CN110069940A - Intimacy protection system and method in horde sensing network based on incentive mechanism - Google Patents
Intimacy protection system and method in horde sensing network based on incentive mechanism Download PDFInfo
- Publication number
- CN110069940A CN110069940A CN201910195892.8A CN201910195892A CN110069940A CN 110069940 A CN110069940 A CN 110069940A CN 201910195892 A CN201910195892 A CN 201910195892A CN 110069940 A CN110069940 A CN 110069940A
- Authority
- CN
- China
- Prior art keywords
- task
- module
- participant
- task participant
- horde
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 230000007246 mechanism Effects 0.000 title claims abstract description 42
- 238000000034 method Methods 0.000 title claims abstract description 31
- 230000008447 perception Effects 0.000 claims abstract description 73
- 230000005284 excitation Effects 0.000 claims abstract description 23
- 230000008569 process Effects 0.000 claims abstract description 13
- 230000006870 function Effects 0.000 claims description 21
- 238000012216 screening Methods 0.000 claims description 18
- 238000005315 distribution function Methods 0.000 claims description 12
- 230000002452 interceptive effect Effects 0.000 abstract description 3
- 238000011156 evaluation Methods 0.000 description 6
- 238000010586 diagram Methods 0.000 description 3
- 230000008859 change Effects 0.000 description 2
- 230000007613 environmental effect Effects 0.000 description 2
- 239000004744 fabric Substances 0.000 description 2
- 238000012544 monitoring process Methods 0.000 description 2
- 241000208340 Araliaceae Species 0.000 description 1
- 208000001613 Gambling Diseases 0.000 description 1
- 235000005035 Panax pseudoginseng ssp. pseudoginseng Nutrition 0.000 description 1
- 235000003140 Panax quinquefolius Nutrition 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 230000002860 competitive effect Effects 0.000 description 1
- 238000013016 damping Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000000151 deposition Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000005611 electricity Effects 0.000 description 1
- 230000002068 genetic effect Effects 0.000 description 1
- 235000008434 ginseng Nutrition 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 230000007774 longterm Effects 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 230000001737 promoting effect Effects 0.000 description 1
- 230000001953 sensory effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/04—Forecasting or optimisation specially adapted for administrative or management purposes, e.g. linear programming or "cutting stock problem"
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/063—Operations research, analysis or management
- G06Q10/0631—Resource planning, allocation, distributing or scheduling for enterprises or organisations
- G06Q10/06311—Scheduling, planning or task assignment for a person or group
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
- G06Q30/0283—Price estimation or determination
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/01—Social networking
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Human Resources & Organizations (AREA)
- Strategic Management (AREA)
- Theoretical Computer Science (AREA)
- Economics (AREA)
- Development Economics (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Entrepreneurship & Innovation (AREA)
- Marketing (AREA)
- General Business, Economics & Management (AREA)
- Game Theory and Decision Science (AREA)
- Health & Medical Sciences (AREA)
- Tourism & Hospitality (AREA)
- General Health & Medical Sciences (AREA)
- Operations Research (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Bioethics (AREA)
- Quality & Reliability (AREA)
- Educational Administration (AREA)
- Primary Health Care (AREA)
- Computing Systems (AREA)
- Medical Informatics (AREA)
- Databases & Information Systems (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The present invention relates to intimacy protection system and method based on incentive mechanism in a kind of horde sensing network, system includes task issuer module, task participant's module, inquiry request module, credit worthiness module, secret protection module, game excitation module;The task issuer module, task participant module are connect with inquiry request module respectively, and the inquiry request module connects credit worthiness module, and the credit worthiness module connects secret protection module, the secret protection module Linking game excitation module.Method includes establishing credit worthiness mechanism according to direct trust value, indirect trust values and the history trust value between task publisher and task participant, improving the quality of perception data;According to difference privacy mechanism, the privacy information of task participant is protected;According to the interactive process between task publisher and task participant, single order sealed price auction theory is constructed, calculates optimal transaction value, horde sensing network is added in excitation task participant.
Description
Technical field
The invention belongs to incentive mechanism is based in horde sensing network field more particularly to a kind of horde sensing network
Intimacy protection system and method.
Background technique
With the fast development of mobile Internet, social networks, smart phone is increasingly becoming the mainstream of mobile communication, herein
Under background, emerging perceptual model --- horde sensing network (the Mobile Crowd of perception data is collected based on smart phone
Sensing Network) it is of great significance in terms of improving user experience quality.Horde sensing network is with the terminal of user
Equipment (such as smart phone, tablet computer, wearable device) perceptually unit is carried out consciously or is not intended to by internet
The distribution and collection of perception task are realized in the cooperation of knowledge.Currently, equipment of itself can be consumed when participating in perception task due to user
Resource (such as electricity, storage), and there are the risks of privacy of user leakage, so that user participates in the enthusiasm of perception task
It is lower, while hindering the effective use of horde sensing network resource.Therefore, it designs reasonable incentive mechanism and effective protection is used
Family individual privacy information is of great significance to the operation steady in a long-term for promoting horde sensing network.
Summary of the invention
For defect present in horde sensing network, in order to improve the enthusiasm and effectively that user participates in perception task
User privacy information is protected, the present invention provides intimacy protection system and side in a kind of horde sensing network based on incentive mechanism
Method.
In order to achieve the above objectives, the present invention adopts the following technical scheme:
Intimacy protection system based on incentive mechanism in a kind of horde sensing network, including task issuer module are appointed
Business participant's module, inquiry request module, credit worthiness module, secret protection module, game excitation module;The inquiry request mould
Block is separately connected task issuer module and task participant module;The credit worthiness module Connection inquiring request module;It is described
Secret protection module connects credit worthiness module;The game excitation module connects secret protection module.Specifically, according to horde
Social networks and history mutual information in sensing network between task publisher and task participant establish credit worthiness mechanism, arrange
Except low credit value task participant, the quality of perception data is improved;According to difference privacy mechanism, the privacy of task participant is protected
Information;According to the interactive process between task publisher and task participant, constructs betting model and obtains optimal price paid,
Perception task is added in excitation task participant.
Wherein task issuer module, for issuing perception task information;Task participant's module, in collection network
Perception data;Inquiry request module, for screening the task participant set nearest apart from task publisher;Credit worthiness mould
Block, the prestige angle value for calculating task participant;Secret protection module, for protecting task to participate according to difference privacy mechanism
The privacy information of person;Game excitation module, for determining most according to the Game Relationship between task publisher and task participant
Perception task is added in excellent price paid, excitation task participant.
May also include feedback module, the feedback module is connect with the game excitation module, inquiry request module respectively,
Form closed-loop system.Specifically, judge whether perception task is completed in horde sensing network, be then to terminate process;It is no, then
Inquiry request information is adjusted by feedback module and reconfigures task participant set, continues the task participation that selection meets condition
Person completes perception task.
The secret protection module includes difference privacy unit, task participant's screening unit, credit worthiness threshold cell, is appointed
Business participant's selecting unit;Wherein difference privacy unit, for constructing difference privacy letter according to the distribution function of task participant
Number;Task participant's screening unit obtains alternative task participant set for screening according to difference privacy function;Credit worthiness threshold
Value cell, for credit worthiness threshold value to be arranged according to the time-to-live of perception task;Task participant's selecting unit, for according to letter
Reputation degree threshold condition determines from alternative task participant set and task participant is chosen to gather.The difference privacy unit with appoint
Participant's screening unit of being engaged in connection, the task participant screening unit are connect with credit worthiness threshold cell, the credit worthiness threshold
Value cell is connect with task participant's selecting unit.
Method for secret protection based on incentive mechanism in a kind of horde sensing network, includes the following steps:
S100. the information of perception task is issued by task issuer module;
S200. pass through the perception data in task participant module collection network;
S300. it according to the solicited message of task participant, screens to obtain apart from task publisher by inquiry request module
Nearest task participant set;
S400. according to direct trust value, indirect trust values and the history trust value of task publisher and task participant, lead to
Cross the prestige angle value that credit worthiness module is calculated between task publisher and task participant;
S500. according to difference privacy mechanism, pass through the privacy information of secret protection module effective protection task participant;
S600. it according to the Game Relationship between task publisher and task participant, is determined most by game excitation module
Excellent price paid.
It may also include step S600A after step S600: judging whether perception task is completed in horde sensing network,
It is then to terminate process;It is no, then step S700. is carried out by feedback module return step S300, and adjustment inquiry request information is again
Configuration task participant set continues the task participant completion perception task that selection meets condition.
The specific steps of the step S500 are as follows:
S510. difference privacy function is constructed according to the distribution function of task participant;
S520. it is screened to obtain alternative task participant set according to difference privacy function;
S530. credit worthiness threshold value is arranged according to the time-to-live of perception task;
S540. being determined according to credit worthiness threshold value from alternative task participant set chooses task participant to gather.
Compared with prior art, the present invention has following substantive distinguishing features and remarkable advantage outstanding:
Intimacy protection system and method based on incentive mechanism in a kind of horde sensing network of the present invention, send out according to task
Social networks and history mutual information between cloth person and task participant, establish credit worthiness mechanism.According to depositing for perception task
Credit worthiness threshold value is arranged in live time, effectively excludes the task participant of low prestige, improves the quality of perception task.According to task
The distribution function of participant establishes difference privacy function, is effectively protected the privacy information of task participant.In addition, according to appointing
The process of exchange being engaged between publisher and task participant is modeled as the auction of single order sealed price, optimal payment is calculated
Perception task is added in price, excitation task participant.
Detailed description of the invention
Fig. 1 is the schematic diagram of the method for secret protection based on incentive mechanism in the horde sensing network of open loop of the present invention.
Fig. 2 is the schematic diagram of the method for secret protection based on incentive mechanism in the horde sensing network of closed loop of the present invention.
Fig. 3 is the specific schematic diagram of secret protection module in Fig. 1 or Fig. 2.
Fig. 4 is the flow chart of the method for secret protection based on incentive mechanism in the horde sensing network of open loop of the present invention.
Fig. 5 is the flow chart of the method for secret protection based on incentive mechanism in the horde sensing network of closed loop of the present invention.
Fig. 6 is the specific flow chart of step S500 in Fig. 4 or Fig. 5.
Specific embodiment
With reference to the accompanying drawing, specific embodiments of the present invention are further described.
In the horde sensing network of open loop in the intimacy protection system based on incentive mechanism, as shown in Figure 1, including appointing
Business issuer module 100, task participant module 200, inquiry request module 300, credit worthiness module 400, secret protection module
500, game excitation module 600;The task issuer module 100, task participant module 200 respectively with inquiry request module
300 connections, the inquiry request module 300 connect credit worthiness module 400, and the credit worthiness module 400 connects secret protection mould
Block 500, the 500 Linking game excitation module 600 of secret protection module.
Task issuer module 100, for issuing the information of perception task.Specifically, the collection of task publisher is combined into i=
{1,K,i,K,I}.Whithin a period of time, perception task (such as urban transportation, environmental monitoring etc.) collection of task publisher is combined into m=
{ 1, K, m, K, M }, it is λ that the issuing process of perception task, which obeys parameter,iPoisson distribution.And perception task m has certain deposit
Live time, then the remaining time-to-live of current perception task m is tm=(Γm+τ0)-t, wherein τ0When with t being respectively initial
Between and current time.
Task participant module 200, for the perception data in collection network.Specifically, the collection of task participant is combined into j
={ 1, K, j, K, J }.Task participant holds smart phone, and (such as GPS, camera add equipped with feature-rich sensor
Speedometer etc.), the collection of perception data is carried out according to the demand of task publisher.
Inquiry request module 300 screens to obtain for the solicited message according to task participant by inquiry request module
The task participant set nearest apart from task publisher.Specifically, in time t, the query information of task participant j is described as
Qj,t={ Υ, Ψ, T }, wherein Υ is the authentication information of task participant j, and the specific location that Ψ is task participant j is believed
Breath, T are the current queries time of task participant j.Here, Ψ={ l (xj, yj), zj, l (xj, yj) indicate actual geographic position
It sets, zjFor average movement speed.
Therefore, the task participant set that task publisher i is screened are as follows:
Wherein, di,j,tFor the positional distance between task publisher i and task participant j, Ci,tIt is set for task publisher i
Fixed radius.
Credit worthiness module 400, for according between task publisher and task participant social networks and history interact
Prestige angle value is calculated in information.Specifically, according to direct trust value, indirect trust values and history trust value, there are following three kinds
Situation:
Situation 1: in horde sensing network, there are certain social networks between task publisher and task participant
(such as kinship, genetic connection, geographical location relationship etc.).Social pass between definition task publisher i and task participant j
System is οi,j(οI, j∈ [0,1]), trust value is expressed as trI, j(trI, j∈ [0,1]), and οi,jIt is more intimate to be worth bigger expression relationship,
Trust value trI, jIt is bigger.
Therefore, direct trust value may be calculated: Ti,j=tr, j×οi,j。
Situation 2: in horde sensing network, task publisher can receive the recommendation of neighbours' task publisher in network
Information carries out thoroughly evaluating to task participant.The collection that definition task participant's j history completes perception task is combined into qm={ q1,
K,qm,K,qM}。
Recommendation index of the task publisher i' to task participant j are as follows:
Wherein,AndExpression task publisher i' and task participant j
Between interactive process be entirely satisfactory,Interaction between expression task publisher i' and task participant j
Process is completely dissatisfied.
In addition, there are certain similarities for evaluation of the task publisher i' and task participant j to the same perception task.
To perception task qmEvaluation similarity calculation are as follows:
Wherein,Expression task publisher i' and task participant j are to perception task qmOpinion rating, and
Therefore, it may be calculated according to recommendation index and similarity, indirect trust values:
Situation 3: in horde sensing network, task publisher can obtain task from the evaluation of history perception task
The trust value of participant.The perception task collection that definition task publisher's i history distributes to task participant j is combined into ρm={ ρ1,K,
ρm,K,ρM}。
If perception task ρmIt is completed (i.e. within the time-to-live of task),For task participant j completion
The time of perception task, then task publisher i calculates the evaluation of task participant j are as follows:μi
For adjustment factor.
If perception task ρmIt is completed (i.e. not within the time-to-live of task),It is complete for task participant j
At the time of perception task, then task publisher i calculates the evaluation of task participant j are as follows:
ηiFor adjustment factor.
Task publisher i to perception task ρmEvaluation can indicate are as follows:
Therefore, history trust value may be calculated:
In conjunction with direct trust value, indirect trust values, history trust value, credit worthiness of the task publisher i to task participant j
Value may be calculated:
Wherein, ξi,And χiFor weight coefficient, and
Secret protection module 500, for being participated in by secret protection module effective protection task according to difference privacy mechanism
The privacy information of person.As shown in figure 3, secret protection module 500 includes difference privacy unit 501, task participant's screening unit
502, credit worthiness threshold cell 503 and task participant selecting unit 504.The difference privacy unit 501 and task participant
Screening unit 502 connects, and the task participant screening unit 502 is connect with credit worthiness threshold cell 503, the credit worthiness threshold
Value cell 503 is connect with task participant selecting unit 504.
Difference privacy unit 501, for constructing difference privacy function according to the distribution function of task participant.Specifically,
According to task participant j ratio shared in set S (i, j, t), distribution function is calculated are as follows:
According to distribution function, difference privacy function be can be constructed as:
Wherein, Δ Η=max | Η (i, j, t)-Η (i, j', t) | indicate distribution function between task participant j and j'
Maximum difference value.
Task participant screening unit 502 obtains alternative task participant set for screening according to difference privacy function.
Specifically, definition set NtFor in task participant's quantity of time t task publisher i demand, if meeting condition | S (i, j,
t)|≥Νt, then difference privacy function Pr [Η (i, j, t)] is calculated according to distribution function, is selected according to difference privacy function certain
The task participant of quantity.
Credit worthiness threshold cell 503, for credit worthiness threshold value to be arranged according to the time-to-live of perception task.Specifically, draw
Enter decaying exponential function, establish the credit worthiness threshold value of dynamic change, the time-to-live of perception task is longer, and credit worthiness threshold value is got over
Height, otherwise, credit worthiness threshold value are lower.
Therefore, credit worthiness threshold value may be calculated:
Wherein, εiFor adjustment factor, γ is the exponential damping factor.
Task participant selecting unit 504, for from alternative task participant set, determining choosing according to credit worthiness threshold value
Middle task participant set.Specifically, task publisher i sets credit worthiness threshold value ThiIf the credit worthiness of task participant j
Value meets condition ψi,j≥Thi, then select task participant j that set Ν is addedt。
Game excitation module 600, for passing through game according to the Game Relationship between task publisher and task participant
Excitation module determines optimal price paid.It specifically, will by the utility function to go out on missions publisher and task participant
The process of exchange of task publisher and task participant are modeled as single order sealed price Auction Game Theory, and optimal payment is calculated
Price.
Task publisher i issues perception task information and pays the certain remuneration of task participant, task as auctioner
Publisher's utility function is defined as:
Wherein, ζiFor satisfaction parameter,For adjustment factor, bj,m,tBid for task participant j about perception task m
Value.
Task publisher j collects perception data and is recompensed from task publisher as competitive bidding people, task publisher effect
With function is defined as: U (bj,m,t)=bJ, m, t-vJ, m,
Wherein, vj,mValuation for task participant j about perception task m, and obey section [Vmin,Vmax] uniformly point
Cloth.
By analyzing gambling process, the optimal bidding strategy that bidder in the auction of single order sealed price is calculated (is thrown
Mark people's Nash Equilibrium strategy) are as follows:
Therefore, by comparing the utility function value of task publisher, optimal candidate tasks participant can be indicated are as follows:Task publisher repeats single order sealed price Auction Game Theory, by remaining unappropriated perception
Task is arranged in the time t more taken turns, until all perception tasks are complete.
In the horde sensing network of closed loop in the intimacy protection system based on incentive mechanism, as shown in Fig. 2, and open loop
Horde sensing network in the difference of the intimacy protection system based on incentive mechanism be, based on swashing in the horde sensing network
The intimacy protection system for encouraging mechanism further includes feedback module 700, the feedback module 700 respectively with the game excitation module
600, inquiry request module 300 connects.Specifically, judge whether perception task is completed in horde sensing network, be then to terminate
Process;It is no, then inquiry request information is adjusted by feedback module 700 and reconfigure task participant set, continued selection and meet
The task participant of condition completes perception task.
As it can be seen that introducing inquiry request module 300, according to the query information of task participant, screening obtains task participant
Set;Credit worthiness module 400 is introduced, the task participant of low credit worthiness is excluded, guarantees the quality of perception data;Privacy is introduced to protect
Module 500 is protected, according to difference privacy mechanism, protects the privacy information of task participant;Game excitation module 600 is introduced, according to
Nash Equilibrium strategy determines the optimal bid amounts of task participant, and the task participant of triumph will obtain certain remuneration, excitation
Perception task is added in task participant;When perception task does not complete in horde sensing network, feedback module 700 is reconfigured
Task participant set, so that the task participant for meeting condition continuously adds in perception task, to improve perception task
Performance.In conjunction with inquiry request module 300, credit worthiness module 400, secret protection module 500, game excitation module 600 and anti-
It presents module 700 and provides advantageous guarantee for the secret protection based on incentive mechanism in horde sensory perceptual system.
Based on above-mentioned horde sensing network, the secret protection based on incentive mechanism in a kind of horde sensing network is provided
Method.In the horde sensing network of open loop in the intimacy protection system based on incentive mechanism, as shown in figure 4, specific step
It is rapid as follows:
S100 issues the information of perception task.Specifically, task publisher is according to the demand of itself perception data, to appointing
Business participant issues perception task information (such as urban transportation, environmental monitoring etc.).
S200, the perception data information in collection network.Specifically, task participant holds smart phone, and is equipped with
Functional sensor abundant (such as GPS, camera, accelerometer etc.) collects corresponding perception according to the demand of task publisher
Data.
S300, according to the solicited message of task participant, screening obtains the task participant nearest apart from task publisher
Set.Specifically, task publisher sets radius, and task participant sends query information, meets the task ginseng of condition
It will be added in specified set with person.
S400, the prestige angle value between calculating task publisher and task participant.Specifically, according to task publisher with
Direct trust value, indirect trust values and history trust value weighted sum between task participant, are calculated prestige angle value.
S500 passes through the privacy information of difference privacy mechanism effective protection task participant.Specifically, in conjunction with Fig. 6, step
S500 includes the following steps:
S510 constructs difference privacy function according to the distribution function of task participant.Specifically, according to task participant's
The distribution function of task participant is calculated in query information;According to distribution function, difference privacy function is constructed.
S520 screens to obtain alternative task participant set according to difference privacy function.Specifically, according to difference privacy letter
Number, screening task participant obtains alternative task participant set from task participant set.
Credit worthiness threshold value is arranged according to the time-to-live of perception task in S530.Specifically, decaying exponential function is introduced, is built
The credit worthiness threshold value of vertical dynamic change at any time.
S540 is determined from alternative task participant set and task participant is chosen to gather according to credit worthiness threshold condition.
Specifically, it if task participant's enjoys a good reputation in credit worthiness threshold value, selects task participant to be added and task is chosen to join
Gather with person.
Optimal price paid is calculated according to the Game Relationship between task publisher and task participant in S600.
Specifically, by the utility function to go out on missions publisher and task participant, single order sealed price Auction Game Theory is analyzed, is calculated
Obtain optimal price paid.
This method in the horde sensing network of closed loop in the intimacy protection system based on incentive mechanism, as shown in figure 5,
Difference with the intimacy protection system in the horde sensing network of open loop based on incentive mechanism is, goes back after step S600
Include:
S600A: specifically, judge whether perception task is completed in horde sensing network, be then to terminate process;It is no, then
Step S700. is carried out by 700 return step S300 of feedback module, adjustment inquiry request information reconfigures task participant collection
It closes, continues the task participant completion perception task that selection meets condition.
As it can be seen that reconfiguring task participation when the perception task of task publisher in horde sensing network does not complete
Person's set improves the performance of perception task, in conjunction with credit worthiness so that the task participant for meeting condition is added in perception task
Mechanism guarantees the quality of perception data, protects task participant privacy information in conjunction with difference privacy mechanism, swashs in conjunction with game strategies
It encourages task participant to be added in perception task, be provided for the intimacy protection system based on incentive mechanism in horde sensing network
It is advantageous to ensure.
Claims (6)
1. the intimacy protection system based on incentive mechanism in a kind of horde sensing network, which is characterized in that issued including task
Person's module (100), task participant module (200), inquiry request module (300), credit worthiness module (400), secret protection mould
Block (500), game excitation module (600);The task issuer module (100), task participant module (200) respectively with look into
Request module (300) connection is ask, the inquiry request module (300) connects credit worthiness module (400), the credit worthiness module
(400) secret protection module (500) are connected, secret protection module (500) the Linking game excitation module (600).
2. the intimacy protection system based on incentive mechanism in horde sensing network according to claim 1, feature exist
In further including feedback module (700);The feedback module (700) respectively with the game excitation module (600), inquiry request
Module (300) connection, forms closed-loop system.
3. the intimacy protection system based on incentive mechanism in horde sensing network according to claim 1 or 2, feature
It is, the secret protection module (500) includes difference privacy unit (501), task participant screening unit (502), prestige
Spend threshold cell (503) and task participant selecting unit (504);The difference privacy unit (501) and task participant sieve
Menu member (502) connection, the task participant screening unit (502) connect with credit worthiness threshold cell (503), the prestige
Degree threshold cell (503) is connect with task participant selecting unit (504).
4. a kind of method of the secret protection based on incentive mechanism in horde sensing network, which is characterized in that including walking as follows
It is rapid:
S100. perception task information is issued by task issuer module (100);
S200. pass through the perception data in task participant module (200) collection network;
S300. according to the inquiry request information of task participant, task publisher is obtained by inquiry request module (300) screening
The task participant set nearest apart from task publisher;
S400. the prestige angle value between task publisher and task participant is calculated by credit worthiness module (400);
S500. according to difference privacy mechanism, pass through the privacy of secret protection module (500) effective protection task participant;
S600. optimal transaction value is calculated according to game excitation module (600).
5. the method for the secret protection based on incentive mechanism, feature in horde sensing network according to claim 4
It is, further includes step S600A after step S600: judges that whether perception task is completed in horde sensing network, is, then
End process;It is no, then step S700. is carried out by feedback module (700) return step S300, and adjustment inquiry request information is again
Configuration task participant set continues the task participant completion perception task that selection meets condition.
6. the method for the secret protection based on incentive mechanism in horde sensing network according to claim 4 or 5, special
Sign is, the specific steps of the step S500 are as follows:
S510. according to the distribution function of task participant, difference privacy function is constructed;
S520. according to difference privacy function, screening obtains alternative task participant set;
S530. credit worthiness threshold value is arranged according to the time-to-live of perception task;
S540. it according to credit worthiness threshold value, is determined from alternative task participant set and task participant is chosen to gather.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910195892.8A CN110069940B (en) | 2019-03-15 | 2019-03-15 | Privacy protection system and method based on incentive mechanism in mobile group-aware network |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910195892.8A CN110069940B (en) | 2019-03-15 | 2019-03-15 | Privacy protection system and method based on incentive mechanism in mobile group-aware network |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110069940A true CN110069940A (en) | 2019-07-30 |
CN110069940B CN110069940B (en) | 2023-12-12 |
Family
ID=67365200
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910195892.8A Active CN110069940B (en) | 2019-03-15 | 2019-03-15 | Privacy protection system and method based on incentive mechanism in mobile group-aware network |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110069940B (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111246385A (en) * | 2020-01-10 | 2020-06-05 | 上海大学 | Reputation-incentive-based safe crowdsourcing indoor navigation system and method under attack-defense game model |
CN111314883A (en) * | 2020-02-24 | 2020-06-19 | 武汉大学深圳研究院 | Internet of vehicles privacy perception data scheduling method based on incentive mechanism |
CN112423027A (en) * | 2020-10-22 | 2021-02-26 | 武汉理工大学 | Mobile streaming media edge collaboration distribution device and method based on differential privacy |
CN113222720A (en) * | 2021-05-17 | 2021-08-06 | 陕西师范大学 | Reputation-based privacy protection incentive mechanism method, device and storage medium |
CN114021769A (en) * | 2021-09-16 | 2022-02-08 | 北京邮电大学 | Network measurement data collection method and system |
CN116541883A (en) * | 2023-05-10 | 2023-08-04 | 重庆大学 | Trust-based differential privacy protection method, device, equipment and storage medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6834272B1 (en) * | 1999-08-10 | 2004-12-21 | Yeda Research And Development Company Ltd. | Privacy preserving negotiation and computation |
CN107563616A (en) * | 2017-08-17 | 2018-01-09 | 上海大学 | A kind of user task distribution and the quorum-sensing system system and method for incentives strategy |
CN107749836A (en) * | 2017-09-15 | 2018-03-02 | 江苏大学 | User oriented secret protection and the mobility aware system and its mobile awareness method of data reliability |
CN108763943A (en) * | 2018-05-23 | 2018-11-06 | 山东师范大学 | A kind of data sharing motivational techniques of the safety based on contract theory |
-
2019
- 2019-03-15 CN CN201910195892.8A patent/CN110069940B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6834272B1 (en) * | 1999-08-10 | 2004-12-21 | Yeda Research And Development Company Ltd. | Privacy preserving negotiation and computation |
CN107563616A (en) * | 2017-08-17 | 2018-01-09 | 上海大学 | A kind of user task distribution and the quorum-sensing system system and method for incentives strategy |
CN107749836A (en) * | 2017-09-15 | 2018-03-02 | 江苏大学 | User oriented secret protection and the mobility aware system and its mobile awareness method of data reliability |
CN108763943A (en) * | 2018-05-23 | 2018-11-06 | 山东师范大学 | A kind of data sharing motivational techniques of the safety based on contract theory |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111246385A (en) * | 2020-01-10 | 2020-06-05 | 上海大学 | Reputation-incentive-based safe crowdsourcing indoor navigation system and method under attack-defense game model |
CN111314883A (en) * | 2020-02-24 | 2020-06-19 | 武汉大学深圳研究院 | Internet of vehicles privacy perception data scheduling method based on incentive mechanism |
CN111314883B (en) * | 2020-02-24 | 2023-04-07 | 武汉大学深圳研究院 | Internet of vehicles privacy perception data scheduling method based on incentive mechanism |
CN112423027A (en) * | 2020-10-22 | 2021-02-26 | 武汉理工大学 | Mobile streaming media edge collaboration distribution device and method based on differential privacy |
CN113222720A (en) * | 2021-05-17 | 2021-08-06 | 陕西师范大学 | Reputation-based privacy protection incentive mechanism method, device and storage medium |
CN113222720B (en) * | 2021-05-17 | 2023-10-17 | 陕西师范大学 | Privacy protection incentive mechanism method and device based on reputation and storage medium |
CN114021769A (en) * | 2021-09-16 | 2022-02-08 | 北京邮电大学 | Network measurement data collection method and system |
CN116541883A (en) * | 2023-05-10 | 2023-08-04 | 重庆大学 | Trust-based differential privacy protection method, device, equipment and storage medium |
CN116541883B (en) * | 2023-05-10 | 2023-11-17 | 重庆大学 | Trust-based differential privacy protection method, device, equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN110069940B (en) | 2023-12-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110069940A (en) | Intimacy protection system and method in horde sensing network based on incentive mechanism | |
CN109068288B (en) | Method and system for selecting mobile crowd sensing incentive mechanism based on multi-attribute user | |
CN110189174A (en) | A kind of mobile intelligent perception motivational techniques based on quality of data perception | |
CN108269129A (en) | User's motivational techniques in a kind of mobile gunz sensing network based on reverse auction | |
Peldschus et al. | Sustainable Assessment of Construction Site by Applying Game The | |
CN105207821B (en) | A kind of network synthesis performance estimating method of service-oriented | |
CN104881800A (en) | Mobile-crowd-sourcing-sensing-based motivation system realization method | |
WO2001084413A1 (en) | Client-oriented estimation system and method using the internet | |
CN106709596A (en) | Taxi taking platform fare pre-estimating method and device | |
CN107563616A (en) | A kind of user task distribution and the quorum-sensing system system and method for incentives strategy | |
CN106097008A (en) | Man-machine interaction shopping guide and production guidance system and method | |
CN109165815A (en) | A kind of shared mutual assistance platform marketing management system of alliance the whole network | |
US20220058583A1 (en) | Project management systems and methods | |
CN105282246B (en) | The method of perception task distribution based on auction mechanism | |
KR20220074309A (en) | Real estate development consulting system | |
Xiong et al. | Reward optimization for content providers with mobile data subsidization: A hierarchical game approach | |
She | Survey on incentive strategies for mobile crowdsensing system | |
CN102073715A (en) | Intelligent information exchange method and system | |
CN111028080A (en) | Multi-arm slot machine and Shapley value-based crowd sensing data dynamic transaction method | |
CN103064918A (en) | Specialist seeking method and system designed on basis of social recommendation network and mechanism | |
CN109685300A (en) | Enterprise's big data application power index system and its construction method | |
CN110334929A (en) | Internet enterprises estimation method and system based on alternative data | |
CN116189346A (en) | Intelligent queuing and calling system for digital science and technology deep integration hall management and marketing scene | |
CN114697896A (en) | Multi-attribute resource auction method based on priority in heaven-earth integrated network | |
JP4625191B2 (en) | Land brokerage system, land brokerage method, and land brokerage program |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |