CN114978492A - Privacy protection method for centralized space crowdsourcing task allocation in spatial information network - Google Patents

Privacy protection method for centralized space crowdsourcing task allocation in spatial information network Download PDF

Info

Publication number
CN114978492A
CN114978492A CN202210512307.4A CN202210512307A CN114978492A CN 114978492 A CN114978492 A CN 114978492A CN 202210512307 A CN202210512307 A CN 202210512307A CN 114978492 A CN114978492 A CN 114978492A
Authority
CN
China
Prior art keywords
worker
task
server
requester
crowdsourcing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210512307.4A
Other languages
Chinese (zh)
Other versions
CN114978492B (en
Inventor
张俊伟
薛志霞
马建峰
李兴华
马卓
姜奇
马鑫迪
李腾
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xidian University
Original Assignee
Xidian University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xidian University filed Critical Xidian University
Priority to CN202210512307.4A priority Critical patent/CN114978492B/en
Priority claimed from CN202210512307.4A external-priority patent/CN114978492B/en
Publication of CN114978492A publication Critical patent/CN114978492A/en
Application granted granted Critical
Publication of CN114978492B publication Critical patent/CN114978492B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3006Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
    • H04L9/302Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3218Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using proof of knowledge, e.g. Fiat-Shamir, GQ, Schnorr, ornon-interactive zero-knowledge proofs
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/50Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate

Abstract

A privacy protection method for centralized space crowdsourcing task allocation in a space information network mainly solves the problems that in the prior art, when an untrusted server exists, the threat of leakage of privacy data of positions of workers is caused, and task allocation cannot be accurately performed. The method comprises the steps of constructing a centralized space crowdsourcing system; a worker maps the real position to generate a false position by adopting a pseudorandom function technology; the consistency of the real position and the false position of the worker is ensured by a zero knowledge proving method; the over-function encryption calculates the exact distance of the worker from the spatial crowdsourcing task. According to the invention, the task allocation based on the accurate distance is realized, so that the requirement of a position strategy with fine granularity is met, meanwhile, the safety of position privacy data of workers is enhanced, the matching degree of space crowdsourcing tasks and workers is improved, and the selectivity and efficiency of task allocation are obviously improved.

Description

Privacy protection method for centralized space crowdsourcing task allocation in spatial information network
Technical Field
The invention belongs to the technical field of networks, and further relates to a privacy protection method for centralized space crowdsourcing task allocation in a space information network in the technical field of space information networks. The method can be applied to a centralized space crowdsourcing task allocation application scene in the technical field of space information networks, and can complete task allocation under the condition of protecting position privacy.
Background
The space information network is a comprehensive information network which is formed by various spacecrafts, radio cellular information networks, data and command control centers and other ground facilities in a broad sense and integrates the space, the space and the ground. The satellite network is the backbone of the spatial information network, has high integration and can realize the comprehensive utilization of various resources. The space crowdsourcing is taken as a typical application mode in a space information network, and plays a role in the fields of emergency rescue, ecological environment dynamic monitoring, intelligent transportation and the like. The space crowdsourcing comprises three participants of a requester, a worker and a space crowdsourcing platform, and is a service mode for distributing tasks to workers meeting certain space constraints by fully utilizing crowd wisdom. Spatial crowdsourcing based on centralized management utilizes a satellite network to provide spatial crowdsourcing services. Various types of aircraft, such as users, smart devices, and drones, moving on the ground are requestors or workers. The requester submits a task request and a position strategy to the space crowdsourcing platform, the worker submits position information and answers to the space crowdsourcing platform, and then the platform conducts crowdsourcing management according to the information.
The spatial crowdsourcing platform needs to collect location information of all workers to meet basic services, and the server is not always completely trusted, which brings about a problem of privacy disclosure of the worker location. For the existing privacy protection method for space crowdsourcing task allocation, a worker generates a key to encrypt position information by a key issuing server to protect position privacy, and the method has the problems of complex key management and leakage of the position privacy of the worker due to the fact that the key issuing server is not credible. The differential privacy technology can protect the position privacy of the workers, and the method adds noise to the position information of the workers to make the positions indistinguishable, but the method not only increases the calculation overhead of the users, but also causes that the distance cannot be accurately calculated by the position ciphertext of the workers, and the task allocation efficiency is not high. Thus, centralized spatial crowdsourcing faces the technical problem of how to ensure worker location privacy and accomplish task distribution by calculating precise distances without server confidence.
The patent document of Shandong university in Shandong university ' applied for ' a space crowdsourcing task allocation privacy protection method and system ' (application number: 202111121645.7 application date: 2021.09.24 application publication number: CN113905047A) discloses a space crowdsourcing task allocation privacy protection method. The method is applied to protecting the privacy of the position of a worker and comprises the following steps: a worker submits identity information to a key issuing server for registration to obtain an encryption key; encrypting the worker message to obtain a message ciphertext, and submitting the ciphertext to a space crowdsourcing server; receiving a requester identity information ciphertext sent by a crowdsourcing server, and uploading a task worker grid coding set and a radius ciphertext to the crowdsourcing server after verifying the validity of the requester identity information ciphertext; and receiving final task information sent by the crowdsourcing server, and sending tracing information to the crowdsourcing server or sending task result information to the requester terminal. The method has the defects that in the initialization stage, when a worker submits identity information to a key issuing server for registration to obtain a private key used for encrypting position information, the problem that position privacy data of the worker is leaked due to the fact that the key issuing server is not trusted exists.
Shenzhen university discloses a task allocation method for privacy protection space crowdsourcing in the patent document 'a task allocation system model and implementation method for privacy protection space crowdsourcing' (application number: CN201710533457.2 application date: 2021.07.03 application publication number: CN 107257381A). The system model of the method comprises a space crowdsourcing server, a requester, a worker and a trusted third party, namely an encryption service providing unit. The requester creates and submits a task request to the server, the encryption service providing unit performs task allocation privacy protection management, and the server allocates the task to the worker. The method has the disadvantages that a trusted third party, namely an encryption service providing unit, is used for participating in space crowdsourcing to perform all privacy protection task allocation management, and the problem that the privacy data of the position of a worker is leaked due to the fact that the encryption service providing unit is not trusted exists; the scheme uses a paillier homomorphic encryption algorithm and an ElGamal cryptographic algorithm, and the calculation cost is high.
The patent document of the university of Fujian university in application "a spatial crowdsourcing method based on deep reinforcement learning and block chains" (application number: CN202110725729.5 application date: 2021.06.29 application publication number: CN113553613A) discloses a spatial crowdsourcing method based on deep reinforcement learning and block chains. According to the method, users are managed through a user trust management mechanism, spatial crowdsourcing tasks are managed through a method of classifying and managing the tasks in a grading mode, reliable workers are selected through a block chain, and task allocation is completed. The method ensures the position privacy of the user by combining the block chain and the deep reinforcement learning. The method has the disadvantages that the accurate distance between the worker and the spatial crowdsourcing task cannot be calculated, the matching degree between the crowdsourcing task and the worker can be reduced by distributing the task according to the fuzzy distance range, and the task distribution efficiency is low.
The paper "Geo-indicating Mechanisms for Spatial Crowdsourcing estimation Optimization" (Cryptographic and Security, Jan 2022) published by Shun Zhang et al proposes a method of Spatial Crowdsourcing location privacy protection based on geographical location indistinguishability. According to the method, noise is added to position information of a worker locally through a differential privacy technology, the worker submits a disturbed false position to a server to participate in space crowdsourcing, and the server performs privacy protection and task allocation efficiency balance through a self-adaptive regionalization fuzzy mechanism with an inference error boundary based on geographical indistinguishability. The method has the disadvantages that noise conforming to a differential privacy mechanism is added to the real position of a worker, the usability of the position data of the worker is reduced, the task allocation cannot be carried out by calculating an accurate distance, and the task allocation efficiency is reduced.
Disclosure of Invention
The invention aims to overcome the defects of the prior art, and provides a privacy protection method for centralized space crowdsourcing task allocation in a space information network, which is used for solving the technical problems that the position privacy of workers cannot be ensured and the task allocation according to an accurate distance cannot be completed under the condition that a server is not trusted in the centralized space crowdsourcing in the prior art.
The technical idea for realizing the purpose of the invention is as follows: the method comprises the steps that a worker maps a real position to generate a false position by adopting a pseudorandom function technology, the consistency of the real position and the false position of the worker is ensured through a zero-knowledge proof method, namely, the distances from the real position and the false position of the worker to a space crowdsourcing task are ensured to be the same, then, the false position information of the worker is encrypted by adopting an encryption algorithm of function encryption, and finally, the worker submits a ciphertext of the false position to a server to participate in space crowdsourcing. Because the false position information replaces the real position information, the server cannot deduce the real position information of the worker, and further the invention can realize the position privacy protection of the worker under the condition that the server is not trusted. The server calculates the ciphertext of the false position of the worker and the position ciphertext of the space crowdsourcing task by adopting a decryption algorithm of function encryption to obtain the accurate distance between the worker and the crowdsourcing task, and then the server distributes the task to the worker closest to the worker according to the accurate distance. Because the distances from the false position and the real position of the worker to the space crowdsourcing task are the same, the distance can be calculated by calculating the distance from the false position and the real position of the worker to replace the calculation of the distance by using the real position of the worker, so that the usability of the false position data of the worker is equivalent to that of the real position data of the worker, and the problems that only a distance range can be estimated after noise is added to worker position information by using a differential privacy technology, the task distribution cannot be performed by using an accurate distance, and the task distribution efficiency is reduced are solved.
In order to achieve the purpose, the technical scheme adopted by the invention comprises the following steps:
step 1, constructing a centralized spatial crowdsourcing system:
constructing a centralized space crowdsourcing system consisting of a server, a requester and n workers, wherein n is more than or equal to 2;
step 2, the requester generates a task request ciphertext;
step 3, the requester submits a task request ciphertext to the server:
step 3.1, the requester sends the task request ciphertext to the server;
step 3.2, the server broadcasts task request ciphertexts to all workers;
and 4, the server distributes the generated key of the function encryption algorithm to the requester and the worker:
step 4.1, the server generates public parameters by using an initialization algorithm of function encryption:
Setup(λ)→{p,G 1 ,G 2 ,G T ,g 1 ,g 2 ,e}
wherein Setup () represents the initialization algorithm of the function encryption, λ represents the security parameter of the server, → represents the algorithm output symbol, p represents the large prime number, G 1 、G 2 And G T Representing a cyclic group of order p, g 1 Represents G 1 G is a generator of 2 Represents G 2 E represents a bilinear mapping operation: g 1 ×G 2 →G T
Step 4.2, the server generates a first key and a second key by adopting a dual orthogonal basis generation algorithm:
Figure BDA0003638479790000041
Figure BDA0003638479790000042
wherein Dual (-) represents a Dual orthogonal basis generation algorithm,
Figure BDA0003638479790000043
and
Figure BDA0003638479790000044
a set of dual orthogonal bases is represented,
Figure BDA0003638479790000045
the representation base vector is 8-dimensional and each element in the base vector belongs to
Figure BDA0003638479790000046
Representing an integer field {0,1,2,. eta., p-1},
Figure BDA0003638479790000047
and
Figure BDA0003638479790000048
a set of dual orthogonal bases is represented,
Figure BDA0003638479790000049
the representation base vector is 2-dimensional and each element in the base vector belongs to an integer domain
Figure BDA00036384797900000410
Step 5, the requester submits the generated space crowdsourcing task position ciphertext to the server:
step 5.1, the requester generates a spatial crowdsourcing task position ciphertext { C 1 ,C 2 }:
Figure BDA00036384797900000411
Figure BDA0003638479790000051
Wherein, alpha,
Figure BDA0003638479790000052
Indicating that the requestor is from an integer domain
Figure BDA0003638479790000053
Wherein two independent uniform elements are randomly selected,
Figure BDA0003638479790000054
r 2 =-2x r ,r 3 =-2y r ,r 4 =1;
step 5.2, the requester submits the space crowdsourcing task position ciphertext to the server;
and 6, generating false position information corresponding to the real position information of each worker by using a pseudo-random function:
6.1, each worker decrypts the received task request ciphertext to obtain a task request plaintext;
step 6.2, generating a false position from the real position of each worker by using a pseudo-random function, wherein the distance from the false position to the space crowdsourcing task is the same as the distance from the real position to the space crowdsourcing task;
and 7, generating an evidence for the real position and the false position by each worker by adopting a zero-knowledge proof method:
π i =Prove(W i ',W i )
wherein, Prove (·) represents the evidence generation algorithm of the non-interactive zero-knowledge proof method, W i ' real position plane coordinates, W, of the ith worker i Is represented by the formula and i ' the corresponding dummy location coordinates of the location,
Figure BDA0003638479790000055
the abscissa representing the ith worker false location,
Figure BDA0003638479790000056
a vertical coordinate representing the ith worker false location;
and 8, submitting the generated ciphertext of the false position to a server by each worker:
step 8.1, each worker generates a location ciphertext { V } i1 ,V i2 }:
Figure BDA0003638479790000057
Figure BDA0003638479790000058
Wherein the content of the first and second substances,
Figure BDA0003638479790000059
w i1 =1,
Figure BDA00036384797900000510
step 8.2, each worker sends the position ciphertext, the verification material and the evidence to a server;
step 9, the server assigns the task to the nearest worker according to the precise distance:
step 9.1, the server calculates the distance between each worker and the space crowdsourcing task position by using a decryption algorithm of function encryption:
D i1 =e(C 1 ,V i1 ),
D i2 =e(C 2 ,V i2 ),
Figure BDA0003638479790000061
wherein v is i Representing the distance of the ith worker from the spatial crowdsourcing task location;
9.2, the server selects the minimum distance from all the distances and distributes the task to the worker closest to the distance;
9.3, the server sends the task allocation result and the verification parameters to the requester;
step 10, the requester verifies the task allocation result:
step 10.1, the requester verifies whether the proof of the nearest worker meets Verify (π) m ,W m ) If yes, executing step 10.2; otherwise, the requester refuses to accept the task allocation result and terminates the protocol; wherein, Verify () represents evidence verification algorithm of non-interactive zero knowledge proof, pi m Evidence representing recent workers, W m False location coordinates representing the nearest worker;
step 10.2, the requestor verifies whether Ver is satisfied s =Ver r If yes, the requester receives the task distribution result, and the protocol is ended; otherwise, terminating the protocol; wherein, Ver s Representing server-generated authentication parameters, Ver r Representing a requestor-generated authentication parameter;
and step 11, the requester receives the task distribution result and the protocol is ended.
Compared with the prior art, the invention has the following advantages:
in the invention, a worker uses a pseudorandom function to map a real position to generate a false position, an evidence is generated for the real position and the false position of the worker by a zero-knowledge proof method, then the false position information of the worker is encrypted by using an encryption algorithm of function encryption, and the worker submits a ciphertext of the false position to a server to participate in space crowdsourcing. Because the false position information replaces the real position information, the server can not predict the real position information of the worker, so that the invention can also realize the position privacy protection of the worker under the condition that the server is not trusted, overcomes the threat of leakage of position privacy data of the worker caused by the existence of an untrusted server in the prior art, enhances the safety of the position privacy data of the worker, further remarkably improves the participation degree of the worker in the space crowdsourcing, and ensures that the task allocation selectivity is more and the result is more optimal.
And 2, because the server adopts a decryption algorithm of function encryption to calculate the ciphertext of the false position of the worker and the position ciphertext of the spatial crowdsourcing task to obtain the accurate distance between the worker and the crowdsourcing task, and then the server distributes the task to the worker closest to the worker according to the accurate distance.
Drawings
FIG. 1 is a flow chart of an implementation of the present invention;
fig. 2 is a schematic structural diagram of a spatial crowdsourcing system used in the present invention.
Detailed Description
The invention is described in further detail below with reference to the figures and specific examples.
The implementation steps of the present invention are further described with reference to fig. 1 and the embodiment.
Step 1, constructing a centralized space crowdsourcing system.
Embodiments of the present invention build a centralized spatial crowdsourcing system comprising one requester, five workers and one server. As shown in FIG. 2, the system of FIG. 2 includes one requester, five workers, and one server. The main task of the requester is to submit a task request ciphertext and a task position ciphertext to the server; the main task of the worker is to submit a false location ciphertext to the server; the main task of the server is to broadcast task request ciphertext to the workers and send task assignment results to the requesters.
And 2, the requester generates a task request ciphertext.
The requester generates a task request ciphertext C ═ Enc (GK, R | | | h | | | epoch #), wherein Enc (·) represents a pair-based basisThe broadcast encryption algorithm is called a key, GK represents a group key of the broadcast encryption algorithm, R represents the position plane coordinate of a space crowdsourcing task determined by a requester according to a global positioning system, and R is (x) r ,y r ),x r Indicating the position abscissa, y, of the crowd-sourced task r The position ordinate of the crowdsourcing task is represented, | | represents a cascading symbol, h represents the upper limit of the distance from each worker to the position of the spatial crowdsourcing task, h is 100 in the embodiment of the invention, and the epoch # represents the time stamp of the moment when the requester generates the task request ciphertext.
And 3, submitting the task request ciphertext to the server by the requester.
And 3.1, the requester sends the task request ciphertext to the server.
And 3.2, broadcasting the task request cryptograph to all workers by the server.
And 4, the server distributes the generated key of the function encryption algorithm to the requester and the worker.
Step 4.1, the server generates its common parameter, Setup (λ) → { p, G, using the initialization algorithm for function encryption 1 ,G 2 ,G T ,g 1 ,g 2 E, where Setup () denotes the initialization algorithm for functional encryption, λ denotes the security parameter of the server, → denotes the algorithm output sign, p denotes the large prime number, G 1 、G 2 And G T Representing a cyclic group of order p, g 1 Represents G 1 G is a generator of 2 Represents G 2 E represents a bilinear mapping operation: g 1 ×G 2 →G T
Step 4.2, the server adopts a dual orthogonal basis generation algorithm to generate a first secret key of the server
Figure BDA0003638479790000081
And a second key
Figure BDA0003638479790000082
Wherein Dual (-) represents a Dual orthogonal basis generation algorithm,
Figure BDA0003638479790000083
and
Figure BDA0003638479790000084
a set of dual orthogonal bases is represented,
Figure BDA0003638479790000085
Figure BDA0003638479790000086
the representation base vector is 8-dimensional and each element in the base vector belongs to
Figure BDA0003638479790000087
Representing an integer field {0,1,2,. eta., p-1},
Figure BDA0003638479790000088
and
Figure BDA0003638479790000089
a set of dual orthogonal bases is represented,
Figure BDA00036384797900000810
the representation base vector is 2-dimensional and each element in the base vector belongs to an integer domain
Figure BDA00036384797900000811
Step 4.3, the server sends the public parameters and the key to the requester and all workers simultaneously.
And 5, submitting the generated space crowdsourcing task position ciphertext to a server by the requester.
Step 5.1, the requester generates a spatial crowdsourcing task position ciphertext { C 1 ,C 2 },
Figure BDA00036384797900000812
Figure BDA00036384797900000813
Wherein, alpha,
Figure BDA00036384797900000814
Indicating that the requester is from an integer domain
Figure BDA00036384797900000815
Wherein two independent uniform elements are randomly selected,
Figure BDA00036384797900000816
r 2 =-2x r ,r 3 =-2y r ,r 4 =1。
step 5.2, the requester submits the space crowdsourcing task position ciphertext { C to the server 1 ,C 2 }。
And 6, generating false position information corresponding to the real position information of each worker by using a pseudo-random function.
And 6.1, each worker decrypts the received task request ciphertext by using the session key by using a decryption algorithm corresponding to the broadcast encryption algorithm to obtain a task request plaintext { R | | h | epoch # }.
And 6.2, generating a false position from the real position of each worker by using a pseudorandom function, wherein the distance from the false position to the space crowdsourcing task is the same as the distance from the real position to the space crowdsourcing task.
And 7, generating an evidence for the real position and the false position by each worker by adopting a zero-knowledge proof method.
Each worker generates evidence pi for real and ghost locations i Wherein, is i =Prove(W i ',W i ) Prove (-) represents the evidence generation algorithm of the non-interactive zero knowledge proof method, W i ' denotes the real position plane coordinates, W, determined by the ith worker from the Global positioning System i Is represented by the formula i ' the corresponding dummy location coordinates of the location,
Figure BDA0003638479790000091
the abscissa representing the ith worker false location,
Figure BDA0003638479790000092
the ordinate representing the ith worker false location.
And 8, submitting the generated ciphertext of the false position to a server by each worker.
Step 8.1, each worker follows
Figure BDA0003638479790000093
Generating worker location ciphertext { V i1 ,V i2 In which is beta i
Figure BDA0003638479790000094
w i1 =1,
Figure BDA0003638479790000095
Step 8.2, each worker follows
Figure BDA0003638479790000096
Figure BDA0003638479790000097
Calculating the material required for the verification step, wherein ID i The identity identifier of the ith worker is represented, the MAC represents a message verification code algorithm, and the MAC algorithm selected in the embodiment of the invention is an Hmac-MD5 algorithm, k i A session key representing broadcast encryption of the ith worker, F (-) represents a one-way function, in the embodiment of the invention, RSA is selected as the one-way function, h-v i Representing the ith worker pair
Figure BDA0003638479790000098
Is carried out h-v i The operation of the sub-one-way function,
Figure BDA0003638479790000099
indicating that the worker performed a MAC operation on the timestamp,
Figure BDA00036384797900000910
step 8.3, each worker will contain the proof and proof of the location ciphertext
Figure BDA00036384797900000911
And sending the data to a server.
Step 9, the server assigns the task to the nearest worker according to the precise distance.
Step 9.1, the server uses the decryption algorithm D of the function encryption i1 =e(C 1 ,V i1 ),D i2 =e(C 2 ,V i2 ),
Figure BDA0003638479790000101
Calculating the distance v of each worker from the spatial crowd-sourced task location i ,v i Representing the distance between the ith worker and the spatial crowd sourcing task.
And 9.2, selecting the minimum distance from all the distances by the server, and distributing the task to the worker closest to the distance.
Step 9.3, the server generates a verification parameter
Figure BDA0003638479790000102
Where pi represents the successive multiplication symbol, mod represents the modulo operation, and p and q represent two large prime numbers in the one-way function RSA, respectively.
Step 9.4, the server distributes the task results and verifies the required materials
Figure BDA0003638479790000103
Is sent to the requester, wherein v m The minimum distance is represented as a function of,
Figure BDA0003638479790000104
the verification material representing the worker closest in distance,
Figure BDA0003638479790000105
ID m representing the identity of the worker closest to it.
Step 10, the requester verifies the task allocation result.
Step 10.1, the requester verifies the worker closest in distanceWhether the evidence satisfies Verify (pi) m ,W m ) If yes, executing step 10.2; otherwise, the requester refuses to accept the task allocation result and terminates the protocol; wherein Verify () is the proof verification algorithm of the non-interactive zero knowledge proof.
Step 10.2, the requestor verifies whether Ver is satisfied s =Ver r If yes, executing step 11; otherwise, terminating the protocol; wherein, Ver r Indicating the authentication parameters generated by the requestor,
Figure BDA0003638479790000106
Figure BDA0003638479790000107
indicating that the requester performs a MAC operation on the timestamp,
Figure BDA0003638479790000108
and step 11, the requester receives the task allocation result and the protocol is ended.
The foregoing description is only an example of the present invention and should not be construed as limiting the invention in any way, and it will be apparent to those skilled in the art that various modifications and variations can be made in form and detail without departing from the spirit and structure of the invention, after understanding the principles and principles of the invention, but such modifications and variations are considered to be within the scope of the appended claims.

Claims (6)

1. A privacy protection method for distributing centralized space crowdsourcing tasks in a space information network is characterized in that workers submit false position information to participate in space crowdsourcing, a server calculates the accurate distance between the workers and the space crowdsourcing tasks according to the false position information to distribute the tasks, and the method specifically comprises the following steps:
step 1, constructing a centralized space crowdsourcing system consisting of a server, a requester and n workers, wherein n is more than or equal to 2;
step 2, the requester generates a task request ciphertext;
step 3, the requester submits a task request ciphertext to the server:
step 3.1, the requester sends the task request ciphertext to the server;
step 3.2, the server broadcasts task request ciphertexts to all workers;
and 4, the server distributes the generated key of the function encryption algorithm to the requester and the worker:
step 4.1, generating public parameters of the server by using the initialization algorithm encrypted by the following functions:
Setup(λ)→{p,G 1 ,G 2 ,G T ,g 1 ,g 2 ,e}
wherein Setup () represents the initialization algorithm of the function encryption, λ represents the security parameter of the server, → represents the algorithm output symbol, p represents the large prime number, G 1 、G 2 And G T Representing a cyclic group of order p, g 1 Represents G 1 G is a generator of 2 Represents G 2 E represents a bilinear mapping operation: g 1 ×G 2 →G T
Step 4.2, generating a first key and a second key of the server by adopting the following dual orthogonal basis generation algorithm:
Figure FDA0003638479780000011
Figure FDA0003638479780000012
wherein Dual (-) represents a Dual orthogonal basis generation algorithm,
Figure FDA0003638479780000013
and with
Figure FDA0003638479780000014
A set of dual orthogonal bases is represented,
Figure FDA0003638479780000015
Figure FDA0003638479780000016
the representation base vector is 8-dimensional, and each element in the base vector belongs to
Figure FDA0003638479780000017
Figure FDA0003638479780000018
Representing an integer field {0,1,2,. eta., p-1},
Figure FDA0003638479780000019
and
Figure FDA00036384797800000110
a set of dual orthogonal bases is represented,
Figure FDA00036384797800000111
Figure FDA00036384797800000112
the representation base vector is 2-dimensional and each element in the base vector belongs to an integer domain
Figure FDA00036384797800000113
And 5, submitting the generated space crowdsourcing task position ciphertext to a server by the requester:
step 5.1, the requester generates a spatial crowdsourcing task position ciphertext { C 1 ,C 2 }:
Figure FDA0003638479780000021
Figure FDA0003638479780000022
Wherein the content of the first and second substances,
Figure FDA0003638479780000023
indicating that the requestor is from an integer domain
Figure FDA0003638479780000024
Wherein two independent uniform elements are randomly selected,
Figure FDA0003638479780000025
r 2 =-2x r ,r 3 =-2y r ,r 4 =1;
step 5.2, the requester submits the space crowdsourcing task position ciphertext to each worker from the server;
and 6, generating false position information corresponding to the real position information of each worker by using a pseudo-random function:
6.1, each worker decrypts the received task request ciphertext to obtain a task request plaintext;
step 6.2, generating a false position from the real position of each worker by using a pseudorandom function, wherein the distance from the false position to the space crowdsourcing task is equal to the distance from the real position to the space crowdsourcing task;
and 7, generating an evidence for the real position and the false position of each worker by adopting the following zero-knowledge proof method:
π i =Prove(W i ',W i )
wherein, Probe (-) represents the evidence generation algorithm of the non-interactive zero knowledge proof of knowledge method, W i ' denotes the true location of the ith worker, W i Is represented by the formula i ' a corresponding dummy location of the dummy,
Figure FDA0003638479780000026
Figure FDA0003638479780000027
an abscissa value representing the ith worker false location,
Figure FDA0003638479780000028
a vertical coordinate value representing the ith worker false location;
and 8, submitting the generated ciphertext of the false position to a server by each worker:
step 8.1, each worker generates a location ciphertext { V } i1 ,V i2 The method comprises the following steps:
Figure FDA0003638479780000029
Figure FDA00036384797800000210
wherein the content of the first and second substances,
Figure FDA00036384797800000211
w i1 =1,
Figure FDA00036384797800000212
step 8.2, each worker sends the position ciphertext, the verification material and the evidence to a server;
and 9, the server distributes tasks for the workers:
step 9.1, the server calculates the distance between each worker and the spatial crowdsourcing task position by using a decryption algorithm of function encryption:
D i1 =e(C 1 ,V i1 ),
D i2 =e(C 2 ,V i2 ),
Figure FDA00036384797800000213
wherein v is i Representing the distance of the ith worker from the spatial crowd-sourced task location;
9.2, the server selects the minimum distance from all the distances and distributes the task to the worker closest to the distance;
9.3, the server sends the task allocation result and the verification parameters to the requester;
step 10, the requester verifies the task allocation result:
step 10.1, the requester verifies whether the proof of the nearest worker satisfies Verify (π) m ,W m ) If yes, executing step 10.2; otherwise, the requester refuses to accept the task allocation result and terminates the protocol; wherein, Verify () represents evidence verification algorithm of non-interactive zero knowledge proof, pi m Showing evidence of the worker who obtained the task assignment, W m Representing obtaining false location coordinates of a task distributor;
step 10.2, the requestor verifies whether Ver is satisfied s =Ver r If yes, executing step 11; otherwise, terminating the protocol; wherein, Ver s Representing authentication parameters, Ver, of the server r An authentication parameter representing a requestor;
and step 11, the requester receives the task distribution result and the protocol is ended.
2. The privacy protection method for centralized spatial crowd-sourced task distribution in a spatial information network as claimed in claim 1, wherein: the task request ciphertext in step 2 is obtained by the following formula:
C=Enc(GK,R||h||epoch#)
where C denotes a task request ciphertext generated by the requester, Enc (·) denotes a broadcast encryption algorithm based on a symmetric key, GK denotes a group key of the broadcast encryption algorithm, R denotes a spatial crowd-sourced task position of the requester, and R ═ x (x) r ,y r ),x r Indicating the position abscissa, y, of the crowd-sourced task r Represents the position ordinate of the crowdsourcing task, | | represents the cascade symbol, h represents the upper limit of the distance from each worker to the position of the spatial crowdsourcing task, and etcoh # represents the requestThe requester generates a time stamp of the task request ciphertext time.
3. The privacy protection method for centralized spatial crowdsourcing task distribution in a spatial information network according to claim 2, characterized in that: the task request plaintext in step 6.1 is as follows:
{R||h||epoch#}。
4. the privacy protection method for centralized spatial crowd-sourced task distribution in a spatial information network as claimed in claim 2, wherein: the verification material described in step 8.2 is determined by the following formula:
Figure FDA0003638479780000031
Figure FDA0003638479780000032
wherein, ID i Identity identifier, k, representing the ith worker i Session key representing broadcast encryption of the ith worker, F (-) represents the one-way function RSA, h-v i Representing the ith worker pair
Figure FDA0003638479780000033
Is carried out h-v i The operation of the sub-one-way function,
Figure FDA0003638479780000034
indicating that the worker performed a MAC operation on the timestamp, MAC indicates a message authentication code algorithm,
Figure FDA0003638479780000035
5. the privacy protection method for centralized spatial crowd-sourced task distribution in a spatial information network as claimed in claim 4, wherein: the verification parameters described in step 9.3 are derived from the following formula:
Figure FDA0003638479780000041
where pi represents the successive multiplication symbol, mod represents the modulo operation, and p and q represent two large prime numbers in the one-way function RSA, respectively.
6. The privacy protection method for centralized spatial crowd-sourced task distribution in a spatial information network as claimed in claim 4, wherein: the authentication parameters of the supplicant described in step 10.2 are determined by:
Figure FDA0003638479780000042
wherein the content of the first and second substances,
Figure FDA0003638479780000043
indicating that the requester performs a MAC operation on the timestamp,
Figure FDA0003638479780000044
CN202210512307.4A 2022-05-11 Privacy protection method for centralized space crowdsourcing task allocation in space information network Active CN114978492B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210512307.4A CN114978492B (en) 2022-05-11 Privacy protection method for centralized space crowdsourcing task allocation in space information network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210512307.4A CN114978492B (en) 2022-05-11 Privacy protection method for centralized space crowdsourcing task allocation in space information network

Publications (2)

Publication Number Publication Date
CN114978492A true CN114978492A (en) 2022-08-30
CN114978492B CN114978492B (en) 2024-05-14

Family

ID=

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115879722A (en) * 2022-12-14 2023-03-31 南京捷崎信息科技有限公司 Space crowdsourcing task allocation method and system
CN117478303A (en) * 2023-12-28 2024-01-30 湖南天河国云科技有限公司 Block chain hidden communication method, system and computer equipment

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140343984A1 (en) * 2013-03-14 2014-11-20 University Of Southern California Spatial crowdsourcing with trustworthy query answering
US20160314127A1 (en) * 2013-02-19 2016-10-27 Digitalglobe, Inc. Enhanced crowdsourced search and locate platform
CN109033865A (en) * 2018-06-20 2018-12-18 苏州大学 The method for allocating tasks of secret protection in a kind of space crowdsourcing
WO2019006968A1 (en) * 2017-07-03 2019-01-10 深圳大学 Warrantable task allocation system and method for privacy protected spatial crowdsourcing
CN111105142A (en) * 2019-11-25 2020-05-05 哈尔滨工程大学 Crowdsourcing task allocation method facing user personalized privacy protection
CN113507704A (en) * 2021-07-09 2021-10-15 哈尔滨理工大学 Mobile crowd sensing privacy protection method based on double attribute decision
CN113905047A (en) * 2021-09-24 2022-01-07 山东师范大学 Space crowdsourcing task allocation privacy protection method and system

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160314127A1 (en) * 2013-02-19 2016-10-27 Digitalglobe, Inc. Enhanced crowdsourced search and locate platform
US20140343984A1 (en) * 2013-03-14 2014-11-20 University Of Southern California Spatial crowdsourcing with trustworthy query answering
WO2019006968A1 (en) * 2017-07-03 2019-01-10 深圳大学 Warrantable task allocation system and method for privacy protected spatial crowdsourcing
CN109033865A (en) * 2018-06-20 2018-12-18 苏州大学 The method for allocating tasks of secret protection in a kind of space crowdsourcing
CN111105142A (en) * 2019-11-25 2020-05-05 哈尔滨工程大学 Crowdsourcing task allocation method facing user personalized privacy protection
CN113507704A (en) * 2021-07-09 2021-10-15 哈尔滨理工大学 Mobile crowd sensing privacy protection method based on double attribute decision
CN113905047A (en) * 2021-09-24 2022-01-07 山东师范大学 Space crowdsourcing task allocation privacy protection method and system

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
MINGZHE LI等: "Toward Privacy-Preserving Task Assignment for Fully Distributed Spatial Crowdsourcing", 《IEEE INTERNET OF THINGS JOURNAL 》, 30 March 2021 (2021-03-30) *
张俊伟等: "TSNP:空间信息网中PCL安全高效的群组认证协议", 《计算机研究与发展》, 15 October 2016 (2016-10-15) *
汤子文: "空间众包中位置隐私保护的任务分配方法研究", 《中国优秀硕士学位论文全文数据库》, 15 April 2022 (2022-04-15) *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115879722A (en) * 2022-12-14 2023-03-31 南京捷崎信息科技有限公司 Space crowdsourcing task allocation method and system
CN115879722B (en) * 2022-12-14 2023-09-22 南京捷崎信息科技有限公司 Space crowdsourcing task allocation method and system
CN117478303A (en) * 2023-12-28 2024-01-30 湖南天河国云科技有限公司 Block chain hidden communication method, system and computer equipment
CN117478303B (en) * 2023-12-28 2024-03-01 湖南天河国云科技有限公司 Block chain hidden communication method, system and computer equipment

Similar Documents

Publication Publication Date Title
Li et al. Attribute based encryption with privacy protection and accountability for CloudIoT
Zhang et al. Data security and privacy-preserving in edge computing paradigm: Survey and open issues
Wu et al. Privacy-aware task allocation and data aggregation in fog-assisted spatial crowdsourcing
CN111372243B (en) Security distributed aggregation and access system and method based on fog alliance chain
Lu et al. A survey on recent advances in vehicular network security, trust, and privacy
Khodaei et al. SECMACE: Scalable and robust identity and credential management infrastructure in vehicular communication systems
Jiang et al. An efficient anonymous batch authentication scheme based on HMAC for VANETs
Kong et al. Achieving privacy-preserving and verifiable data sharing in vehicular fog with blockchain
Xiong et al. Conditional privacy-preserving authentication protocol with dynamic membership updating for VANETs
Zhuo et al. Privacy-preserving verifiable set operation in big data for cloud-assisted mobile crowdsourcing
Yeh et al. ABACS: An attribute-based access control system for emergency services over vehicular ad hoc networks
Liu et al. SEMD: Secure and efficient message dissemination with policy enforcement in VANET
Bao et al. Pseudonym management through blockchain: Cost-efficient privacy preservation on intelligent transportation systems
CN110138538A (en) The smart grid security and secret protection data aggregation method calculated based on mist
CN109936509B (en) Equipment group authentication method and system based on multi-identity
CN108234445B (en) Cloud establishment and data security transmission method for privacy protection in vehicle-mounted cloud
Jiang et al. P 2 AE: Preserving Privacy, Accuracy, and Efficiency in Location-Dependent Mobile Crowdsensing
Li et al. Secure data deduplication protocol for edge-assisted mobile crowdsensing services
Kanchan et al. An efficient and privacy-preserving federated learning scheme for flying ad hoc networks
CN114978530A (en) Distance calculation and privacy protection method for distributed space crowdsourcing in spatial information network
Zhang et al. Secure and privacy-preserving attribute-based sharing framework in vehicles ad hoc networks
Cheng et al. VFAS: Reliable and privacy-preserving V2F authentication scheme for road condition monitoring system in IoV
Tandon et al. A novel pseudonym assignment and encryption scheme for preserving the privacy of military vehicles
Chen et al. V-ldaa: A new lattice-based direct anonymous attestation scheme for vanets system
Ogundoyin An anonymous and privacy‐preserving scheme for efficient traffic movement analysis in intelligent transportation system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant