CN111144888A - Mobile crowd sensing task allocation method with differential privacy protection function - Google Patents
Mobile crowd sensing task allocation method with differential privacy protection function Download PDFInfo
- Publication number
- CN111144888A CN111144888A CN201911349664.8A CN201911349664A CN111144888A CN 111144888 A CN111144888 A CN 111144888A CN 201911349664 A CN201911349664 A CN 201911349664A CN 111144888 A CN111144888 A CN 111144888A
- Authority
- CN
- China
- Prior art keywords
- winning
- workers
- worker
- requester
- task
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/08—Auctions
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Security & Cryptography (AREA)
- Strategic Management (AREA)
- Health & Medical Sciences (AREA)
- General Business, Economics & Management (AREA)
- Bioethics (AREA)
- Databases & Information Systems (AREA)
- Entrepreneurship & Innovation (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Marketing (AREA)
- Computer Hardware Design (AREA)
- Medical Informatics (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention discloses a differential privacy protection mobile crowd sensing task allocation method, which comprises the steps of 1, establishing an auction model according to task information submitted by a requester, request information submitted by a worker and a cloud platform; 2. determining final settlement price groups of the requesters and the workers by combining a differential privacy technology under the framework of perception task distribution based on auction; 3. determining corresponding winning requestors and workers based on the settlement price group; 4. after receiving the data submitted by the winning workers, the cloud platform calculates an aggregate result and sends the aggregate result to the winning requester; 5. the winning requester pays the corresponding reward and the winning worker receives the corresponding reward. The invention can effectively solve the problem of leakage of bid information of the worker and the requester on the premise of fully considering the perception of the data of the worker, thereby protecting the bid privacy of the worker and the requester, realizing better task distribution and simultaneously improving the data quality of the task of the requester.
Description
Technical Field
The invention relates to the technical field of mobile crowd sensing, in particular to a mobile crowd sensing task allocation method for realizing differential privacy protection.
Background
The mobile crowd sensing system utilizes various mobile devices equipped by the public crowd to complete large-scale sensing tasks, and flexible and extensible sensing coverage is realized at lower deployment cost. At present, the mobile crowd sensing systems are widely applied, including applications of environmental monitoring, traffic monitoring, road condition detection and the like.
For workers, performing a sensory task requires the consumption of certain resources, including computing power, batteries, etc., and to encourage more workers to participate, auctions are a reasonable way of motivating workers to participate and distribute the task. In the framework formed by the cloud platform, the requester and the worker, the cloud platform is used as an auctioneer, the requester is used as a buyer, and the worker is used as a seller to construct a model based on the two-way auction. In order to maximize the utility of the requester, the requester and the requester need to submit real price quote and ask, but the attacker can cause privacy information leakage by reasoning attack, namely deducing the real price quote and ask of the requester according to the result of auction, thereby reducing the enthusiasm of the worker and the requester to participate.
In order to solve the problem of inferring the bidding privacy of participants from the public result, the concept of differential privacy is introduced into the mobile crowd sensing application, but most privacy protection schemes only comprise two parties of a platform and a worker in the case of one-way auction, so that the bid information of the worker is protected. For a Mobile crowd-sourcing perception framework based on the two-way Auction, a differential privacy two-way Auction Scheme is proposed in the document DDPA (distributed privacy Private Double Auction) Scheme for Mobile crown sensing,2018, so as to protect the bidding privacy of two parties in Auction. However, this solution does not take into account the quality of the sensory data provided by the workers. In addition to designing a reasonable incentive mechanism capable of realizing privacy protection to attract more workers to participate in the mobile crowd sensing system, the mechanism also needs to consider the quality problem of the collected worker sensing data to ensure the benefit of a task requester.
Disclosure of Invention
In order to solve the defects of the prior art, the invention provides a differential privacy protection mobile crowd sensing task allocation method, so that the problem of leakage of bid information of workers and requesters can be effectively solved on the premise of fully considering the data sensed by the workers, the bid privacy of the workers and the requesters is protected, better task allocation is realized, and the data quality of the tasks of the requesters is improved.
The technical scheme adopted by the invention for solving the technical problem is as follows:
the invention discloses a differential privacy protection mobile crowd sensing task allocation method which is characterized in that the method is applied to a cloud platform, and m requesters m & ltm & gt ═ r & ltr & gt1,r2,...,rj,...,rmN worker Ν ═ u1,u2,...,ui,...,unIn a mobile crowd sensing environment, where rjDenotes the jth requestor, uiRepresenting the ith worker, j is 1,2, …, m, i is 1,2, …, n, and the mobile crowd sensing task allocation method is carried out according to the following steps:
step 1, establishing an auction model and initializing:
step 1.1, the cloud platform is used as an auctioneer to collect task information submitted by m requesters, wherein the jth requester rjIs recorded as Sj=<τj,sj>,τjDenotes the jth requester rjRequested aware task, sjIndicating completion of the perception task τ by the jth requesterjAnd s, andj∈Πs=[vmin,vmax],vminminimum value, v, representing all requesters' quotesmaxMaximum value, Π, of quotes representing all requesterssThe value space set representing the quotation, thereby obtaining m task information sets S ═ { S } provided by the requesters1,S2,...,Sj,...,SmAnd its corresponding perceptual task set T ═ τ1,τ2,...,τj,...,τm};
Step 1.2, the cloud platform issues the collected perception task set T to n workers, wherein the ith worker uiThe submitted request information is marked as Bi=<Γi,bi>,ΓiIndicates the ith worker uiA set of tasks of interest, anbiIndicates the ith worker uiExecuting task set ΓiAsking price of all tasks in, and bi∈Πb=[cmin,cmax],cminMinimum value representing the asking price of all workers, cmaxMaximum value, Π, representing the asking price for all workersbValue space set representing the price to be charged, thereby obtaining request information set BETA ═ { B) submitted by n workers1,B2,...,Bi,...,Bn};
Step 1.3, define settlement price group set of requester and workerWherein the content of the first and second substances,represents the l-th settlement price group,indicating the ultimate award to the winning worker,denotes a reward finally paid by a winning requester, L denotes the number of settlement price groups, and L ═ Πb×ΠsAnd has: II typeb×Πs={(pb,ps)|pb∈Πb∧ps∈Πs};
Step 2, according to the task information set S and the request information set BETA submitted by the requester and the worker, the cloud platform determines the settlement price group rho of the winning requester and the winning worker by using an index mechanismwin;
Step 2.1, initializing 1;
step 2.2, the l-th settlement price group rholPrice of (1)Determining that the ask does not exceed the ask among the n workersSet of workers ΝlAnd determine set of workers ΝlA candidate task set T formed by task sets requested by all workersl;
Step 2.3, from set of workers ΝlSequentially selecting the workers providing the best technical level until the candidate task set TlAll tasks in (b) meet the quality of service requirements, resulting in a set of candidate workers WB_lAnd a set of candidate requestors WS_l;
Step 2.4, the cloud platform from candidate worker set WB_lTo a candidate task set TlThe j (middle) thTask taujAnd constitutes the jth task τjWorker set C ofj_l,j={1,2,...,|Tl|},|TlI represents a candidate task set TlThe size of (d);
step 2.5, the l settlement price group rholPrice of (1)Determining a set of candidate requestors WS_lWherein the requester's bid is not less thanWinning requester set ofAnd corresponding task setBy the task collectionThe set of workers for all tasks in the set of winning workers constitutes a winning set of workers
Step 2.6, judge in winning worker setAnd winning requester setPlatform revenue generatedIf yes, directly executing the step 2.8; otherwise, the platform profit is negative, and step 2.7 is executed;
step 2.7, delete in turn the request that produces the greatest impact on the negative platform revenue valueThe player and the corresponding worker, thereby updating the winning set of workersAnd winning requester setUntil the platform profit is not less than 0, so as to obtain the final updated winning worker set and winning requester set and respectively assign the values toAnd
step 2.8, calculate the set of winning workers using equation (1)And winning requester setSocial welfare Well(B,S,ρl):
Step 2.9, assigning L +1 to L, judging whether L is greater than L, and if so, indicating that social benefits corresponding to L settlement price groups are obtained; otherwise, returning to the step 2.2;
step 2.10, obtaining settlement price group set by using the formula (2)Selecting the l-th settlement price group rholProbability of (p) Pr (p)l) Thereby obtaining a probability distribution { Pr (ρ) of the settlement price groupl) 1,2, …, L, and according to the probability distribution of the settlement price group { Pr (ρ |)l) 1,2, …, L, randomly selecting a settlement price group as the final winningSettlement price group rhowin:
In the formula (2), ε represents a privacy budget, and ρ' represents a settlement price group setAny one of the settlement price groups, Wel ' (B, S, ρ ') represents a value of social welfare calculated when the settlement price group is ρ ', Δ Wel represents sensitivity, and Δ Wel ═ m × v ″max-cmin;
Step 3, the final winning settlement price group rhowinCorresponding set of winning workersAnd winning requester setAs a final set of winners;
step 4, final winning worker setWherein the ith winning worker u submits the perception data to the cloud platformiThe submitted set of sensory data is noted asdi,jIndicating the ith winning worker uiPerforming the jth task τjThe perceptual data that is generated at the time of the generation, represents the size of the final winning worker set, j 1,2i|,|ΓiI denotes the ith winning worker uiAny thing of interestA service set size;
the cloud platform calculates a final winning requester set using equation (3)The j winning requester rjAggregated results of tasks of (1)And sent to the corresponding j-th winning requester rj:
In the formula (3), θi,jIndicating that the ith worker performed the jth task τjAnd thetai,j=Pr[di,j=Dj]∈[0,1],DjRepresenting tasks τjTrue perception data of (1), Pr [ d ]i,j=Dj]Indicating that the ith worker performed task τjData submitted at time di,jAnd task taujTrue perception data D of timejThe probability of being equal is determined, represents a winning requester set size;
step 5, when the final winning requester setAfter each winning requester receives the data, the cloud platform according to the final winning settlement price group rhowinCollecting consideration from all winning requestorsAnd will awardPaying to the set of final winning workersAll winning workers.
The mobile crowd sensing task allocation method with the differential privacy protection function is also characterized in that the step 2.3 is carried out according to the following process:
step 2.3.1, set of slaves ΝlSelecting workers with technical level satisfying formula (4) as workers capable of letting task taujCandidate workers meeting quality of service requirements;
in the formula (4), θi,jIth worker performs task τjβjE (0,1) represents the jth task taujAccuracy requirement of, WB_lRepresenting a set of candidate workers;
step 2.3.2, let qi,j=(2θi,j-1)2Indicates the ith worker uiFor jth task τjThe quality of service of (a) is,denotes the jth task τjQ ═ q, theni,j]n×mQuality of service matrix representing n workers for m tasks, Q ═ Qj]m×1Representing the quality of service requirement matrix of m tasks, equation (4) is simplified to equation (5):
in the formula (5), xiIndicates the ith worker uiWhether winning, if winning, it is 1, otherwise it is 0, yjDenotes the jth requester rjWhether the card wins, if so, the card is 1, otherwise, the card is 0;
Step 2.3.4, set of slaves ΝlSelecting a worker u satisfying the formula (6)maxAs candidate workers, and from the set of workers ΝlMiddle delete worker umaxPost-joining to the set WB_lIn order to update the set of workers Νl:
Step 2.3.5, assign value to set of updated workers to ΝlIs mixing Q withj-min{Qj,qmax,jAssign a value to Qj(ii) a Wherein q ismax,jRepresent worker umaxFor jth task τjQuality of service of (2);
step 2.3.6, judgmentIf yes, returning to the step 2.3.4; otherwise, the representation gets a candidate worker set WB_lAnd a set of candidate workers TlCorresponding candidate requester set WS_l。
The step 2.7 is carried out according to the following processes:
step 2.7.1, gather from winning requestersIn which the kth requester r is removedkGet the kth set of requestersThereby obtainingA set of requesters
step 2.7.2, obtaining the kth requester set by using the formula (7)Corresponding kth worker setThereby obtainingA set of workers
Step 2.7.3, determine the requester r that has the greatest impact on the negative platform revenue value using equation (8)max:
Step 2.7.4, gather from winning requestorsDeletion requester rmaxGet the set of requestersAnd corresponding set of workersAnd respectively assigned withAnd
step 2.7.5, judging whether the platform income is less than 0, if so, returning to step 2.7.1, otherwise, indicating that a winning requester set is obtainedAnd winning worker set
Compared with the scheme in the prior art, the invention has the beneficial effects that:
1. the invention applies a differential privacy technology under a mobile crowd sensing framework based on bidirectional auction, realizes privacy protection by a mode of probabilistically selecting and settling price groups through an index mechanism, ensures the safety of bid information of workers and requesters, and attracts more requesters and workers to participate.
2. According to the method, the privacy information of the requester and the worker is protected by using the differential privacy, and compared with the method for realizing the safety by using an encryption technology, the calculation and communication overhead of an encryption algorithm is reduced, and the task allocation efficiency is improved; in addition, the distribution method comprehensively considers the service quality of data submitted by workers and improves the total distribution utility.
3. In the task allocation process, the invention selects the workers with high reliability to execute the related tasks, and adopts the data aggregation method to calculate the data aggregation result, thereby improving the quality of the perception task, ensuring that the requirement of data accuracy provided by the platform can be met, ensuring the benefit of the requester, and improving the participation enthusiasm of the requester.
4. In the process of using the index mechanism, the social benefit is used as a utility function for determining the settlement price, so that the result of task allocation can generate better social benefit and has better practicability.
Drawings
FIG. 1 is a framework diagram of the present invention;
FIG. 2 is a flow chart of the main implementation steps of the present invention.
Detailed Description
In this embodiment, a mobile crowd sensing task allocation method with differential privacy protection, as shown in fig. 1, is applied to a cloud platform, where m requesters m ═ r1,r2,...,rj,...,rmN worker Ν ═ u1,u2,...,ui,...,unIn a mobile crowd sensing environment, where rjDenotes the jth requestor, uiRepresenting the ith worker, j is 1,2, …, m, i is 1,2, …, n, as shown in fig. 2, the mobile crowd sensing task allocation method is performed as follows:
step 1, establishing an auction model and initializing: according to information submitted by a requester and a worker, the credible cloud platform is regarded as an auctioneer, the requester is regarded as a buyer, the worker is regarded as a seller, and a two-way auction model is constructed;
step 1.1, the cloud platform is used as an auctioneer to collect task information submitted by m requesters, wherein the jth requester rjIs recorded as Sj=<τj,sj>,τjDenotes the jth requester rjRequested aware task, sjIndicating completion of the perception task τ by the jth requesterjAnd s, andj∈Πs=[vmin,vmax],vmin10 denotes the minimum of all requesters' quotes, vmax15 represents the maximum value of the quotes for all requesters, ΠsThe value space set representing the quotation, thereby obtaining m task information sets S ═ { S } provided by the requesters1,S2,...,Sj,...,SmAnd its corresponding perceptual task set T ═ τ1,τ2,...,τj,...,τm};
Step 1.2, the cloud platform will collectThe sensed task set T is issued to n workers, wherein the ith worker uiThe submitted request information is marked as Bi=<Γi,bi>,ΓiIndicates the ith worker uiA set of tasks of interest, anbiIndicates the ith worker uiExecuting task set ΓiAsking price of all tasks in, and bi∈Πb=[cmin,cmax],cmin5 represents the minimum value of the asking price of all workers, cmax10 represents the maximum value of the asking price for all workers, ΠbValue space set representing the price to be charged, thereby obtaining request information set BETA ═ { B) submitted by n workers1,B2,...,Bi,...,Bn};
Step 1.3, define settlement price group set of requester and workerWherein the content of the first and second substances,represents the l-th settlement price group,indicating the ultimate award to the winning worker,denotes a reward finally paid by a winning requester, L denotes the number of settlement price groups, and L ═ Πb×ΠsAnd has: II typeb×Πs={(pb,ps)|pb∈Πb∧ps∈Πs};
Step 2, according to the task information set S and the request information set BETA submitted by the requester and the worker, the cloud platform determines the settlement price of the winning requester and the winning worker by using an index mechanismGroup rhowin;
Step 2.1, initializing 1;
step 2.2, the price in the l-th settlement price group rho lDetermining that the ask does not exceed the ask among the n workersSet of workers ΝlAnd determine set of workers ΝlA candidate task set T formed by task sets requested by all workersl;
Step 2.3, from set of workers ΝlSequentially selecting the workers providing the best technical level until the candidate task set TlAll tasks in (b) meet the quality of service requirements, resulting in a set of candidate workers WB_lAnd a set of candidate requestors WS_l;
Step 2.3.1, set of slaves ΝlSelecting workers with technical level satisfying formula (1) as workers capable of letting task taujCandidate workers meeting quality of service requirements;
in the formula (1), θi,jIth worker performs task τjβjE (0,1) represents the jth task taujI.e. the jth requester rjThe probability that the obtained task data is not equal to the real data of the task is not more than βj,WB_lRepresenting a set of candidate workers;
step 2.3.2, let qi,j=(2θi,j-1)2Indicates the ith worker uiFor jth task τjThe quality of service of (a) is,denotes the jth task τjQuality of service ofWhen the amount is required, q is ═ qi,j]n×mQuality of service matrix representing n workers for m tasks, Q ═ Qj]m×1Representing the quality of service requirement matrix of m tasks, equation (1) is simplified to equation (2):
in the formula (2), xiIndicates the ith worker uiWhether winning, if winning, it is 1, otherwise it is 0, yjDenotes the jth requester rjWhether the card wins, if so, the card is 1, otherwise, the card is 0;
Step 2.3.4, set of slaves ΝlSelecting a worker u satisfying the formula (3)maxAs candidate workers, and from the set of workers ΝlMiddle delete worker umaxPost-joining to the set WB_lIn order to update the set of workers Νl:
Step 2.3.5, assign value to set of updated workers to ΝlIs mixing Q withj-min{Qj,qmax,jAssign a value to Qj(ii) a Wherein q ismax,jRepresent worker umaxFor jth task τjQuality of service of (2);
step 2.3.6, judgmentIf yes, returning to the step 2.3.4; otherwise, the representation gets a candidate worker set WB_lAnd a set of candidate workers TlCorresponding candidate requester set WS_l;
Step 2.4, cloud platform from candidate worker set WB_lTo a candidate task set TlTask j (j) in (1)jAnd constitutes the jth task τjWorker set C ofj_l,j={1,2,...,|Tl|},|TlI represents a candidate task set TlSize;
step 2.5, the l-th settlement price group rholPrice of (1)Determining a set of candidate requestors WS_lWherein the requester's bid is not less thanWinning requester set ofAnd corresponding task setBy task aggregationThe set of workers for all tasks in the set of winning workers constitutes a winning set of workers
Step 2.6, judge in winning worker setAnd winning requester setPlatform revenue generatedIf yes, directly executing the step 2.8; otherwise, the platform profit is negative, and step 2.7 is executed; in order to guarantee budget balance in task allocation, platform profit is ensured to be not less than0;
Step 2.7, sequentially deleting the requesters and corresponding workers having the greatest impact on negative platform revenue values, thereby updating the winning set of workersAnd winning requester setUntil the platform profit is not less than 0, so as to obtain the final updated winning worker set and winning requester set and respectively assign the values toAnd
step 2.7.1, gather from winning requestersIn which the kth requester r is removedkGet the kth set of requestersThereby obtainingA set of requesters Representing a winning requester setSize;
step 2.7.2, obtaining the kth requester set by using the formula (4)Corresponding kth worker setThereby obtainingA set of workers
In equation (4), to guarantee the set of requestersThe task of the requester in (1) meets the quality of service requirement, so the set of workersIs made up of a collection of workers for each task;
step 2.7.3, determine the requester r that has the greatest impact on the negative platform revenue value using equation (5)max:
Step 2.7.4, gather from winning requestorsDeletion requester rmaxGet the set of requestersAnd corresponding set of workersAnd respectively assigned withAnd
step 2.7.5, judging whether the platform income is less than 0, if so, returning to step 2.7.1, otherwise, indicating that a winning requester set is obtainedAnd winning worker set
Step 2.8, calculate the set of winning workers using equation (6)And winning requester setSocial welfare Well(B,S,ρl):
Step 2.9, assigning L +1 to L, judging whether L is greater than L, and if so, indicating that social benefits corresponding to L settlement price groups are obtained; otherwise, returning to the step 2.2;
step 2.10, obtaining settlement price group set by using formula (7)Selecting the l-th settlement price group rholProbability of (p) Pr (p)l) Thereby obtaining a probability distribution { Pr (ρ) of the settlement price groupl) 1,2, …, L, and according to the probability distribution of the settlement price group { Pr (ρ |)l) 1,2, …, L, randomly selecting a settlement price group as the final winning settlement price group ρwin:
In the formula (7), ε represents a privacy budget, and ρ' represents a settlement price group setAny one of the settlement price groups, Wel ' (B, S, ρ ') represents a value of social welfare calculated when the settlement price group is ρ ', Δ Wel represents sensitivity, and Δ Wel ═ m × v ″max-cmin(ii) a Privacy protection can be realized by randomly selecting the settlement price group by using an index mechanism, and the higher the social welfare generated at the same time, the higher the probability that the corresponding settlement price group is selected is;
step 3, the final winning settlement price group rhowinCorresponding set of winning workersAnd winning requester setAs a final winner set, determining workers corresponding to each task;
step 4, final winning worker setWherein the ith winning worker u submits the perception data to the cloud platformiThe submitted set of sensory data is noted asdi,jIndicating the ith winning worker uiPerforming the jth task τjThe perceptual data that is generated at the time of the generation, represents the size of the final winning worker set, j 1,2i|,|ΓiI denotes the ith winning worker uiThe size of the set of tasks of interest; (ii) a
Cloud platform computing final winning requester set using equation (8)The j winning requester rjAggregated results of tasks of (1)And sent to the corresponding j-th winning requester rj:
In the formula (8), θi,jIndicating that the ith worker performed the jth task τjAnd thetai,j=Pr[di,j=Dj]∈[0,1],DjRepresenting tasks τjTrue perception data of (1), Pr [ d ]i,j=Dj]Indicating that the ith worker performed task τjTime-committed data and task τjTrue perception data D of timejThe probability of being equal is determined, represents a winning requester set size; thetai,jThe higher the data quality provided, the greater the weight taken up in the polymerization process;
step 5, when the final winning requester setAfter each winning requester receives the data, the cloud platform according to the final winning settlement price group rhowinCollecting consideration from all winning requestorsAnd will awardPaying to the set of final winning workersAll winning workers.
In summary, the method for mobile crowd sensing task allocation provided by the invention protects the bid information of the requester and the worker by combining an exponential mechanism in differential privacy, and simultaneously selects the data of the worker with high reliability in the task allocation process to calculate the aggregation result by adopting a data aggregation method in consideration of the data quality of the worker, so as to ensure the accuracy of the data.
Claims (3)
1. A mobile crowd sensing task allocation method with differential privacy protection is characterized by being applied to a cloud platform, and m requesters m ═ r1,r2,...,rj,...,rmN worker Ν ═ u1,u2,...,ui,...,unIn a mobile crowd sensing environment, where rjDenotes the jth requestor, uiRepresenting the ith worker, j is 1,2, …, m, i is 1,2, …, n, and the mobile crowd sensing task allocation method is carried out according to the following steps:
step 1, establishing an auction model and initializing:
step 1.1, the cloud platform is used as an auctioneer to collect task information submitted by m requesters, wherein the jth requester rjIs recorded as Sj=<τj,sj>,τjDenotes the jth requester rjRequested aware task, sjIndicating completion of the perception task τ by the jth requesterjAnd s, andj∈Πs=[vmin,vmax],vminminimum value, v, representing all requesters' quotesmaxIndicating all requestersMaximum value of quoted price of |, nsThe value space set representing the quotation, thereby obtaining m task information sets S ═ { S } provided by the requesters1,S2,...,Sj,...,SmAnd its corresponding perceptual task set T ═ τ1,τ2,...,τj,...,τm};
Step 1.2, the cloud platform issues the collected perception task set T to n workers, wherein the ith worker uiThe submitted request information is marked as Bi=<Γi,bi>,ΓiIndicates the ith worker uiA set of tasks of interest, anbiIndicates the ith worker uiExecuting task set ΓiAsking price of all tasks in, and bi∈Πb=[cmin,cmax],cminMinimum value representing the asking price of all workers, cmaxMaximum value, Π, representing the asking price for all workersbValue space set representing the price to be charged, thereby obtaining request information set BETA ═ { B) submitted by n workers1,B2,...,Bi,...,Bn};
Step 1.3, define settlement price group set of requester and workerWherein the content of the first and second substances,represents the l-th settlement price group,indicating the ultimate award to the winning worker,indicating the final compensation paid by the winning requester, L TableShowing the number of price groups for settlement, and L ═ Πb×ΠsAnd has: II typeb×Πs={(pb,ps)|pb∈Πb∧ps∈Πs};
Step 2, according to the task information set S and the request information set BETA submitted by the requester and the worker, the cloud platform determines the settlement price group rho of the winning requester and the winning worker by using an index mechanismwin;
Step 2.1, initializing 1;
step 2.2, the l-th settlement price group rholPrice of (1)Determining that the ask does not exceed the ask among the n workersSet of workers ΝlAnd determine set of workers ΝlA candidate task set T formed by task sets requested by all workersl;
Step 2.3, from set of workers ΝlSequentially selecting the workers providing the best technical level until the candidate task set TlAll tasks in (b) meet the quality of service requirements, resulting in a set of candidate workers WB_lAnd a set of candidate requestors WS_l;
Step 2.4, the cloud platform from candidate worker set WB_lTo a candidate task set TlTask j (j) in (1)jAnd constitutes the jth task τjWorker set C ofj_l,j={1,2,...,|Tl|},|TlI represents a candidate task set TlThe size of (d);
step 2.5, the l settlement price group rholPrice of (1)Determining a set of candidate requestors WS_lWherein the requester's bid is not less thanWinning requester set ofAnd corresponding task setBy the task collectionThe set of workers for all tasks in the set of winning workers constitutes a winning set of workers
Step 2.6, judge in winning worker setAnd winning requester setPlatform revenue generatedIf yes, directly executing the step 2.8; otherwise, the platform profit is negative, and step 2.7 is executed;
step 2.7, sequentially deleting the requesters and corresponding workers having the greatest impact on negative platform revenue values, thereby updating the winning set of workersAnd winning requester setUp toThe platform profit is not less than 0, so as to obtain the final updated winning worker set and winning requester set and respectively assign the winning worker set and the winning requester set toAnd
step 2.8, calculate the set of winning workers using equation (1)And winning requester setSocial welfare Well(B,S,ρl):
Step 2.9, assigning L +1 to L, judging whether L is greater than L, and if so, indicating that social benefits corresponding to L settlement price groups are obtained; otherwise, returning to the step 2.2;
step 2.10, obtaining settlement price group set by using the formula (2)Selecting the l-th settlement price group rholProbability of (p) Pr (p)l) Thereby, a probability distribution { Pr (ρ L) | L ═ 1,2, …, L } of the settlement price group is obtained, and the probability distribution { Pr (ρ L) | L of the settlement price group is obtained from the settlement price groupl) 1,2, …, L, randomly selecting a settlement price group as the final winning settlement price group ρwin:
In the formula (2), ε represents a privacy budget, and ρ' representsSettlement price group aggregationAny one of the settlement price groups, Wel ' (B, S, ρ ') represents a value of social welfare calculated when the settlement price group is ρ ', Δ Wel represents sensitivity, and Δ Wel ═ m × v ″max-cmin;
Step 3, the final winning settlement price group rhowinCorresponding set of winning workersAnd winning requester setAs a final set of winners;
step 4, final winning worker setWherein the ith winning worker u submits the perception data to the cloud platformiThe submitted set of sensory data is noted asdi,jIndicating the ith winning worker uiPerforming the jth task τjThe perceptual data that is generated at the time of the generation, represents the size of the final winning worker set, j 1,2i|,|ΓiI denotes the ith winning worker uiThe size of the set of tasks of interest;
the cloud platform calculates a final winning requester set using equation (3)The j winning requester rjAggregated results of tasks of (1)And sent to the corresponding j-th winning requester rj:
In the formula (3), θi,jIndicating that the ith worker performed the jth task τjAnd thetai,j=Pr[di,j=Dj]∈[0,1],DjRepresenting tasks τjTrue perception data of (1), Pr [ d ]i,j=Dj]Indicating that the ith worker performed task τjData submitted at time di,jAnd task taujTrue perception data D of timejThe probability of being equal is determined, represents a winning requester set size;
2. The differential privacy protection mobile crowd sensing task distribution method according to claim 1, wherein the step 2.3 is performed as follows:
step 2.3.1, set of slaves ΝlSelecting workers with technical level satisfying formula (4) as workers capable of letting task taujCandidate workers meeting quality of service requirements;
in the formula (4), θi,jIth worker performs task τjβjE (0,1) represents the jth task taujAccuracy requirement of, WB_lRepresenting a set of candidate workers;
step 2.3.2, let qi,j=(2θi,j-1)2Indicates the ith worker uiFor jth task τjThe quality of service of (a) is,denotes the jth task τjQ ═ q, theni,j]n×mQuality of service matrix representing n workers for m tasks, Q ═ Qj]m×1Representing the quality of service requirement matrix of m tasks, equation (4) is simplified to equation (5):
in the formula (5), xiIndicates the ith worker uiWhether winning, if winning, it is 1, otherwise it is 0, yjDenotes the jth requester rjWhether the card wins, if so, the card is 1, otherwise, the card is 0;
Step 2.3.4, set of slaves ΝlSelecting a worker u satisfying the formula (6)maxAs candidate workers, and from the set of workers ΝlMiddle delete worker umaxPost-joining to the set WB_lIn order to update the set of workers Νl:
Step 2.3.5, assign value to set of updated workers to ΝlIs mixing Q withj-min{Qj,qmax,jAssign a value to Qj(ii) a Wherein q ismax,jRepresent worker umaxFor jth task τjQuality of service of (2);
3. The differential privacy protection mobile crowd sensing task distribution method according to claim 1, wherein the step 2.7 is performed as follows:
step 2.7.1, gather from winning requestersIn which the kth requester r is removedkGet the kth set of requestersThereby obtainingA set of requesters
step 2.7.2, obtaining the kth requester set by using the formula (7)Corresponding kth worker setThereby obtainingA set of workers
Step 2.7.3, determine the requester r that has the greatest impact on the negative platform revenue value using equation (8)max:
Step 2.7.4, gather from winning requestorsRequest for deletionPerson r is soughtmaxGet the set of requestersAnd corresponding set of workersAnd respectively assigned withAnd
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911349664.8A CN111144888B (en) | 2019-12-24 | 2019-12-24 | Mobile crowd sensing task allocation method with differential privacy protection function |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911349664.8A CN111144888B (en) | 2019-12-24 | 2019-12-24 | Mobile crowd sensing task allocation method with differential privacy protection function |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111144888A true CN111144888A (en) | 2020-05-12 |
CN111144888B CN111144888B (en) | 2022-08-02 |
Family
ID=70519782
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911349664.8A Active CN111144888B (en) | 2019-12-24 | 2019-12-24 | Mobile crowd sensing task allocation method with differential privacy protection function |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111144888B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113099459A (en) * | 2021-03-29 | 2021-07-09 | 南京邮电大学 | Crowd-sourcing spectrum sensing method, system and storage medium based on differential privacy |
CN114118843A (en) * | 2021-12-01 | 2022-03-01 | 东南大学 | Mobile crowd sensing task allocation method based on Monte Carlo position fingerprints |
CN116307294A (en) * | 2023-05-22 | 2023-06-23 | 合肥城市云数据中心股份有限公司 | LBS space crowdsourcing task allocation method based on differential privacy and firefly improvement |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107360551A (en) * | 2017-07-12 | 2017-11-17 | 安徽大学 | Location privacy protection method based on difference privacy in vehicular ad hoc network |
WO2018076916A1 (en) * | 2016-10-27 | 2018-05-03 | 中兴通讯股份有限公司 | Data publishing method and device, and terminal |
CN109508559A (en) * | 2018-11-02 | 2019-03-22 | 西安交通大学 | Multidimensional data local method for secret protection in intelligent perception system based on contiguous function |
WO2019122854A1 (en) * | 2017-12-18 | 2019-06-27 | Privitar Limited | Data product release method or system |
CN110022531A (en) * | 2019-03-01 | 2019-07-16 | 华南理工大学 | A kind of localization difference privacy municipal refuse data report and privacy calculation method |
CN110570284A (en) * | 2019-09-11 | 2019-12-13 | 安徽大学 | Heterogeneous virtual machine distribution method with differential privacy protection |
-
2019
- 2019-12-24 CN CN201911349664.8A patent/CN111144888B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2018076916A1 (en) * | 2016-10-27 | 2018-05-03 | 中兴通讯股份有限公司 | Data publishing method and device, and terminal |
CN107360551A (en) * | 2017-07-12 | 2017-11-17 | 安徽大学 | Location privacy protection method based on difference privacy in vehicular ad hoc network |
WO2019122854A1 (en) * | 2017-12-18 | 2019-06-27 | Privitar Limited | Data product release method or system |
CN109508559A (en) * | 2018-11-02 | 2019-03-22 | 西安交通大学 | Multidimensional data local method for secret protection in intelligent perception system based on contiguous function |
CN110022531A (en) * | 2019-03-01 | 2019-07-16 | 华南理工大学 | A kind of localization difference privacy municipal refuse data report and privacy calculation method |
CN110570284A (en) * | 2019-09-11 | 2019-12-13 | 安徽大学 | Heterogeneous virtual machine distribution method with differential privacy protection |
Non-Patent Citations (4)
Title |
---|
ZHILI CHEN: "Differentially Private Double Spectrum Auction with Approximate Social Welfare Maximization", 《IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY》 * |
刘倩: "在群智感知网中提供差分隐私保护的研究", 《信息技术》 * |
南文倩: "基于跨空间多元交互的群智感知动态激励模型", 《计算机学报》 * |
曹振: "带隐私保护的群智感知任务分配机制", 《小型微型计算机系统》 * |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113099459A (en) * | 2021-03-29 | 2021-07-09 | 南京邮电大学 | Crowd-sourcing spectrum sensing method, system and storage medium based on differential privacy |
CN113099459B (en) * | 2021-03-29 | 2022-07-22 | 南京邮电大学 | Crowd-sourcing spectrum sensing method, system and storage medium based on differential privacy |
CN114118843A (en) * | 2021-12-01 | 2022-03-01 | 东南大学 | Mobile crowd sensing task allocation method based on Monte Carlo position fingerprints |
CN114118843B (en) * | 2021-12-01 | 2024-04-30 | 东南大学 | Mobile crowd sensing task allocation method based on Monte Carlo position fingerprint |
CN116307294A (en) * | 2023-05-22 | 2023-06-23 | 合肥城市云数据中心股份有限公司 | LBS space crowdsourcing task allocation method based on differential privacy and firefly improvement |
Also Published As
Publication number | Publication date |
---|---|
CN111144888B (en) | 2022-08-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111144888B (en) | Mobile crowd sensing task allocation method with differential privacy protection function | |
US11842394B2 (en) | System and method for optimizing execution of trading orders | |
Goodspeed | A re-examination of the use of ability to pay taxes by local governments | |
CN108182112A (en) | The resource allocation mechanism of sensing network focusing on people based on combinational auction | |
CN110503396B (en) | Multi-skill-based complex space crowdsourcing task allocation method | |
Li et al. | Affiliation and entry in first-price auctions with heterogeneous bidders: An analysis of merger effects | |
CN110231990A (en) | Block chain resource optimal distribution method and device based on secondary auction | |
CN110570284B (en) | Heterogeneous virtual machine distribution method with differential privacy protection | |
CN110830390B (en) | QoS driven mobile edge network resource allocation method | |
CN114971819A (en) | User bidding method and device based on multi-agent reinforcement learning algorithm under federal learning | |
CN114047971A (en) | Edge computing resource allocation method and device | |
CN105282246A (en) | Method for distributing perception tasks based on auction mechanism | |
CN113301158B (en) | Resource allocation method based on auction theory under mobile edge computing environment | |
CN112948116B (en) | Edge computing cooperation computing resource allocation method based on online excitation | |
CN107911823B (en) | Multi-channel anti-policy manipulated spectrum allocation method | |
Zhang et al. | Incentive mechanism with task bundling for mobile crowd sensing | |
CN113543055B (en) | Resource allocation method in vehicle edge calculation based on bidirectional auction mechanism | |
CN111954220B (en) | One-way heterogeneous spectrum allocation method based on differential privacy protection | |
Qian et al. | Mechanism design in project procurement auctions with cost uncertainty and failure risk. | |
Liew et al. | Economics of semantic communication in metaverse: An auction approach | |
CN113222720A (en) | Reputation-based privacy protection incentive mechanism method, device and storage medium | |
CN113538117B (en) | Internet of vehicles resource allocation auction method based on block chain | |
Ma et al. | Incentive-based location privacy preserving electric vehicle charging mechanism in smart grid | |
CN113298629B (en) | Data sharing method based on two-way auction theory and intelligent contract | |
CN114666337B (en) | Edge computing multi-server resource allocation method based on stud auction |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |