CN109769212A - Method for protecting track privacy based on slice in a kind of intelligent perception - Google Patents

Method for protecting track privacy based on slice in a kind of intelligent perception Download PDF

Info

Publication number
CN109769212A
CN109769212A CN201910059756.6A CN201910059756A CN109769212A CN 109769212 A CN109769212 A CN 109769212A CN 201910059756 A CN201910059756 A CN 201910059756A CN 109769212 A CN109769212 A CN 109769212A
Authority
CN
China
Prior art keywords
track
tuple
client
server
index
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910059756.6A
Other languages
Chinese (zh)
Other versions
CN109769212B (en
Inventor
王涛春
刘盈
金鑫
赵传信
吕成梅
陈付龙
罗永龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Anhui Normal University
CERNET Corp
Original Assignee
Anhui Normal University
CERNET Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Anhui Normal University, CERNET Corp filed Critical Anhui Normal University
Priority to CN201910059756.6A priority Critical patent/CN109769212B/en
Publication of CN109769212A publication Critical patent/CN109769212A/en
Application granted granted Critical
Publication of CN109769212B publication Critical patent/CN109769212B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)
  • Alarm Systems (AREA)

Abstract

The present invention is suitable for secret protection technical field; provide the method for protecting track privacy based on slice in a kind of intelligent perception; include the following steps: S1, track data is sliced using position as minimum unit, obtains track tuple, generate the identifier of each track tuple;S2, the mapping of the index of track tuple and operation label is formed into query logic, and is stored in client;S3, track tuple and corresponding index are uploaded to server by the client of random number of thresholds;S4, the index sequence that track tuple is obtained based on query logic, are sent to server for index sequence;S5, the track tuple that server returns is received, the track tuple is the corresponding track tuple of index sequence.Track tuple iteration in participant; perception individual subscriber location privacy and track privacy can be effectively protected; and resist malicious user and server colludes with bring track privacy leakage problem, track can be rebuild in client, ensure that the practicability of client data.

Description

Method for protecting track privacy based on slice in a kind of intelligent perception
Technical field
The invention belongs to secret protection technical field, the protecting track privacy based on slice in a kind of intelligent perception is provided Method.
Background technique
The concept of intelligent perception (Crowd Sensing, CS) is by being proposed based on the subjective initiative of people aprowl. Specifically, the mobile intelligent terminal that their propositions can be held individual is local all kinds of for completing as mobile sensor node The collection of data (such as sound, video, image etc.) is analyzed and is shared.Use healthy participatory sensing as data collection at present Method rapidly becoming reality, this will thoroughly change the scale and type of data, these data can summarize for several Population health, epidemiology, statistics and data analyze purpose.Intelligent perception application range possibility is very big, but intelligent perception Previous work without considering the application that may generate under healthy background in detail.Wearable technology is the maximum application of Internet of Things One of, the popularity of wearable device is in explosive growth at present, and more multisensor can be used and record our daily lifes Various aspects, unconscious mode influences our life.But with the widespread deployment of wearable device, occur Safety problem, the threat of most serious is the privacy leakage of wearable device data information and trace information, because of these information Contain individual privacy information abundant.
Domestic and international researcher also proposed many solutions for the protecting track privacy problem in intelligent perception.F The SLICER method of the propositions such as Qiu is first k anonymity secret protection scheme for being used for multi-medium data intelligent perception, integrates Data encoding technique and message exchange strategy, can with the privacy of effective protection participant, while keeping high data accuracy.But It is that this method reproduce data can not in client.As common recognition, one of the key challenge of secret protection be how It keeps realizing effective secret protection while data utility.The benefit of intelligent perception application system arises directly from gunz sense The value of primary data collection has obtained significant discovery.For example, individual sports track renders on map can be used for public body-building The decision of Facilities Construction regional choice, the method for existing protecting track privacy have very much, although all having reached track privacy guarantor The purpose of shield, but be the failure to guarantee track data in the practicability of client.
Summary of the invention
The embodiment of the present invention provides the method for protecting track privacy based on slice in a kind of intelligent perception, realizes track number According to the reproduction in client, it ensure that track data in the practicability of client.
To achieve the goals above, the present invention provides the protecting track privacy sides based on slice in a kind of intelligent perception Method, this method comprises the following steps:
S1, track data is sliced using position as minimum unit, obtains track tuple, and generate each track member The identifier of group;
S2, the index of track tuple and the mapping of operation label are formed into query logic, and is stored in client, the rope Draw the identifier as track tuple;
S3, track tuple and corresponding index are uploaded to server by the client of random number of thresholds;
S4, the index sequence that track tuple is obtained based on query logic, are sent to server for index sequence;
S5, the track tuple that server returns is received, the track tuple is the corresponding track tuple of index sequence.
Further, to prevent server from initiating the attack based on time-triggered protocol, if the operation label in step S2 is Between stab, then before step S3 further include: the timestamp of track tuple is upset, while client retain original time and The mapping of time after upset;After step s 5 further include: the timestamp of track tuple is restored, realizes track data Reconstruct.
Further, when being uploaded track tuple, three parameter alphas of client random selection or generation, β, λ, In, α is initial value, and λ is step-length, and β is threshold values, and when track tuple often passes through a participation client, the value of α reduces λ, when α is small When β value, participates in client and track tuple is uploaded onto the server.
Further, whether the index in server detection index sequence meets the reference format of setting, sets if not meeting Fixed reference format, then server, which is disconnected, detects index sequence if meeting the reference format of setting with the connection of corresponding client Arranging corresponding UUID whether there is in server, if it does not exist, then disconnect and the connection of corresponding client, and if it exists, will index The corresponding track tuple of sequence is back to client.
Motion profile method for secret protection provided by the invention based in intelligent perception based on slice has following beneficial Effect:
1. track tuple iteration in participant, can be effectively protected perception individual subscriber location privacy and track is hidden Private, and resist malicious user and server colludes with bring track privacy leakage problem.
2. track can be rebuild in client, the practicability of client data ensure that;
3. not needing encryption process, computing cost is lower, safe and efficient.
Detailed description of the invention
Fig. 1 is the method for protecting track privacy flow chart based on slice in intelligent perception provided in an embodiment of the present invention.
Specific embodiment
In order to make the objectives, technical solutions, and advantages of the present invention clearer, with reference to the accompanying drawings and embodiments, right The present invention is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, and It is not used in the restriction present invention.
Intelligent perception system: a kind of large data acquisition system using a large amount of mobile terminal perception datas, intelligent perception System is made of the intelligent perception application server in cloud with a collection of mobile terminal user.
Server: server of the perception data without exposure participant position and track privacy of participant is obtained.
The present invention makes full use of participant to carry out the iteration of track tuple, guarantees the location privacy safety of user, solves The threat of collusion attack bring privacy leakage between malice participant and server.Furthermore user can realize rail in client Mark is rebuild, and ensure that the practicability of client data.
Fig. 1 is the method for protecting track privacy flow chart based on slice in intelligent perception provided in an embodiment of the present invention, should Method includes the following steps:
S1, track data is sliced using position as minimum unit, obtains track tuple, and generate each track member The identifier of group;
Collected track data is sliced by client using position (GPS) as minimum unit, by track data point It is cut into track tuple, is expressed as TTi=(xi, yi, ti, si, hi), i=1,2,3 ... n, wherein (xi, yi) indicate tiThe position at moment Set coordinate, si, hiRespectively indicate tiThe movement velocity and heart rate at moment, and by the universal unique identifier of generation (Universally Unique Identifiers, UUID) distributes to each track tuple, and TTI is that the index of track tuple is For the identifier UUID of track tuple;
S2, the index of track tuple and the mapping of operation label are formed into query logic, and is stored in client;
In the present invention is implemented, it is mapped to each track tuple and at least one operation label, such as based on position Operation label and the operation label based on timestamp, by the identifier UUID of the track tuple and with operation label mapping shape Client is stored at query logic, and by query logic.
S3, track tuple and its index are uploaded to server by the client of random number of thresholds;
User by track tuple and its index upload onto the server when, at this time at random generate three random numbers, respectively It is α, β, λ, wherein α is initial value, and λ is reduced value, and β is threshold values, and track tuple and its index often pass through a participant When, the value of α can reduce λ, and when the value of α is reduced to less than β value, participant at this time will be direct by track tuple and its index It uploads onto the server.Different users can choose different α, the value of β, λ.
S4, the index sequence that track tuple is obtained based on query logic, are sent to server, server base for index sequence Corresponding track tuple sequence is searched in index;
In embodiments of the present invention, based on the safety of data, server is needed to the index sequence to come from user's upload Column carry out format detection, the i.e. access to avoid illegal user.The format of the UUID checked, if the format of UUID is not inconsistent The reference format of setting is closed, then server can turn off connection, if the format of UUID meets the reference format of setting, inspection It surveys in server and then turns off the company of connection with corresponding client if it does not exist with the presence or absence of the corresponding UUID of index sequence It connects, otherwise the corresponding track tuple of retrieval sequence can be returned to user.
S5, the track tuple that server returns is received.
In embodiments of the present invention, key message is provided to opponent in attack process due to timestamp, if rail When the operation label of mark tuple is timestamp, before step S3 further include:
The timestamp of track tuple is upset, by original time and after upsetting the mapping storage of time in client, Track tuple identity is TTi=(xi, yi, ti', si, hi), i=1,2,3 ... .n, wherein ti' be disturbance after timestamp, disturbance Timestamp attacker or server can be prevented from initiating the attack based on timestamp;It is corresponding also to wrap after step s 5 It includes:
The timestamp of track tuple is restored, can realize the reconstruct of track data.
Motion profile method for secret protection provided by the invention based in intelligent perception based on slice has following beneficial Effect:
1. track tuple iteration in participant, can be effectively protected perception individual subscriber location privacy and track is hidden Private, and resist malicious user and server colludes with bring track privacy leakage problem.
2. track can be rebuild in client, the practicability of client data ensure that;
3. not needing encryption process, computing cost is lower, safe and efficient.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all in essence of the invention Made any modifications, equivalent replacements, and improvements etc., should all be included in the protection scope of the present invention within mind and principle.

Claims (4)

1. based on the method for protecting track privacy of slice in a kind of intelligent perception, which is characterized in that the method includes walking as follows It is rapid:
S1, track data is sliced using position as minimum unit, obtains track tuple, and generate each track tuple Identifier;
S2, query logic is formed by the index of track tuple and with the mapping of operation label, and is stored in client, the index The as identifier row of track tuple;
S3, track tuple and corresponding index are uploaded to server by the client of random number of thresholds;
S4, the index sequence that track tuple is obtained based on query logic, are sent to server for index sequence;
S5, the track tuple that server returns is received, the track tuple is the corresponding track tuple of index sequence.
2. based on the method for protecting track privacy of slice in intelligent perception as described in claim 1, which is characterized in that if step S2 In operation label be timestamp, then before step S3 further include: upset to the timestamp of track tuple, while in visitor The mapping of time after family end retains original time and upsets;After step s 5 further include: the timestamp of track tuple is carried out Reduction, realizes the reconstruct of track data.
3. based on the method for protecting track privacy of slice in intelligent perception as claimed in claim 1 or 2, which is characterized in that inciting somebody to action When track tuple is uploaded, three parameter alphas of client random selection or generation, β, λ, wherein α is initial value, and λ is step-length, β For threshold values, when track tuple often passes through a participation client, the value of α reduces λ, when α is less than β value, participates in client for rail Mark tuple is uploaded onto the server.
4. based on the method for protecting track privacy of slice in intelligent perception as claimed in claim 1 or 2, which is characterized in that service Whether the index in device detection index sequence meets the reference format of setting, if not meeting the reference format of setting, server Disconnect with the connection of corresponding client, if meeting the reference format of setting, detecting the corresponding UUID of index sequence whether there is In server, if it does not exist, then disconnect and the connection of corresponding client, and if it exists, return the corresponding track tuple of index sequence It is back to client.
CN201910059756.6A 2019-01-22 2019-01-22 Track privacy protection method based on slice in crowd-sourcing perception Expired - Fee Related CN109769212B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910059756.6A CN109769212B (en) 2019-01-22 2019-01-22 Track privacy protection method based on slice in crowd-sourcing perception

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910059756.6A CN109769212B (en) 2019-01-22 2019-01-22 Track privacy protection method based on slice in crowd-sourcing perception

Publications (2)

Publication Number Publication Date
CN109769212A true CN109769212A (en) 2019-05-17
CN109769212B CN109769212B (en) 2020-12-01

Family

ID=66454311

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910059756.6A Expired - Fee Related CN109769212B (en) 2019-01-22 2019-01-22 Track privacy protection method based on slice in crowd-sourcing perception

Country Status (1)

Country Link
CN (1) CN109769212B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111814184A (en) * 2020-07-07 2020-10-23 重庆大学 Differential privacy method for protecting mobile crowd sensing track privacy

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100225471A1 (en) * 2009-03-04 2010-09-09 Oki Electric Industry Co., Ltd. Information providing server, server system, and method
CN101873317A (en) * 2010-06-07 2010-10-27 孟小峰 Position privacy protection method for perceiving service quality
CN104219661A (en) * 2014-09-01 2014-12-17 北京邮电大学 TDOA (time difference of arrival) location tracking resistant source location privacy protection routing method
CN104380690A (en) * 2012-06-15 2015-02-25 阿尔卡特朗讯 Architecture of privacy protection system for recommendation services
CN107229872A (en) * 2016-03-26 2017-10-03 肖哲 It is a kind of to separate storage query logic and the private data guard method of segment data
CN109165527A (en) * 2018-08-28 2019-01-08 东北大学 Support the track protecting sensitive data method of personalized privacy
CN109214205A (en) * 2018-08-01 2019-01-15 安徽师范大学 Position and data-privacy guard method in a kind of intelligent perception based on k- anonymity

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100225471A1 (en) * 2009-03-04 2010-09-09 Oki Electric Industry Co., Ltd. Information providing server, server system, and method
CN101873317A (en) * 2010-06-07 2010-10-27 孟小峰 Position privacy protection method for perceiving service quality
CN104380690A (en) * 2012-06-15 2015-02-25 阿尔卡特朗讯 Architecture of privacy protection system for recommendation services
CN104219661A (en) * 2014-09-01 2014-12-17 北京邮电大学 TDOA (time difference of arrival) location tracking resistant source location privacy protection routing method
CN107229872A (en) * 2016-03-26 2017-10-03 肖哲 It is a kind of to separate storage query logic and the private data guard method of segment data
CN109214205A (en) * 2018-08-01 2019-01-15 安徽师范大学 Position and data-privacy guard method in a kind of intelligent perception based on k- anonymity
CN109165527A (en) * 2018-08-28 2019-01-08 东北大学 Support the track protecting sensitive data method of personalized privacy

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111814184A (en) * 2020-07-07 2020-10-23 重庆大学 Differential privacy method for protecting mobile crowd sensing track privacy

Also Published As

Publication number Publication date
CN109769212B (en) 2020-12-01

Similar Documents

Publication Publication Date Title
Panah et al. On the properties of non-media digital watermarking: a review of state of the art techniques
Lee Mining spatio-temporal information on microblogging streams using a density-based online clustering method
Gambs et al. Show me how you move and I will tell you who you are
CN105100032B (en) A kind of method and device for preventing resource from stealing
CN105827594A (en) Suspicion detection method based on domain name readability and domain name analysis behavior
CN102761573B (en) A kind of monitoring method of the user browsing behavior data of media information
CN103179132A (en) Method and device for detecting and defending CC (challenge collapsar)
CN104636764B (en) A kind of image latent writing analysis method and its device
CN106375157B (en) A kind of network flow correlating method based on phase space reconfiguration
Ye et al. Application layer DDoS detection using clustering analysis
Zheng et al. Dynamic network security mechanism based on trust management in wireless sensor networks
Zhao et al. A Classification Detection Algorithm Based on Joint Entropy Vector against Application‐Layer DDoS Attack
CN110866263B (en) User privacy information protection method and system capable of resisting longitudinal attack
Sy et al. CAPTRA: coordinated packet traceback
CN109769212A (en) Method for protecting track privacy based on slice in a kind of intelligent perception
CN109995722A (en) Magnanimity detection data analysis system towards APT protection
CN111786990B (en) Defense method and system for WEB active push skip page
CN109858510A (en) A kind of detection method for http protocol ETag value covert communications
CN109120579A (en) Detection method, device and the computer readable storage medium of malice domain name
CN107341375A (en) A kind of method and system for the attacker that traced to the source based on Web page picture secret mark
CN111209566A (en) Intelligent anti-crawler system and method for multi-layer threat interception
CN109922066A (en) Dynamic watermark insertion and detection method in a kind of communication network based on time slot feature
CN116074051A (en) Equipment fingerprint generation method and equipment
CN108809955A (en) A kind of power consumer behavior depth analysis method based on hidden Markov model
CN113873341A (en) Method for improving real-time video transmission security

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20201201