CN110069940A - Intimacy protection system and method in horde sensing network based on incentive mechanism - Google Patents

Intimacy protection system and method in horde sensing network based on incentive mechanism Download PDF

Info

Publication number
CN110069940A
CN110069940A CN201910195892.8A CN201910195892A CN110069940A CN 110069940 A CN110069940 A CN 110069940A CN 201910195892 A CN201910195892 A CN 201910195892A CN 110069940 A CN110069940 A CN 110069940A
Authority
CN
China
Prior art keywords
task
module
participant
task participant
horde
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910195892.8A
Other languages
Chinese (zh)
Other versions
CN110069940B (en
Inventor
苏洲
代明慧
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
University of Shanghai for Science and Technology
Original Assignee
University of Shanghai for Science and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by University of Shanghai for Science and Technology filed Critical University of Shanghai for Science and Technology
Priority to CN201910195892.8A priority Critical patent/CN110069940B/en
Publication of CN110069940A publication Critical patent/CN110069940A/en
Application granted granted Critical
Publication of CN110069940B publication Critical patent/CN110069940B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/04Forecasting or optimisation specially adapted for administrative or management purposes, e.g. linear programming or "cutting stock problem"
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0631Resource planning, allocation, distributing or scheduling for enterprises or organisations
    • G06Q10/06311Scheduling, planning or task assignment for a person or group
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0283Price estimation or determination
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/01Social networking
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Strategic Management (AREA)
  • Theoretical Computer Science (AREA)
  • Economics (AREA)
  • Development Economics (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Marketing (AREA)
  • General Business, Economics & Management (AREA)
  • Game Theory and Decision Science (AREA)
  • Health & Medical Sciences (AREA)
  • Tourism & Hospitality (AREA)
  • General Health & Medical Sciences (AREA)
  • Operations Research (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Bioethics (AREA)
  • Quality & Reliability (AREA)
  • Educational Administration (AREA)
  • Primary Health Care (AREA)
  • Computing Systems (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The present invention relates to intimacy protection system and method based on incentive mechanism in a kind of horde sensing network, system includes task issuer module, task participant's module, inquiry request module, credit worthiness module, secret protection module, game excitation module;The task issuer module, task participant module are connect with inquiry request module respectively, and the inquiry request module connects credit worthiness module, and the credit worthiness module connects secret protection module, the secret protection module Linking game excitation module.Method includes establishing credit worthiness mechanism according to direct trust value, indirect trust values and the history trust value between task publisher and task participant, improving the quality of perception data;According to difference privacy mechanism, the privacy information of task participant is protected;According to the interactive process between task publisher and task participant, single order sealed price auction theory is constructed, calculates optimal transaction value, horde sensing network is added in excitation task participant.

Description

Intimacy protection system and method in horde sensing network based on incentive mechanism
Technical field
The invention belongs to incentive mechanism is based in horde sensing network field more particularly to a kind of horde sensing network Intimacy protection system and method.
Background technique
With the fast development of mobile Internet, social networks, smart phone is increasingly becoming the mainstream of mobile communication, herein Under background, emerging perceptual model --- horde sensing network (the Mobile Crowd of perception data is collected based on smart phone Sensing Network) it is of great significance in terms of improving user experience quality.Horde sensing network is with the terminal of user Equipment (such as smart phone, tablet computer, wearable device) perceptually unit is carried out consciously or is not intended to by internet The distribution and collection of perception task are realized in the cooperation of knowledge.Currently, equipment of itself can be consumed when participating in perception task due to user Resource (such as electricity, storage), and there are the risks of privacy of user leakage, so that user participates in the enthusiasm of perception task It is lower, while hindering the effective use of horde sensing network resource.Therefore, it designs reasonable incentive mechanism and effective protection is used Family individual privacy information is of great significance to the operation steady in a long-term for promoting horde sensing network.
Summary of the invention
For defect present in horde sensing network, in order to improve the enthusiasm and effectively that user participates in perception task User privacy information is protected, the present invention provides intimacy protection system and side in a kind of horde sensing network based on incentive mechanism Method.
In order to achieve the above objectives, the present invention adopts the following technical scheme:
Intimacy protection system based on incentive mechanism in a kind of horde sensing network, including task issuer module are appointed Business participant's module, inquiry request module, credit worthiness module, secret protection module, game excitation module;The inquiry request mould Block is separately connected task issuer module and task participant module;The credit worthiness module Connection inquiring request module;It is described Secret protection module connects credit worthiness module;The game excitation module connects secret protection module.Specifically, according to horde Social networks and history mutual information in sensing network between task publisher and task participant establish credit worthiness mechanism, arrange Except low credit value task participant, the quality of perception data is improved;According to difference privacy mechanism, the privacy of task participant is protected Information;According to the interactive process between task publisher and task participant, constructs betting model and obtains optimal price paid, Perception task is added in excitation task participant.
Wherein task issuer module, for issuing perception task information;Task participant's module, in collection network Perception data;Inquiry request module, for screening the task participant set nearest apart from task publisher;Credit worthiness mould Block, the prestige angle value for calculating task participant;Secret protection module, for protecting task to participate according to difference privacy mechanism The privacy information of person;Game excitation module, for determining most according to the Game Relationship between task publisher and task participant Perception task is added in excellent price paid, excitation task participant.
May also include feedback module, the feedback module is connect with the game excitation module, inquiry request module respectively, Form closed-loop system.Specifically, judge whether perception task is completed in horde sensing network, be then to terminate process;It is no, then Inquiry request information is adjusted by feedback module and reconfigures task participant set, continues the task participation that selection meets condition Person completes perception task.
The secret protection module includes difference privacy unit, task participant's screening unit, credit worthiness threshold cell, is appointed Business participant's selecting unit;Wherein difference privacy unit, for constructing difference privacy letter according to the distribution function of task participant Number;Task participant's screening unit obtains alternative task participant set for screening according to difference privacy function;Credit worthiness threshold Value cell, for credit worthiness threshold value to be arranged according to the time-to-live of perception task;Task participant's selecting unit, for according to letter Reputation degree threshold condition determines from alternative task participant set and task participant is chosen to gather.The difference privacy unit with appoint Participant's screening unit of being engaged in connection, the task participant screening unit are connect with credit worthiness threshold cell, the credit worthiness threshold Value cell is connect with task participant's selecting unit.
Method for secret protection based on incentive mechanism in a kind of horde sensing network, includes the following steps:
S100. the information of perception task is issued by task issuer module;
S200. pass through the perception data in task participant module collection network;
S300. it according to the solicited message of task participant, screens to obtain apart from task publisher by inquiry request module Nearest task participant set;
S400. according to direct trust value, indirect trust values and the history trust value of task publisher and task participant, lead to Cross the prestige angle value that credit worthiness module is calculated between task publisher and task participant;
S500. according to difference privacy mechanism, pass through the privacy information of secret protection module effective protection task participant;
S600. it according to the Game Relationship between task publisher and task participant, is determined most by game excitation module Excellent price paid.
It may also include step S600A after step S600: judging whether perception task is completed in horde sensing network, It is then to terminate process;It is no, then step S700. is carried out by feedback module return step S300, and adjustment inquiry request information is again Configuration task participant set continues the task participant completion perception task that selection meets condition.
The specific steps of the step S500 are as follows:
S510. difference privacy function is constructed according to the distribution function of task participant;
S520. it is screened to obtain alternative task participant set according to difference privacy function;
S530. credit worthiness threshold value is arranged according to the time-to-live of perception task;
S540. being determined according to credit worthiness threshold value from alternative task participant set chooses task participant to gather.
Compared with prior art, the present invention has following substantive distinguishing features and remarkable advantage outstanding:
Intimacy protection system and method based on incentive mechanism in a kind of horde sensing network of the present invention, send out according to task Social networks and history mutual information between cloth person and task participant, establish credit worthiness mechanism.According to depositing for perception task Credit worthiness threshold value is arranged in live time, effectively excludes the task participant of low prestige, improves the quality of perception task.According to task The distribution function of participant establishes difference privacy function, is effectively protected the privacy information of task participant.In addition, according to appointing The process of exchange being engaged between publisher and task participant is modeled as the auction of single order sealed price, optimal payment is calculated Perception task is added in price, excitation task participant.
Detailed description of the invention
Fig. 1 is the schematic diagram of the method for secret protection based on incentive mechanism in the horde sensing network of open loop of the present invention.
Fig. 2 is the schematic diagram of the method for secret protection based on incentive mechanism in the horde sensing network of closed loop of the present invention.
Fig. 3 is the specific schematic diagram of secret protection module in Fig. 1 or Fig. 2.
Fig. 4 is the flow chart of the method for secret protection based on incentive mechanism in the horde sensing network of open loop of the present invention.
Fig. 5 is the flow chart of the method for secret protection based on incentive mechanism in the horde sensing network of closed loop of the present invention.
Fig. 6 is the specific flow chart of step S500 in Fig. 4 or Fig. 5.
Specific embodiment
With reference to the accompanying drawing, specific embodiments of the present invention are further described.
In the horde sensing network of open loop in the intimacy protection system based on incentive mechanism, as shown in Figure 1, including appointing Business issuer module 100, task participant module 200, inquiry request module 300, credit worthiness module 400, secret protection module 500, game excitation module 600;The task issuer module 100, task participant module 200 respectively with inquiry request module 300 connections, the inquiry request module 300 connect credit worthiness module 400, and the credit worthiness module 400 connects secret protection mould Block 500, the 500 Linking game excitation module 600 of secret protection module.
Task issuer module 100, for issuing the information of perception task.Specifically, the collection of task publisher is combined into i= {1,K,i,K,I}.Whithin a period of time, perception task (such as urban transportation, environmental monitoring etc.) collection of task publisher is combined into m= { 1, K, m, K, M }, it is λ that the issuing process of perception task, which obeys parameter,iPoisson distribution.And perception task m has certain deposit Live time, then the remaining time-to-live of current perception task m is tm=(Γm0)-t, wherein τ0When with t being respectively initial Between and current time.
Task participant module 200, for the perception data in collection network.Specifically, the collection of task participant is combined into j ={ 1, K, j, K, J }.Task participant holds smart phone, and (such as GPS, camera add equipped with feature-rich sensor Speedometer etc.), the collection of perception data is carried out according to the demand of task publisher.
Inquiry request module 300 screens to obtain for the solicited message according to task participant by inquiry request module The task participant set nearest apart from task publisher.Specifically, in time t, the query information of task participant j is described as Qj,t={ Υ, Ψ, T }, wherein Υ is the authentication information of task participant j, and the specific location that Ψ is task participant j is believed Breath, T are the current queries time of task participant j.Here, Ψ={ l (xj, yj), zj, l (xj, yj) indicate actual geographic position It sets, zjFor average movement speed.
Therefore, the task participant set that task publisher i is screened are as follows:
Wherein, di,j,tFor the positional distance between task publisher i and task participant j, Ci,tIt is set for task publisher i Fixed radius.
Credit worthiness module 400, for according between task publisher and task participant social networks and history interact Prestige angle value is calculated in information.Specifically, according to direct trust value, indirect trust values and history trust value, there are following three kinds Situation:
Situation 1: in horde sensing network, there are certain social networks between task publisher and task participant (such as kinship, genetic connection, geographical location relationship etc.).Social pass between definition task publisher i and task participant j System is οi,j(οI, j∈ [0,1]), trust value is expressed as trI, j(trI, j∈ [0,1]), and οi,jIt is more intimate to be worth bigger expression relationship, Trust value trI, jIt is bigger.
Therefore, direct trust value may be calculated: Ti,j=tr, j×οi,j
Situation 2: in horde sensing network, task publisher can receive the recommendation of neighbours' task publisher in network Information carries out thoroughly evaluating to task participant.The collection that definition task participant's j history completes perception task is combined into qm={ q1, K,qm,K,qM}。
Recommendation index of the task publisher i' to task participant j are as follows:
Wherein,AndExpression task publisher i' and task participant j Between interactive process be entirely satisfactory,Interaction between expression task publisher i' and task participant j Process is completely dissatisfied.
In addition, there are certain similarities for evaluation of the task publisher i' and task participant j to the same perception task.
To perception task qmEvaluation similarity calculation are as follows:
Wherein,Expression task publisher i' and task participant j are to perception task qmOpinion rating, and
Therefore, it may be calculated according to recommendation index and similarity, indirect trust values:
Situation 3: in horde sensing network, task publisher can obtain task from the evaluation of history perception task The trust value of participant.The perception task collection that definition task publisher's i history distributes to task participant j is combined into ρm={ ρ1,K, ρm,K,ρM}。
If perception task ρmIt is completed (i.e. within the time-to-live of task),For task participant j completion The time of perception task, then task publisher i calculates the evaluation of task participant j are as follows:μi For adjustment factor.
If perception task ρmIt is completed (i.e. not within the time-to-live of task),It is complete for task participant j At the time of perception task, then task publisher i calculates the evaluation of task participant j are as follows: ηiFor adjustment factor.
Task publisher i to perception task ρmEvaluation can indicate are as follows:
Therefore, history trust value may be calculated:
In conjunction with direct trust value, indirect trust values, history trust value, credit worthiness of the task publisher i to task participant j Value may be calculated:
Wherein, ξi,And χiFor weight coefficient, and
Secret protection module 500, for being participated in by secret protection module effective protection task according to difference privacy mechanism The privacy information of person.As shown in figure 3, secret protection module 500 includes difference privacy unit 501, task participant's screening unit 502, credit worthiness threshold cell 503 and task participant selecting unit 504.The difference privacy unit 501 and task participant Screening unit 502 connects, and the task participant screening unit 502 is connect with credit worthiness threshold cell 503, the credit worthiness threshold Value cell 503 is connect with task participant selecting unit 504.
Difference privacy unit 501, for constructing difference privacy function according to the distribution function of task participant.Specifically, According to task participant j ratio shared in set S (i, j, t), distribution function is calculated are as follows:
According to distribution function, difference privacy function be can be constructed as:
Wherein, Δ Η=max | Η (i, j, t)-Η (i, j', t) | indicate distribution function between task participant j and j' Maximum difference value.
Task participant screening unit 502 obtains alternative task participant set for screening according to difference privacy function. Specifically, definition set NtFor in task participant's quantity of time t task publisher i demand, if meeting condition | S (i, j, t)|≥Νt, then difference privacy function Pr [Η (i, j, t)] is calculated according to distribution function, is selected according to difference privacy function certain The task participant of quantity.
Credit worthiness threshold cell 503, for credit worthiness threshold value to be arranged according to the time-to-live of perception task.Specifically, draw Enter decaying exponential function, establish the credit worthiness threshold value of dynamic change, the time-to-live of perception task is longer, and credit worthiness threshold value is got over Height, otherwise, credit worthiness threshold value are lower.
Therefore, credit worthiness threshold value may be calculated:
Wherein, εiFor adjustment factor, γ is the exponential damping factor.
Task participant selecting unit 504, for from alternative task participant set, determining choosing according to credit worthiness threshold value Middle task participant set.Specifically, task publisher i sets credit worthiness threshold value ThiIf the credit worthiness of task participant j Value meets condition ψi,j≥Thi, then select task participant j that set Ν is addedt
Game excitation module 600, for passing through game according to the Game Relationship between task publisher and task participant Excitation module determines optimal price paid.It specifically, will by the utility function to go out on missions publisher and task participant The process of exchange of task publisher and task participant are modeled as single order sealed price Auction Game Theory, and optimal payment is calculated Price.
Task publisher i issues perception task information and pays the certain remuneration of task participant, task as auctioner Publisher's utility function is defined as:
Wherein, ζiFor satisfaction parameter,For adjustment factor, bj,m,tBid for task participant j about perception task m Value.
Task publisher j collects perception data and is recompensed from task publisher as competitive bidding people, task publisher effect With function is defined as: U (bj,m,t)=bJ, m, t-vJ, m,
Wherein, vj,mValuation for task participant j about perception task m, and obey section [Vmin,Vmax] uniformly point Cloth.
By analyzing gambling process, the optimal bidding strategy that bidder in the auction of single order sealed price is calculated (is thrown Mark people's Nash Equilibrium strategy) are as follows:
Therefore, by comparing the utility function value of task publisher, optimal candidate tasks participant can be indicated are as follows:Task publisher repeats single order sealed price Auction Game Theory, by remaining unappropriated perception Task is arranged in the time t more taken turns, until all perception tasks are complete.
In the horde sensing network of closed loop in the intimacy protection system based on incentive mechanism, as shown in Fig. 2, and open loop Horde sensing network in the difference of the intimacy protection system based on incentive mechanism be, based on swashing in the horde sensing network The intimacy protection system for encouraging mechanism further includes feedback module 700, the feedback module 700 respectively with the game excitation module 600, inquiry request module 300 connects.Specifically, judge whether perception task is completed in horde sensing network, be then to terminate Process;It is no, then inquiry request information is adjusted by feedback module 700 and reconfigure task participant set, continued selection and meet The task participant of condition completes perception task.
As it can be seen that introducing inquiry request module 300, according to the query information of task participant, screening obtains task participant Set;Credit worthiness module 400 is introduced, the task participant of low credit worthiness is excluded, guarantees the quality of perception data;Privacy is introduced to protect Module 500 is protected, according to difference privacy mechanism, protects the privacy information of task participant;Game excitation module 600 is introduced, according to Nash Equilibrium strategy determines the optimal bid amounts of task participant, and the task participant of triumph will obtain certain remuneration, excitation Perception task is added in task participant;When perception task does not complete in horde sensing network, feedback module 700 is reconfigured Task participant set, so that the task participant for meeting condition continuously adds in perception task, to improve perception task Performance.In conjunction with inquiry request module 300, credit worthiness module 400, secret protection module 500, game excitation module 600 and anti- It presents module 700 and provides advantageous guarantee for the secret protection based on incentive mechanism in horde sensory perceptual system.
Based on above-mentioned horde sensing network, the secret protection based on incentive mechanism in a kind of horde sensing network is provided Method.In the horde sensing network of open loop in the intimacy protection system based on incentive mechanism, as shown in figure 4, specific step It is rapid as follows:
S100 issues the information of perception task.Specifically, task publisher is according to the demand of itself perception data, to appointing Business participant issues perception task information (such as urban transportation, environmental monitoring etc.).
S200, the perception data information in collection network.Specifically, task participant holds smart phone, and is equipped with Functional sensor abundant (such as GPS, camera, accelerometer etc.) collects corresponding perception according to the demand of task publisher Data.
S300, according to the solicited message of task participant, screening obtains the task participant nearest apart from task publisher Set.Specifically, task publisher sets radius, and task participant sends query information, meets the task ginseng of condition It will be added in specified set with person.
S400, the prestige angle value between calculating task publisher and task participant.Specifically, according to task publisher with Direct trust value, indirect trust values and history trust value weighted sum between task participant, are calculated prestige angle value.
S500 passes through the privacy information of difference privacy mechanism effective protection task participant.Specifically, in conjunction with Fig. 6, step S500 includes the following steps:
S510 constructs difference privacy function according to the distribution function of task participant.Specifically, according to task participant's The distribution function of task participant is calculated in query information;According to distribution function, difference privacy function is constructed.
S520 screens to obtain alternative task participant set according to difference privacy function.Specifically, according to difference privacy letter Number, screening task participant obtains alternative task participant set from task participant set.
Credit worthiness threshold value is arranged according to the time-to-live of perception task in S530.Specifically, decaying exponential function is introduced, is built The credit worthiness threshold value of vertical dynamic change at any time.
S540 is determined from alternative task participant set and task participant is chosen to gather according to credit worthiness threshold condition. Specifically, it if task participant's enjoys a good reputation in credit worthiness threshold value, selects task participant to be added and task is chosen to join Gather with person.
Optimal price paid is calculated according to the Game Relationship between task publisher and task participant in S600. Specifically, by the utility function to go out on missions publisher and task participant, single order sealed price Auction Game Theory is analyzed, is calculated Obtain optimal price paid.
This method in the horde sensing network of closed loop in the intimacy protection system based on incentive mechanism, as shown in figure 5, Difference with the intimacy protection system in the horde sensing network of open loop based on incentive mechanism is, goes back after step S600 Include:
S600A: specifically, judge whether perception task is completed in horde sensing network, be then to terminate process;It is no, then Step S700. is carried out by 700 return step S300 of feedback module, adjustment inquiry request information reconfigures task participant collection It closes, continues the task participant completion perception task that selection meets condition.
As it can be seen that reconfiguring task participation when the perception task of task publisher in horde sensing network does not complete Person's set improves the performance of perception task, in conjunction with credit worthiness so that the task participant for meeting condition is added in perception task Mechanism guarantees the quality of perception data, protects task participant privacy information in conjunction with difference privacy mechanism, swashs in conjunction with game strategies It encourages task participant to be added in perception task, be provided for the intimacy protection system based on incentive mechanism in horde sensing network It is advantageous to ensure.

Claims (6)

1. the intimacy protection system based on incentive mechanism in a kind of horde sensing network, which is characterized in that issued including task Person's module (100), task participant module (200), inquiry request module (300), credit worthiness module (400), secret protection mould Block (500), game excitation module (600);The task issuer module (100), task participant module (200) respectively with look into Request module (300) connection is ask, the inquiry request module (300) connects credit worthiness module (400), the credit worthiness module (400) secret protection module (500) are connected, secret protection module (500) the Linking game excitation module (600).
2. the intimacy protection system based on incentive mechanism in horde sensing network according to claim 1, feature exist In further including feedback module (700);The feedback module (700) respectively with the game excitation module (600), inquiry request Module (300) connection, forms closed-loop system.
3. the intimacy protection system based on incentive mechanism in horde sensing network according to claim 1 or 2, feature It is, the secret protection module (500) includes difference privacy unit (501), task participant screening unit (502), prestige Spend threshold cell (503) and task participant selecting unit (504);The difference privacy unit (501) and task participant sieve Menu member (502) connection, the task participant screening unit (502) connect with credit worthiness threshold cell (503), the prestige Degree threshold cell (503) is connect with task participant selecting unit (504).
4. a kind of method of the secret protection based on incentive mechanism in horde sensing network, which is characterized in that including walking as follows It is rapid:
S100. perception task information is issued by task issuer module (100);
S200. pass through the perception data in task participant module (200) collection network;
S300. according to the inquiry request information of task participant, task publisher is obtained by inquiry request module (300) screening The task participant set nearest apart from task publisher;
S400. the prestige angle value between task publisher and task participant is calculated by credit worthiness module (400);
S500. according to difference privacy mechanism, pass through the privacy of secret protection module (500) effective protection task participant;
S600. optimal transaction value is calculated according to game excitation module (600).
5. the method for the secret protection based on incentive mechanism, feature in horde sensing network according to claim 4 It is, further includes step S600A after step S600: judges that whether perception task is completed in horde sensing network, is, then End process;It is no, then step S700. is carried out by feedback module (700) return step S300, and adjustment inquiry request information is again Configuration task participant set continues the task participant completion perception task that selection meets condition.
6. the method for the secret protection based on incentive mechanism in horde sensing network according to claim 4 or 5, special Sign is, the specific steps of the step S500 are as follows:
S510. according to the distribution function of task participant, difference privacy function is constructed;
S520. according to difference privacy function, screening obtains alternative task participant set;
S530. credit worthiness threshold value is arranged according to the time-to-live of perception task;
S540. it according to credit worthiness threshold value, is determined from alternative task participant set and task participant is chosen to gather.
CN201910195892.8A 2019-03-15 2019-03-15 Privacy protection system and method based on incentive mechanism in mobile group-aware network Active CN110069940B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910195892.8A CN110069940B (en) 2019-03-15 2019-03-15 Privacy protection system and method based on incentive mechanism in mobile group-aware network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910195892.8A CN110069940B (en) 2019-03-15 2019-03-15 Privacy protection system and method based on incentive mechanism in mobile group-aware network

Publications (2)

Publication Number Publication Date
CN110069940A true CN110069940A (en) 2019-07-30
CN110069940B CN110069940B (en) 2023-12-12

Family

ID=67365200

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910195892.8A Active CN110069940B (en) 2019-03-15 2019-03-15 Privacy protection system and method based on incentive mechanism in mobile group-aware network

Country Status (1)

Country Link
CN (1) CN110069940B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111246385A (en) * 2020-01-10 2020-06-05 上海大学 Reputation-incentive-based safe crowdsourcing indoor navigation system and method under attack-defense game model
CN111314883A (en) * 2020-02-24 2020-06-19 武汉大学深圳研究院 Internet of vehicles privacy perception data scheduling method based on incentive mechanism
CN112423027A (en) * 2020-10-22 2021-02-26 武汉理工大学 Mobile streaming media edge collaboration distribution device and method based on differential privacy
CN113222720A (en) * 2021-05-17 2021-08-06 陕西师范大学 Reputation-based privacy protection incentive mechanism method, device and storage medium
CN114021769A (en) * 2021-09-16 2022-02-08 北京邮电大学 Network measurement data collection method and system
CN116541883A (en) * 2023-05-10 2023-08-04 重庆大学 Trust-based differential privacy protection method, device, equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6834272B1 (en) * 1999-08-10 2004-12-21 Yeda Research And Development Company Ltd. Privacy preserving negotiation and computation
CN107563616A (en) * 2017-08-17 2018-01-09 上海大学 A kind of user task distribution and the quorum-sensing system system and method for incentives strategy
CN107749836A (en) * 2017-09-15 2018-03-02 江苏大学 User oriented secret protection and the mobility aware system and its mobile awareness method of data reliability
CN108763943A (en) * 2018-05-23 2018-11-06 山东师范大学 A kind of data sharing motivational techniques of the safety based on contract theory

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6834272B1 (en) * 1999-08-10 2004-12-21 Yeda Research And Development Company Ltd. Privacy preserving negotiation and computation
CN107563616A (en) * 2017-08-17 2018-01-09 上海大学 A kind of user task distribution and the quorum-sensing system system and method for incentives strategy
CN107749836A (en) * 2017-09-15 2018-03-02 江苏大学 User oriented secret protection and the mobility aware system and its mobile awareness method of data reliability
CN108763943A (en) * 2018-05-23 2018-11-06 山东师范大学 A kind of data sharing motivational techniques of the safety based on contract theory

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111246385A (en) * 2020-01-10 2020-06-05 上海大学 Reputation-incentive-based safe crowdsourcing indoor navigation system and method under attack-defense game model
CN111314883A (en) * 2020-02-24 2020-06-19 武汉大学深圳研究院 Internet of vehicles privacy perception data scheduling method based on incentive mechanism
CN111314883B (en) * 2020-02-24 2023-04-07 武汉大学深圳研究院 Internet of vehicles privacy perception data scheduling method based on incentive mechanism
CN112423027A (en) * 2020-10-22 2021-02-26 武汉理工大学 Mobile streaming media edge collaboration distribution device and method based on differential privacy
CN113222720A (en) * 2021-05-17 2021-08-06 陕西师范大学 Reputation-based privacy protection incentive mechanism method, device and storage medium
CN113222720B (en) * 2021-05-17 2023-10-17 陕西师范大学 Privacy protection incentive mechanism method and device based on reputation and storage medium
CN114021769A (en) * 2021-09-16 2022-02-08 北京邮电大学 Network measurement data collection method and system
CN116541883A (en) * 2023-05-10 2023-08-04 重庆大学 Trust-based differential privacy protection method, device, equipment and storage medium
CN116541883B (en) * 2023-05-10 2023-11-17 重庆大学 Trust-based differential privacy protection method, device, equipment and storage medium

Also Published As

Publication number Publication date
CN110069940B (en) 2023-12-12

Similar Documents

Publication Publication Date Title
CN110069940A (en) Intimacy protection system and method in horde sensing network based on incentive mechanism
CN109068288B (en) Method and system for selecting mobile crowd sensing incentive mechanism based on multi-attribute user
CN110189174A (en) A kind of mobile intelligent perception motivational techniques based on quality of data perception
CN108269129A (en) User's motivational techniques in a kind of mobile gunz sensing network based on reverse auction
Peldschus et al. Sustainable Assessment of Construction Site by Applying Game The
CN105207821B (en) A kind of network synthesis performance estimating method of service-oriented
CN104881800A (en) Mobile-crowd-sourcing-sensing-based motivation system realization method
WO2001084413A1 (en) Client-oriented estimation system and method using the internet
CN106709596A (en) Taxi taking platform fare pre-estimating method and device
CN107563616A (en) A kind of user task distribution and the quorum-sensing system system and method for incentives strategy
CN106097008A (en) Man-machine interaction shopping guide and production guidance system and method
CN109165815A (en) A kind of shared mutual assistance platform marketing management system of alliance the whole network
US20220058583A1 (en) Project management systems and methods
CN105282246B (en) The method of perception task distribution based on auction mechanism
KR20220074309A (en) Real estate development consulting system
Xiong et al. Reward optimization for content providers with mobile data subsidization: A hierarchical game approach
She Survey on incentive strategies for mobile crowdsensing system
CN102073715A (en) Intelligent information exchange method and system
CN111028080A (en) Multi-arm slot machine and Shapley value-based crowd sensing data dynamic transaction method
CN103064918A (en) Specialist seeking method and system designed on basis of social recommendation network and mechanism
CN109685300A (en) Enterprise's big data application power index system and its construction method
CN110334929A (en) Internet enterprises estimation method and system based on alternative data
CN116189346A (en) Intelligent queuing and calling system for digital science and technology deep integration hall management and marketing scene
CN114697896A (en) Multi-attribute resource auction method based on priority in heaven-earth integrated network
JP4625191B2 (en) Land brokerage system, land brokerage method, and land brokerage program

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant