecting track privacy problem in intelligent perception.F
The SLICER method of the propositions such as Qiu is first k anonymity secret protection scheme for being used for multi-medium data intelligent perception, integrates
Data encoding technique and message exchange strategy, can with the privacy of effective protection participant, while keeping high data accuracy.But
It is that this method reproduce data can not in client.As common recognition, one of the key challenge of secret protection be how
It keeps realizing effective secret protection while data utility.The benefit of intelligent perception application system arises directly from gunz sense
The value of primary data collection has obtained significant discovery.For example, individual sports track renders on map can be used for public body-building
The decision of Facilities Construction regional choice, the method for existing protecting track privacy have very much, although all having reached track privacy guarantor
The purpose of shield, but be the failure to guarantee track data in the practicability of client.
Summary of the invention
The embodiment of the present invention provides the method for protecting track privacy based on slice in a kind of intelligent perception, realizes track number
According to the reproduction in client, it ensure that track data in the practicability of client.
To achieve the goals above, the present invention provides the protecting track privacy sides based on slice in a kind of intelligent perception
Method, this method comprises the following steps:
S1, track data is sliced using position as minimum unit, obtains track tuple, and generate each track member
The identifier of group;
S2, the index of track tuple and the mapping of operation label are formed into query logic, and is stored in client, the rope
Draw the identifier as track tuple;
S3, track tuple and corresponding index are uploaded to server by the client of random number of thresholds;
S4, the index sequence that track tuple is obtained based on query logic, are sent to server for index sequence;
S5, the track tuple that server returns is received, the track tuple is the corresponding track tuple of index sequence.
Further, to prevent server from initiating the attack based on time-triggered protocol, if the operation label in step S2 is
Between stab, then before step S3 further include: the timestamp of track tuple is upset, while client retain original time and
The mapping of time after upset;After step s 5 further include: the timestamp of track tuple is restored, realizes track data
Reconstruct.
Further, when being uploaded track tuple, three parameter alphas of client random selection or generation, β, λ,
In, α is initial value, and λ is step-length, and β is threshold values, and when track tuple often passes through a participation client, the value of α reduces λ, when α is small
When β value, participates in client and track tuple is uploaded onto the server.
Further, whether the index in server detection index sequence meets the reference format of setting, sets if not meeting
Fixed reference format, then server, which is disconnected, detects index sequence if meeting the reference format of setting with the connection of corresponding client
Arranging corresponding UUID whether there is in server, if it does not exist, then disconnect and the connection of corresponding client, and if it exists, will index
The corresponding track tuple of sequence is back to client.
Motion profile method for secret protection provided by the invention based in intelligent perception based on slice has following beneficial
Effect:
1. track tuple iteration in participant, can be effectively protected perception individual subscriber location privacy and track is hidden
Private, and resist malicious user and server colludes with bring track privacy leakage problem.
2. track can be rebuild in client, the practicability of client data ensure that;
3. not needing encryption process, computing cost is lower, safe and efficient.
Detailed description of the invention
Fig. 1 is the method for protecting track privacy flow chart based on slice in intelligent perception provided in an embodiment of the present invention.
Specific embodiment
In order to make the objectives, technical solutions, and advantages of the present invention clearer, with reference to the accompanying drawings and embodiments, right
The present invention is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, and
It is not used in the restriction present invention.
Intelligent perception system: a kind of large data acquisition system using a large amount of mobile terminal perception datas, intelligent perception
System is made of the intelligent perception application server in cloud with a collection of mobile terminal user.
Server: server of the perception data without exposure participant position and track privacy of participant is obtained.
The present invention makes full use of participant to carry out the iteration of track tuple, guarantees the location privacy safety of user, solves
The threat of collusion attack bring privacy leakage between malice participant and server.Furthermore user can realize rail in client
Mark is rebuild, and ensure that the practicability of client data.
Fig. 1 is the method for protecting track privacy flow chart based on slice in intelligent perception provided in an embodiment of the present invention, should
Method includes the following steps:
S1, track data is sliced using position as minimum unit, obtains track tuple, and generate each track member
The identifier of group;
Collected track data is sliced by client using position (GPS) as minimum unit, by track data point
It is cut into track tuple, is expressed as TTi=(xi, yi, ti, si, hi), i=1,2,3 ... n, wherein (xi, yi) indicate tiThe position at moment
Set coordinate, si, hiRespectively indicate tiThe movement velocity and heart rate at moment, and by the universal unique identifier of generation
(Universally Unique Identifiers, UUID) distributes to each track tuple, and TTI is that the index of track tuple is
For the identifier UUID of track tuple;
S2, the index of track tuple and the mapping of operation label are formed into query logic, and is stored in client;
In the present invention is implemented, it is mapped to each track tuple and at least one operation label, such as based on position
Operation label and the operation label based on timestamp, by the identifier UUID of the track tuple and with operation label mapping shape
Client is stored at query logic, and by query logic.
S3, track tuple and its index are uploaded to server by the client of random number of thresholds;
User by track tuple and its index upload onto the server when, at this time at random generate three random numbers, respectively
It is α, β, λ, wherein α is initial value, and λ is reduced value, and β is threshold values, and track tuple and its index often pass through a participant
When, the value of α can reduce λ, and when the value of α is reduced to less than β value, participant at this time will be direct by track tuple and its index
It uploads onto the server.Different users can choose different α, the value of β, λ.
S4, the index sequence that track tuple is obtained based on query logic, are sent to server, server base for index sequence
Corresponding track tuple sequence is searched in index;
In embodiments of the present invention, based on the safety of data, server is needed to the index sequence to come from user's upload
Column carry out format detection, the i.e. access to avoid illegal user.The format of the UUID checked, if the format of UUID is not inconsistent
The reference format of setting is closed, then server can turn off connection, if the format of UUID meets the reference format of setting, inspection
It surveys in server and then turns off the company of connection with corresponding client if it does not exist with the presence or absence of the corresponding UUID of index sequence
It connects, otherwise the corresponding track tuple of retrieval sequence can be returned to user.
S5, the track tuple that server returns is received.
In embodiments of the present invention, key message is provided to opponent in attack process due to timestamp, if rail
When the operation label of mark tuple is timestamp, before step S3 further include:
The timestamp of track tuple is upset, by original time and after upsetting the mapping storage of time in client,
Track tuple identity is TTi=(xi, yi, ti', si, hi), i=1,2,3 ... .n, wherein ti' be disturbance after timestamp, disturbance
Timestamp attacker or server can be prevented from initiating the attack based on timestamp;It is corresponding also to wrap after step s 5
It includes:
The timestamp of track tuple is restored, can realize the reconstruct of track data.
Motion profile method for secret protection provided by the invention based in intelligent perception based on slice has following beneficial
Effect:
1. track tuple iteration in participant, can be effectively protected perception individual subscriber location privacy and track is hidden
Private, and resist malicious user and server colludes with bring track privacy leakage problem.
2. track can be rebuild in client, the practicability of client data ensure that;
3. not needing encryption process, computing cost is lower, safe and efficient.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all in essence of the invention
Made any modifications, equivalent replacements, and improvements etc., should all be included in the protection scope of the present invention within mind and principle.
Claims (4)
1. based on the method for protecting track privacy of slice in a kind of intelligent perception, which is characterized in that the method includes walking as follows
It is rapid:
S1, track data is sliced using position as minimum unit, obtains track tuple, and generate each track tuple
Identifier;
S2, query logic is formed by the index of track tuple and with the mapping of operation label, and is stored in client, the index
The as identifier row of track tuple;
S3, track tuple and corresponding index are uploaded to server by the client of random number of thresholds;
S4, the index sequence that track tuple is obtained based on query logic, are sent to server for index sequence;
S5, the track tuple that server returns is received, the track tuple is the corresponding track tuple of index sequence.
2. based on the method for protecting track privacy of slice in intelligent perception as described in claim 1, which is characterized in that if step S2
In operation label be timestamp, then before step S3 further include: upset to the timestamp of track tuple, while in visitor
The mapping of time after family end retains original time and upsets;After step s 5 further include: the timestamp of track tuple is carried out
Reduction, realizes the reconstruct of track data.
3. based on the method for protecting track privacy of slice in intelligent perception as claimed in claim 1 or 2, which is characterized in that inciting somebody to action
When track tuple is uploaded, three parameter alphas of client random selection or generation, β, λ, wherein α is initial value, and λ is step-length, β
For threshold values, when track tuple often passes through a participation client, the value of α reduces λ, when α is less than β value, participates in client for rail
Mark tuple is uploaded onto the server.
4. based on the method for protecting track privacy of slice in intelligent perception as claimed in claim 1 or 2, which is characterized in that service
Whether the index in device detection index sequence meets the reference format of setting, if not meeting the reference format of setting, server
Disconnect with the connection of corresponding client, if meeting the reference format of setting, detecting the corresponding UUID of index sequence whether there is
In server, if it does not exist, then disconnect and the connection of corresponding client, and if it exists, return the corresponding track tuple of index sequence
It is back to client.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910059756.6A CN109769212B (en) | 2019-01-22 | 2019-01-22 | Track privacy protection method based on slice in crowd-sourcing perception |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910059756.6A CN109769212B (en) | 2019-01-22 | 2019-01-22 | Track privacy protection method based on slice in crowd-sourcing perception |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109769212A true CN109769212A (en) | 2019-05-17 |
CN109769212B CN109769212B (en) | 2020-12-01 |
Family
ID=66454311
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910059756.6A Expired - Fee Related CN109769212B (en) | 2019-01-22 | 2019-01-22 | Track privacy protection method based on slice in crowd-sourcing perception |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109769212B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111814184A (en) * | 2020-07-07 | 2020-10-23 | 重庆大学 | Differential privacy method for protecting mobile crowd sensing track privacy |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100225471A1 (en) * | 2009-03-04 | 2010-09-09 | Oki Electric Industry Co., Ltd. | Information providing server, server system, and method |
CN101873317A (en) * | 2010-06-07 | 2010-10-27 | 孟小峰 | Position privacy protection method for perceiving service quality |
CN104219661A (en) * | 2014-09-01 | 2014-12-17 | 北京邮电大学 | TDOA (time difference of arrival) location tracking resistant source location privacy protection routing method |
CN104380690A (en) * | 2012-06-15 | 2015-02-25 | 阿尔卡特朗讯 | Architecture of privacy protection system for recommendation services |
CN107229872A (en) * | 2016-03-26 | 2017-10-03 | 肖哲 | It is a kind of to separate storage query logic and the private data guard method of segment data |
CN109165527A (en) * | 2018-08-28 | 2019-01-08 | 东北大学 | Support the track protecting sensitive data method of personalized privacy |
CN109214205A (en) * | 2018-08-01 | 2019-01-15 | 安徽师范大学 | Position and data-privacy guard method in a kind of intelligent perception based on k- anonymity |
-
2019
- 2019-01-22 CN CN201910059756.6A patent/CN109769212B/en not_active Expired - Fee Related
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100225471A1 (en) * | 2009-03-04 | 2010-09-09 | Oki Electric Industry Co., Ltd. | Information providing server, server system, and method |
CN101873317A (en) * | 2010-06-07 | 2010-10-27 | 孟小峰 | Position privacy protection method for perceiving service quality |
CN104380690A (en) * | 2012-06-15 | 2015-02-25 | 阿尔卡特朗讯 | Architecture of privacy protection system for recommendation services |
CN104219661A (en) * | 2014-09-01 | 2014-12-17 | 北京邮电大学 | TDOA (time difference of arrival) location tracking resistant source location privacy protection routing method |
CN107229872A (en) * | 2016-03-26 | 2017-10-03 | 肖哲 | It is a kind of to separate storage query logic and the private data guard method of segment data |
CN109214205A (en) * | 2018-08-01 | 2019-01-15 | 安徽师范大学 | Position and data-privacy guard method in a kind of intelligent perception based on k- anonymity |
CN109165527A (en) * | 2018-08-28 | 2019-01-08 | 东北大学 | Support the track protecting sensitive data method of personalized privacy |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111814184A (en) * | 2020-07-07 | 2020-10-23 | 重庆大学 | Differential privacy method for protecting mobile crowd sensing track privacy |
Also Published As
Publication number | Publication date |
---|---|
CN109769212B (en) | 2020-12-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Panah et al. | On the properties of non-media digital watermarking: a review of state of the art techniques | |
Lee | Mining spatio-temporal information on microblogging streams using a density-based online clustering method | |
Gambs et al. | Show me how you move and I will tell you who you are | |
CN105100032B (en) | A kind of method and device for preventing resource from stealing | |
CN105827594A (en) | Suspicion detection method based on domain name readability and domain name analysis behavior | |
CN102761573B (en) | A kind of monitoring method of the user browsing behavior data of media information | |
CN103179132A (en) | Method and device for detecting and defending CC (challenge collapsar) | |
CN104636764B (en) | A kind of image latent writing analysis method and its device | |
CN106375157B (en) | A kind of network flow correlating method based on phase space reconfiguration | |
Ye et al. | Application layer DDoS detection using clustering analysis | |
Zheng et al. | Dynamic network security mechanism based on trust management in wireless sensor networks | |
Zhao et al. | A Classification Detection Algorithm Based on Joint Entropy Vector against Application‐Layer DDoS Attack | |
CN110866263B (en) | User privacy information protection method and system capable of resisting longitudinal attack | |
Sy et al. | CAPTRA: coordinated packet traceback | |
CN109769212A (en) | Method for protecting track privacy based on slice in a kind of intelligent perception | |
CN109995722A (en) | Magnanimity detection data analysis system towards APT protection | |
CN111786990B (en) | Defense method and system for WEB active push skip page | |
CN109858510A (en) | A kind of detection method for http protocol ETag value covert communications | |
CN109120579A (en) | Detection method, device and the computer readable storage medium of malice domain name | |
CN107341375A (en) | A kind of method and system for the attacker that traced to the source based on Web page picture secret mark | |
CN111209566A (en) | Intelligent anti-crawler system and method for multi-layer threat interception | |
CN109922066A (en) | Dynamic watermark insertion and detection method in a kind of communication network based on time slot feature | |
CN116074051A (en) | Equipment fingerprint generation method and equipment | |
CN108809955A (en) | A kind of power consumer behavior depth analysis method based on hidden Markov model | |
CN113873341A (en) | Method for improving real-time video transmission security |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20201201 |