WO2019006966A1 - Task allocation system model of privacy protected spatial crowdsourcing, and implementation method - Google Patents

Task allocation system model of privacy protected spatial crowdsourcing, and implementation method Download PDF

Info

Publication number
WO2019006966A1
WO2019006966A1 PCT/CN2017/113454 CN2017113454W WO2019006966A1 WO 2019006966 A1 WO2019006966 A1 WO 2019006966A1 CN 2017113454 W CN2017113454 W CN 2017113454W WO 2019006966 A1 WO2019006966 A1 WO 2019006966A1
Authority
WO
WIPO (PCT)
Prior art keywords
worker
task
space
workers
server
Prior art date
Application number
PCT/CN2017/113454
Other languages
French (fr)
Chinese (zh)
Inventor
毛睿
李荣华
陆敏华
王毅
罗秋明
商烁
Original Assignee
深圳大学
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳大学 filed Critical 深圳大学
Publication of WO2019006966A1 publication Critical patent/WO2019006966A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/52Network services specially adapted for the location of the user terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/008Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving homomorphic encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC

Definitions

  • the invention belongs to the field of computers, and particularly relates to a task distribution system model of space crowdsourcing, in particular to a task distribution system model of privacy protection space crowdsourcing; in addition, the invention also relates to a task distribution system of the privacy protection space crowdsourcing The implementation of the model.
  • Crowdsourcing has revolutionized the way solutions are solved by outsourcing a task (usually performed by a designated agent) to the public through open recruitment. Crowdsourcing can provide talent capacity and expert services on demand, far less than the cost of hiring professionals, and has been successfully applied to transcription books, protein folding, galaxies classification and traffic monitoring. Recently, crowdsourcing has also been widely used for emergency management because it collects critical information efficiently and at low cost in emergencies and disasters, such as affected areas, at-risk populations, and potential areas where search and rescue operations may be required. For example, on April 25, 2015, Nepal was hit by a magnitude 7.8 earthquake. To provide detailed damage assessment, DigitalGlobe collects high-resolution satellite images from the affected areas before and after the earthquake. These images are divided into small segments and provided to online populations to identify damaged buildings and roads. Thanks to the help of crowdsourcing, more than 21,000 damaged buildings and roads were identified and marked within a month, providing valuable data for rescue and reconstruction.
  • SC Space Crowdsourcing
  • a spatial task ie, location-related tasks
  • the SC server sends a space task for survivors in a particular collapsed building to all available workers, including volunteers and professionals equipped with life testing instruments. Workers willing to perform the task arrive at the building for inspection and send the results back to the SC server. Based on a rescue plan that can be subsequently performed, for example, if someone is identified as being trapped in the rubble, professional heavy rescue equipment will be deployed on site.
  • the success of crowdsourcing depends on the active participation of the crowd.
  • location privacy issues are a major factor hindering workers from engaging in space missions.
  • effectiveness means that space tasks can be quickly completed by assigning them to nearby workers
  • the SC server needs to continuously collect their location through the workers' mobile devices.
  • the SC server it is very difficult for workers to control the use of their location data by an untrusted third party, the SC server.
  • the collected location data is likely to be shared, rented or sold, which has a serious impact on personal privacy.
  • intruders can conduct a wide range of attacks on individuals, such as physical surveillance and tracking, identity theft, and the destruction of sensitive information such as home addresses and lifestyle habits. Therefore, location privacy protection, or more generally, worker privacy protection is an important aspect of space crowdsourcing because it can motivate workers to actively participate in space missions. This is especially important for emergency management because more active workers usually mean that tasks can be completed faster.
  • Tasks on existing crowdsourcing platforms are open to all workers. This mode may not be suitable for space crowdsourcing in an emergency.
  • the over-workers motivated by altruism can go there to perform the task, even if they are not required to do so. This may lead to more other mixed discussions, such as traffic jams. Therefore, the location of the task should not be mastered by the staff, except for the person to whom the task is assigned.
  • task location protection is also welcome. For example, people with health problems at home can seek help through crowdsourcing, but publicizing their health issues and home addresses clearly violates personal privacy. Therefore, task location privacy should also be protected in space crowdsourcing.
  • the technical problem to be solved by the present invention is to provide a task distribution system model for privacy protection space crowdsourcing.
  • the present invention implements private data for both parties. Encryption for strong mutual security.
  • the present invention also provides a method for implementing the task allocation system model of the privacy protection space crowdsourcing.
  • the present invention provides a task allocation system model for privacy protection space crowdsourcing, including a space crowdsourcing server, an encryption service providing unit, a space task requesting unit, and a worker mobile terminal;
  • the spatial task requesting unit is configured to create a spatial task, and transmit task information to the spatial crowdsourcing server;
  • the space crowdsourcing server assigns a task to the worker mobile terminal
  • the encryption service providing unit provides privacy protection task assignment management to the spatial task request unit, the space crowdsourcing server, and the worker mobile terminal.
  • the space task s refers to a task to be executed at the position l s and associated with the expiration date e s ;
  • the worker w of the worker mobile is a person who is willing to perform a spatial task, each The worker is associated with the ID id w specified by the space crowdsourcing server, the speed v w and its current location l w .
  • W ⁇ w 1 , w 2 , . . . , w n ⁇ and the position l s of the spatial task s and the expiration date e s .
  • w i * worker must satisfy two conditions: first, w i * l s can be reached before
  • the encryption service providing unit provides a privacy protection function, which provides a key service to the space crowdsourcing server and the worker mobile terminal, and the privacy protection function encrypts the transmission data and makes the space crowdsourcing server
  • the encrypted data can be calculated to ensure that the space crowdsourcing server, the encryption service providing unit and all other workers cannot obtain the ID information of the w i* except for the selected worker w i* in the communication process.
  • the encryption service providing unit adopts a Paillier cryptosystem and an ElGamal cryptosystem, and the cryptographic service providing unit generates a domain parameter of ElGamal and a key pair of Paillier and ElGamal, and the private key is kept secret. And send the public key to the space crowdsourcing server and all workers.
  • the present invention also provides a method for implementing a task allocation system model for privacy protection space crowdsourcing, comprising the following steps:
  • Step 1 The space task request unit creates and publishes a space task
  • Step 2 The spatial task is released to the space crowdsourcing server, and the space crowdsourcing server assigns the task to the worker through the task allocation algorithm;
  • step three the encryption service providing unit provides a privacy protection function, which provides a key service to the space crowdsourcing server and the worker mobile terminal.
  • the task allocation algorithm described in step 2 specifically includes the following stages:
  • the space crowdsourcing server uses the Paillier public key to encrypt the task.
  • the space crowdsourcing server uses the Paillier public key to encrypt the task.
  • three ciphertexts are sent to all workers: E(x s 2 +y s 2 ), E(x s ) and E(y s ), after receiving the encrypted information from the space crowdsourcing server, each worker w i calculates the square of the distance between l s and its current position l i and encrypts ,which is:
  • the winning worker calculates: the space crowdsourcing server has a list of 2-tuple ⁇ i, E(t i ' 2 )>, where i is the ID of the person w i , 1 ⁇ i ⁇ n; Is the identity of the winner, which encrypts each worker's ID by a PRF f k function and sends ⁇ f k (i), E(t fk(i) ' 2 )> to the cryptographic service provider to find which worker The travel time is the shortest and whether it can reach the mission location before the deadline e s ;
  • the fourth stage, task location broadcast Once E' C (f k (i * )) is received, the space crowdsourcing server encrypts the task location l s and broadcasts to all workers Encrypt l s as follows:
  • h is a length matching hash function for mapping a longer bit string to a shorter bit string
  • a method of constructing h that proves to be semantically secure is to truncate a longer bit string into multiple Fixed-length shorter bit strings, and XOR calculations and outputs on these shorter bit strings; only workers who obtain E' C (f k (i * )) information can pass the calculation Get the task location information.
  • all workers are required to send encryption to the space crowdsourcing server in the form of E(x i 2 +y i 2 ), E(x i ) and E(y i ). Location, and ask the space crowdsourcing server to calculate E(d 2 (l i , l s )).
  • each worker encrypts its speed through the ElGamal cryptosystem and sends E'(v i ) to the space crowdsourcing server, and the space crowdsourcing server passes all
  • the encrypted virtual travel time is sent to the space crowdsourcing server for further processing; during this process, the cryptographic service providing unit and all workers know the exact value of V, which does not violate the personal privacy of any worker.
  • the encryption service providing unit since the encryption service providing unit has the private key of Paillier, it is possible to obtain t i ' 2 by decrypting E(t i ' 2 ) and calculate the actual travel time. Then, the cryptographic service providing unit can easily find the worker with the shortest travel time and judge whether it can meet the deadline limit; if not, the cryptographic service providing unit notifies the space crowdsourcing server that there is no winner, otherwise it wins with ElGamal encryption.
  • the ID f k (i * ) and E' C (f k (i * )) are sent to the space crowdsourcing server.
  • the following steps ensure that only the winner can obtain the E' C (f k (i * )) information:
  • each worker w i obtains the encrypted ID f k (i) from the space crowdsourcing server and encrypts it with ElGamal using its own public key, and then encrypts the information E' wi (f k (i)) Sent to the encryption service providing unit, after receiving the information, the encryption service providing unit encrypts again through ElGamal using its public key and the same random number r for encrypting E' C (f k (i * )); the encryption service provides Unit will then result Sent to each worker who can be decrypted by their private key to obtain E' C (f k (i)); the public key should be kept secret to protect privacy.
  • the present invention has the following beneficial effects:
  • the present invention combines a partially homomorphic encryption scheme to efficiently implement the complex operations required on encrypting data, thereby avoiding significant performance penalties.
  • the invention can realize efficient task assignment in space crowdsourcing and provide privacy protection for both workers and tasks. This is the first time in the space crowdsourcing to achieve mutual privacy protection, creative.
  • the present invention can implement some complicated operations that the existing practical cryptosystem cannot support. Through this strategy, the protocol of the present invention can implement privacy protection of both parties with acceptable overhead.
  • FIG. 1 is a schematic diagram of a system model of space crowdsourcing; wherein FIG. 1(a) is a schematic diagram of a system model of a non-private space crowdsourcing; FIG. 1(b) is a schematic diagram of a task allocation system model of the privacy protection space crowdsourcing of the present invention.
  • FIG. 2 is a flow chart of a method for implementing a task allocation system model of privacy protection space crowdsourcing according to the present invention.
  • FIG. 4 is a schematic diagram showing the efficiency of the number of workers in the protocol of the present invention with respect to travel time; wherein FIG. 4(a) represents a key length of 1024, and FIG. 4(b) represents a key length of 2048.
  • FIG. 5 is a schematic diagram of the number of workers in the protocol of the present invention relative to the communication overhead of the parties; wherein FIG. 5(a) represents a key length of 1024, and FIG. 5(b) represents a key length of 2048.
  • Figure 6 is a schematic diagram showing the efficiency of the protocol of the present invention in terms of WTD (Worker Stroke Distance) by changing MAR; wherein Figure 6(a) represents a linear decreasing function of the travel time for the data set used by Gowalla, the worker acceptance rate, 6(b) represents that the data set used is Gowalla, the worker acceptance rate obeys the Zipf distribution, Figure 6(c) represents that the data set used is Yelp, the worker acceptance rate is a linear decreasing function of the travel time, and Figure 6(d) represents the Using the data set for Yelp, the worker acceptance rate is subject to the Zipf distribution.
  • WTD Worker Stroke Distance
  • Figure 7 is a schematic diagram showing the efficiency of the protocol of the present invention in WTD (Worker Stroke Distance) by changing ⁇ ; wherein Figure 7(a) represents a linear decreasing function of the travel time of the data set used by Gowalla, the worker acceptance rate, 7(b) represents that the data set used is Gowalla, the worker acceptance rate obeys the Zipf distribution, and Figure 7(c) represents that the data set used is Yelp, the worker acceptance rate is a linear decreasing function of the travel time, and Figure 7(d) represents the Using the data set for Yelp, the worker acceptance rate is subject to the Zipf distribution.
  • WTD Worker Stroke Distance
  • Figure 8 is a schematic diagram showing the efficiency of the protocol of the present invention in WTD (Worker Stroke Distance) by changing ⁇ ; wherein Figure 8(a) represents a linear decreasing function of the travel time of the data set used by Gowalla, the worker acceptance rate, 8(b) represents that the data set used is Gowalla, the worker acceptance rate obeys the Zipf distribution, and Figure 8(c) represents that the data set used is Yelp, the worker acceptance rate is a linear decreasing function of the travel time, and Figure 8(d) represents the Using the data set for Yelp, the worker acceptance rate is subject to the Zipf distribution.
  • WTD Worker Stroke Distance
  • Figure 9 is a schematic diagram showing the efficiency of the protocol of the present invention in terms of NNW (number of notifications) by changing the MAR; wherein, Figure 9(a) represents the linear decreasing function of the travel time for the data set used by Gowalla, Figure 9(a), Figure 9 (b) The representative data set is Gowalla, the worker acceptance rate obeys the Zipf distribution, Figure 9(c) represents that the data set used is Yelp, the worker acceptance rate is a linear decreasing function of the travel time, and Figure 9(d) represents the data set used. Yelp, the worker acceptance rate is subject to the Zipf distribution.
  • Figure 10 is a schematic diagram showing the efficiency of the protocol of the present invention in terms of NNW (notification of the number of people) by changing ⁇ ; wherein, Figure 10(a) represents a linear decreasing function of the travel time for the data set used by Gowalla, Figure 10(a), Figure 10 (b) represents the data set used for Gowalla, the worker acceptance rate obeys the Zipf distribution, Figure 10(c) represents that the data set used is Yelp, the worker acceptance rate is a linear decreasing function of the travel time, and Figure 10(d) represents the used The data set is Yelp and the worker acceptance rate is subject to the Zipf distribution.
  • Figure 10(a) represents a linear decreasing function of the travel time for the data set used by Gowalla
  • Figure 10 (b) represents the data set used for Gowalla
  • the worker acceptance rate obeys the Zipf distribution
  • Figure 10(c) represents that the data set used is Yelp
  • the worker acceptance rate is a linear decreasing function of the travel time
  • Figure 10(d) represents the used The
  • Figure 11 is a schematic diagram showing the efficiency of the protocol of the present invention in terms of NNW (notification of number of people) by changing ⁇ ; wherein, Figure 11(a) represents a linear decreasing function of the travel time for the data set used by Gowalla, Figure 11 (a), Figure 11 (b) represents the data set used for Gowalla, the worker acceptance rate obeys the Zipf distribution, Figure 11(c) represents the data set used for Yelp, the worker acceptance rate is a linear decreasing function of travel time, and Figure 11(d) represents the used The data set is Yelp and the worker acceptance rate is subject to the Zipf distribution.
  • Figure 11(a) represents a linear decreasing function of the travel time for the data set used by Gowalla
  • Figure 11 (b) represents the data set used for Gowalla
  • the worker acceptance rate obeys the Zipf distribution
  • Figure 11(c) represents the data set used for Yelp
  • the worker acceptance rate is a linear decreasing function of travel time
  • Figure 11(d) represents the used
  • the data set is
  • FIG 1 depicts the system model for space crowdsourcing.
  • the SC server SC-server
  • the SC server is responsible for assigning the appropriate staff to the space tasks created by the task requester. Workers need to report their private information (such as location location and speed velocity) to the SC server through their mobile device.
  • the space task s is the task to be executed at position l s and associated with the expiration date e s .
  • worker w is the person who is willing to perform a space mission. Each worker is associated with an ID id w specified by the SC server, a speed v w and its current location l w .
  • the task requester creates a spatial task s and specifies its location l s and expiration date e s . To perform this task, the worker must reach the position of the deadline l s e s.
  • the SC server assigns it to the appropriate worker based on some predefined policy. In the present invention, we assume that the SC server preferentially selects workers who may arrive at the first s . We also assume that each worker accepts the assigned task with a certain probability, expressed as an acceptance rate (AR). Assuming each worker's AR is 100%, we first define a simple task assignment problem as follows:
  • the first requirement means t c +d(l i* , l s )/v i* ⁇ e s , where t c is the current time, l i* is the current position of w i* , v i* is the speed of w i* , and d(l i* , l s ) is the Euclidean distance between the positions l i* and l s .
  • the second requirement means that there is no w j such that d(l j* , l s )/v j ⁇ d(l i* , l s )/v i* .
  • each worker w i * ⁇ W * l s position can be reached before the deadline e s;
  • no other workers w j ⁇ W ⁇ W * may be any worker l s i ⁇ W before reaching the position w * *;
  • Figure 1(b) is a system model of privacy protection space crowdsourcing. It introduces a new cryptographic service provider (CSP, Crypto Service Provider), and key services such as SC server and worker key generation.
  • CSP Cryptographic service provider
  • SC server is interested in the location and speed of each worker and the ID of each winner.
  • the CSP is also interested in this and the location of the task.
  • each worker is willing to know the location and speed of other staff, the ID of each winner, and the location of the mission.
  • each winner has the right to know his ID and the location of the task, but he also wants to know the location and speed of other staff, as well as the IDs of other winners.
  • the opponent model we have the following definitions:
  • the task location information l s cannot be obtained by the CSP and all workers except w i* ;
  • P PTA The last requirement of P PTA indicates that the SC server is not allowed to know the identity of the winner. If the SC server knows who the winner is, it may be based on some background knowledge (such as task location and due date) to infer the approximate location of the winner. Obviously, SC P TA server to determine the winner. However, in P PTA , the SC server is not allowed to know who is the winner. This contradiction is another problem with P PTA .
  • the task location information l s cannot be obtained by all workers except the CSP and the winner other than W * ;
  • a privacy distribution space crowdsourcing task distribution system model includes a space crowdsourcing server (SC server), a cryptographic service providing unit (CSP), a space task requesting unit, and a worker mobile terminal;
  • the spatial task requesting unit is configured to create a spatial task, and transmit task information to the spatial crowdsourcing server;
  • the space crowdsourcing server assigns a task to the worker mobile terminal
  • the encryption service providing unit provides privacy protection task assignment management to the spatial task request unit, the space crowdsourcing server, and the worker mobile terminal.
  • the method for implementing the task allocation system model of the privacy protection space crowdsourcing of the present invention comprises the following steps:
  • the spatial task requester creates and publishes a spatial task.
  • the space task s refers to the task to be executed at the position l s and associated with the expiration date e s .
  • the space task is released to the SC server.
  • the privacy protection task assignment The algorithm of the protocol 1" assigns the task to the worker w i* .
  • W i * worker must satisfy two conditions: first, w i * l s can be reached before the deadline e s; second, no other workers l s can be reached before w i *.
  • the Cryptographic Service Provider provides privacy protection functions that provide key services to SC servers and workers.
  • the privacy protection function encrypts the transmitted data and allows the SC server to perform addition, multiplication, and the like on the encrypted data to ensure that the SC server, the CSP, and all other workers are in addition to the selected worker w i* in the communication process. Unable to get the ID information of w i* .
  • the present invention uses the ideal paradigm to define the security of the protocol.
  • the process of protocol implementation if each party involved does not receive more information than it has access to, the agreement is secure or privacy-protected.
  • This can be defined by the ideal paradigm as follows: For all opponents, there is a probability-based polynomial time simulator that makes the viewpoints of the opponents in the real world and the viewpoints of the simulators in the ideal world computationally indistinguishable.
  • protocol P does not leak more information than the final output of P i , we believe that protocol P is completely privately protected against P i .
  • indicates that it is not possible to distinguish between calculations. in case P believes that there is agreement on privacy leak K i P i, because it does not leak and the final output more information than the K i for P i.
  • the present invention employs several encryption tools: a pseudo-random function, a Paillier cryptosystem and an ElGamal cryptosystem, which are briefly described below.
  • the pseudo-random function observes the result in a black box manner, and the random characteristics cannot be distinguished from the real random function.
  • a keyed one-way hash function such as HMAC
  • HMAC keyed one-way hash function
  • Paillier is a public key cryptosystem whose security is based on the assumption that it is related to the decomposition hardness (whether it is equivalent or not). It consists of the following three algorithms:
  • N and g are obtained from the public key pk, and c is the ciphertext of m.
  • Paillier is semantically secure, meaning that an attacker cannot obtain any information about the plaintext from the ciphertext.
  • it is also a probabilistic encryption scheme, which means that different ciphertexts are generated when the same message is encrypted multiple times. It can be clearly seen from equation (1) that the random number r participates in the encryption process.
  • ElGamal is a public key cryptosystem whose security is based on the intractability of the discrete logarithm problem. It consists of several public domain parameters and three algorithms that can be shared by multiple users:
  • the ciphertext c is decrypted by the following calculation:
  • ElGamal is also a probabilistic encryption scheme because each message is encrypted by a different random number r, as shown in equation (5).
  • An interesting property of the ElGamal cryptosystem is homomorphic multiplication. Specifically, multiplying the ciphertext of m 1 and the ciphertext of m 2 to obtain a ciphertext of m 1 m 2 , namely:
  • Switched encryption satisfies two encryption-independent attributes.
  • ElGamal can be extended to support switched encryption.
  • the two new algorithms are defined as follows:
  • the ciphertext of E' ha (m) is
  • the ciphertext (c1, c2, c3) can be decrypted by using the private keys x a and x b in a different order, and the decryption result is the same. If we use the private key x a first, we have It can be decrypted again by x b to obtain m. It's easy to verify that if x b is used first and then x a is used , the decryption result is the same.
  • Input a collection of n workers, each worker w i has an ID of i, the location information is l i , the speed information is v i ; a spatial task s (created by the task requester), the task position is l s , the due date For e s ; an SC server and a CSP.
  • the CSP generates a Paillier key pair (pk, sk) and an ElGamal key pair (pk', sk').
  • the SC server and all workers get the public keys pk and pk'.
  • the private key sk and sk' information is only known by the CSP.
  • the CSP generates another set of ElGamal domain parameters and exposes them. Based on these parameters, the CSP generates a public key pk'' again but keeps it secret. Each worker w i also generates a key pair (pki", ski") and keeps it secret.
  • SC server uses public key pk encryption x s and y s and send the results to all workers.
  • the SC server sends f k (i) to worker w i , where f k is a PRF.
  • SC server will Where 1 ⁇ i ⁇ n.
  • CSP calculates the winner with the least travel time , its travel time is
  • the CSP encrypts f k (i * ) using k' and sends E' C (f k (i * )) to the SC server.
  • Figure 3 shows an overview of the privacy protection task assignment protocol.
  • the CSP generates the domain parameters of ElGamal and the key pairs of Paillier and ElGamal. It keeps the private key secret and sends the public key to the SC server and all workers.
  • Task requester creates space task trigger stage At the beginning of segment 1, during this phase, the SC server and all workers run the privacy protection distance calculation protocol based on the encrypted location information and output the encrypted distance information.
  • each worker's speed is encrypted and sent to the SC server in collaboration with the CSP to calculate the travel time of each worker.
  • the SC server calculates the winner by means of CSP in the third stage, but the result is still in encrypted form.
  • the location information of the encrypted task is broadcast to all workers, but only the winner can retrieve the location of the task. After that, the winner arrives at the designated location to perform the corresponding task.
  • Algorithm 1 is a concrete implementation of a privacy protection task assignment protocol. We explain in detail as follows.
  • Phase 1 Since the key code of the Paillier and ElGamal cryptosystems required for phase 0 has been introduced in "Three, Password Building Blocks", we will introduce the detailed construction of the protocol from the first stage.
  • each worker w i calculates the square of the distance between l s and its current location l i and encrypts it, namely:
  • the travel time t i d(l i ,l s )/v i , ie the worker with the shortest virtual travel time must have the shortest exact travel time.
  • each worker encrypts its speed through the ElGamal cryptosystem and sends E'(v i ) to the SC server.
  • the SC server can obtain E'(V) by multiplying all the encrypted speeds.
  • the SC server then asks the CSP to decrypt E'(V) and send V to all workers.
  • the encrypted virtual travel time is sent to the SC server for further processing. Please note that the CSP and all staff in the above process know the exact value of V. However, this does not violate the personal privacy of any worker, as will be demonstrated in the next section.
  • the SC server has a list of 2-tuple ⁇ i, E(t i ' 2 )>, where i is the ID of the person w i , 1 ⁇ i ⁇ n.
  • i is the ID of the person w i , 1 ⁇ i ⁇ n.
  • it encrypts each worker's ID by a PRF f k function and sends ⁇ f k (i), E(t fk(i) ' 2 )> to the CSP to find Which worker has the shortest travel time and whether he can reach the mission location before the deadline e s .
  • the CSP Since the CSP has Paillier's private key, it is possible to obtain t i ' 2 by decrypting E(t i ' 2 ) and calculate the actual travel time. Then, the CSP can easily find the worker with the shortest travel time and determine if it can meet the deadline limit. If not, the CSP notifies the SC server that there is no winner. Otherwise, it uses ElGamal to encrypt the winner's ID f k (i * ) and sends E' C (f k (i * )) to the SC server. Encryption here is necessary because the SC server can infer who is the winner after getting f k (i * ). On the other hand, due to the pseudo-randomness of the PRF, the winner's privacy is still protected.
  • Phase 4 Upon receiving E' C (f k (i * )), the SC server encrypts the task location l s and broadcasts to all workers (l s ). Specifically, ls is encrypted in the following manner:
  • h is a length matching hash function for mapping a longer bit string to a shorter bit string.
  • a method of constructing semantically secure h is to truncate a longer bit string into a plurality of fixed-length shorter bit strings, and perform an exclusive-OR calculation on these shorter bit strings and output. Obviously, only workers who get E' C (f k (i * )) information can pass the calculation. Get the task location information. The following process ensures that only the winner can get E' C (f k (i * )) information.
  • each worker w i obtains the encrypted ID f k (i) from the SC server and encrypts it with ElGamal using its own public key, and then sends the encrypted information E' wi (f k (i)) to CSP.
  • the CSP encrypts it again via ElGamal using its public key and the same random number r used to encrypt E' C (f k (i * )).
  • CSP will then result Sent to each worker who can be decrypted by his private key to obtain E' C (f k (i)). Obviously, only the winner w fk(i*) can get E' C (f k (i * )).
  • the public key used here should be kept confidential to protect privacy.
  • the appropriate key length should be set to avoid overflow of all workers' speed products. For example, we used a 2048-bit key to process 1,000 workers in the experiment. If the number of workers is large, the likely method is to use the least common multiple (LCM) instead of multiplication.
  • LCM least common multiple
  • Table 1 summarizes the computational cost of our protocol. We assume that all workers can perform calculations (such as encryption and decryption) in parallel, and can interact with the SC server and CSP in parallel, so we only need to consider the computational cost of a user. In addition, we ignore low-cost operations such as large integer multiplication and bit-wise XOR operations.
  • the detailed analysis is as follows. In Algorithm 1, the SC server performs three Paillier encryptions (line 5), and the worker w i performs a Paillier encryption and two modular exponentiation operations (lines 7, 8) for privacy calculation of the travel distance. In the second phase, the worker performs an ElGamal encryption to protect its speed (line 12).
  • the product of the encrypted speed is decrypted by the CSP (line 15) to achieve the calculation of the subsequent travel time.
  • the SC server uses n PRF functions to protect the worker's ID (line 21), the CSP performs n times of ElGamal decryption (line 23) and an ElGamal encryption (line 25) to find the winner and protect it. ID.
  • the worker w i will perform one ElGamal encryption (line 29) and one ElGamal secondary decryption (line 31), and the CSP will perform n times of ElGamal secondary encryption (line 30). ).
  • E, D, E', D', e, PRF denotes Paillier encryption, Paillier decryption, ElGamal encryption, ElGamal decryption, ElGamal secondary encryption, ElGamal secondary decryption, modular power and pseudo-random function, respectively.
  • Table 2 shows the communication overhead of the proposed protocol.
  • L and L' are the key lengths of the Paillier and ElGamal encryption systems, respectively.
  • Table 2 summarizes the communication overhead of our protocol. Since the size of the ciphertext is usually larger than the plaintext size, we only consider the ciphertext sent and received by each party. It should be noted that the ciphertext lengths of ElGamal encryption and secondary encryption are twice and three times the length of the key, respectively. We have omitted the detailed analysis. Please refer to Table 2 for the analysis results.
  • the lemma 3 product ⁇ and the positive rational number set ⁇ b 1 ,...,b n ⁇ are random positive integers ranging from 1 to d (d>n) Generated and satisfies the following equation:
  • Lemma 4 selects the random number a from 1, ..., d, and when d ⁇ , the probability that a is a prime number is 1/log d.
  • Theorem 2 is based on the information K i (-1 ⁇ i ⁇ n), and the probability that the intruder P i can obtain private information of either party during the execution of the task assignment protocol (Algorithm 1) is negligible.
  • Algorithm 1 based on two types of metrics: efficiency related and effectiveness related.
  • the former includes run time and communication overhead, worker travel distance (WTD), worker travel time (WTT), and number of notifications (NNW).
  • WTD worker travel distance
  • WTT worker travel time
  • NGW number of notifications
  • differential privacy is significantly less expensive than public key cryptosystems, but it does not protect data during the calculation process (for example, allowing trusted third parties to view the location of all workers). Therefore, it is pointless to compare our protocol (based on public key cryptosystem) with the method of To et al. (based on differential privacy) in terms of runtime. Therefore, we only pay attention to the efficiency of our agreement and test whether its overhead can be accepted in practice. We run our agreement 10 times and report their average results.
  • Gowalla contains the login history of users in a location-based social network.
  • Yelp we chose a region of Phoenix with a latitude from 33.205308 to 33.924407 and a longitude from -112.400283 to -111.218100. The region has approximately 67,000 users and 11,200 companies.
  • a company location is considered a task, and the user's location is randomly selected from the companies it has viewed.
  • Figure 4(a) shows that the number of workers #W is increased from 100 to 1000, and the step size is 300 is the running time of the protocol.
  • the CPU time of the SC server and the CSP also increases linearly, because their computational cost mainly comes from the cryptographic operation proportional to the number of workers.
  • the computational cost of workers using medium-sized mobile phones is almost constant, for example about 0.1 second. Therefore, our agreement has good scalability in practice. In terms of total uptime, our protocol requires less than 2 seconds to achieve a privacy protection task assignment of more than 1,000 workers.
  • Figure 4(b) shows that the 2048-bit key used provides a more robust security guarantee (this key length is recommended for the next 15 years). Even in this case, the total running time of our agreement is still less than 7 seconds.
  • Figures 6, 7 and 8 show the performance of our protocol in WTD (Worker Stroke Distance) by changing MAR, ⁇ and ⁇ , respectively.
  • WTD Worker Stroke Distance
  • our protocol outperforms the benchmark in all combinations of datasets (Gowalla, Yelp) and acceptance rate functions (Linear, Zipf).
  • the benchmark needs to access more grid cells to achieve the desired acceptance rate.
  • Each unit usually contains some workers. Some of them may be far from the mission location, but they can accept the mission. However, our agreement always selects workers based on their travel time (or travel distance in this case). That's why when the MAR is small, our agreement is much better than the benchmark.

Abstract

Disclosed is a task allocation system model of privacy protected spatial crowdsourcing, comprising a spatial crowdsourcing server, a cryptographic service provider unit, a spatial task request unit and a worker mobile terminal, wherein the spatial task request unit is used for creating spatial tasks and transmitting task information to the spatial crowdsourcing server; the spatial crowdsourcing server allocates the tasks to the worker mobile terminal; and the cryptographic service provider unit provides privacy protection task allocation management for the spatial task request unit, the spatial crowdsourcing server and the worker mobile terminal. Furthermore, also disclosed is an implementation method of the system model. The present invention firstly realizes dual-party privacy protection in spatial crowdsourcing, not only protecting the privacy of the worker, but also protecting task privacy. Efficient task allocation is performed in spatial crowdsourcing, and the privacy protection is provided to both the worker and the task.

Description

一种隐私保护空间众包的任务分配系统模型及实现方法Task distribution system model and implementation method for privacy protection space crowdsourcing 技术领域Technical field
本发明属于计算机领域,具体涉及一种空间众包的任务分配系统模型,尤其涉及一种隐私保护空间众包的任务分配系统模型;此外,本发明还涉及该隐私保护空间众包的任务分配系统模型的实现方法。The invention belongs to the field of computers, and particularly relates to a task distribution system model of space crowdsourcing, in particular to a task distribution system model of privacy protection space crowdsourcing; in addition, the invention also relates to a task distribution system of the privacy protection space crowdsourcing The implementation of the model.
背景技术Background technique
众包通过将一项任务(通常由指定代理人执行)通过公开招募的形式外包给大众,彻底改变了问题解决方法的格局。众包可以按需提供人才容量和专家服务,所需成本远远少于雇佣专业人士,已经被成功应用于转录书籍、蛋白质折叠、星系分类和交通监测等。最近,众包也已广泛用于应急管理,因为它可以在紧急情况和灾害中高效和低成本的收集关键信息,例如影响区域,危险人群,以及可能需要搜索和救援行动的潜在地区。例如,2015年4月25日,尼泊尔遭受了7.8级地震的袭击。为了提供详细的损伤评估,DigitalGlobe收集了受影响地区地震前后到高分辨率卫星图像,这些图像被分成小部分并提供给在线人群以识别受损建筑物和道路。因为众包的帮助,21000多个损坏的建筑和道路在一个月内被识别和标记,为救助和重建提供了有价值的数据。Crowdsourcing has revolutionized the way solutions are solved by outsourcing a task (usually performed by a designated agent) to the public through open recruitment. Crowdsourcing can provide talent capacity and expert services on demand, far less than the cost of hiring professionals, and has been successfully applied to transcription books, protein folding, galaxies classification and traffic monitoring. Recently, crowdsourcing has also been widely used for emergency management because it collects critical information efficiently and at low cost in emergencies and disasters, such as affected areas, at-risk populations, and potential areas where search and rescue operations may be required. For example, on April 25, 2015, Nepal was hit by a magnitude 7.8 earthquake. To provide detailed damage assessment, DigitalGlobe collects high-resolution satellite images from the affected areas before and after the earthquake. These images are divided into small segments and provided to online populations to identify damaged buildings and roads. Thanks to the help of crowdsourcing, more than 21,000 damaged buildings and roads were identified and marked within a month, providing valuable data for rescue and reconstruction.
由于无处不在的无线网络和智能移动设备的快速发展,在应急管理中众包可以扮演更为积极主动的角色。一种新型的众包,空间众包(SC)将一个空间任务(即与位置相关的任务)外包给持有移动设备的多个工作者,这些工作者需要到达指定位置并完成任务。我们继续上述在地震中的应急管理的例子。SC服务器发送一个在特定的倒塌建筑物中是否存在幸存者的空间任务给所有可用工作者,包括志愿者和配备有生命检测仪器的专业人员。愿意执行任务的工作者到达建筑物进行检查,并将结果发送回SC服务器。基于随后可以进行的救援计划,例如,如果有人被识别为被困在瓦砾中,则会在现场部署专业重型救援设备。Due to the rapid development of ubiquitous wireless networks and smart mobile devices, crowdsourcing can play a more proactive role in emergency management. A new type of crowdsourcing, Space Crowdsourcing (SC) outsources a spatial task (ie, location-related tasks) to multiple workers holding mobile devices that need to reach a designated location and complete a task. We continue the above examples of emergency management in the earthquake. The SC server sends a space task for survivors in a particular collapsed building to all available workers, including volunteers and professionals equipped with life testing instruments. Workers willing to perform the task arrive at the building for inspection and send the results back to the SC server. Based on a rescue plan that can be subsequently performed, for example, if someone is identified as being trapped in the rubble, professional heavy rescue equipment will be deployed on site.
不管在任何应用领域,众包的成功取决于人群的积极参与。对于空间众包,位置隐私问题是妨碍工人从事空间任务的主要因素。为了实现有效的任务分配(这里的有效性指空间任务可以通过分配给附近的工人而快速完成),SC服务器需要通过工人们的移动设备不断地收集他们的位置。然而,工人非常难以控制由不受信任的第三方,即SC服务器,存储他们的位置数据的使用。事实上,所收集的位置数据很可能被共享,出租或出售,这对个人隐私有严重的影响。基于这些位置数据,入侵者可以对个人进行广泛的攻击,比如物理监视和跟踪,身份窃取和敏感信息(例如家庭住址和生活习惯)破坏等。因此,位置隐私保护,或者更一般地,工作者的隐私保护是空间众包的一个重要方面,因为它可以激励工人积极参与完成空间任务。这对于应急管理特别重要,因为更活跃的工人通常意味着任务可以更快地完成。Regardless of the application area, the success of crowdsourcing depends on the active participation of the crowd. For space crowdsourcing, location privacy issues are a major factor hindering workers from engaging in space missions. In order to achieve efficient task assignment (where effectiveness means that space tasks can be quickly completed by assigning them to nearby workers), the SC server needs to continuously collect their location through the workers' mobile devices. However, it is very difficult for workers to control the use of their location data by an untrusted third party, the SC server. In fact, the collected location data is likely to be shared, rented or sold, which has a serious impact on personal privacy. Based on these location data, intruders can conduct a wide range of attacks on individuals, such as physical surveillance and tracking, identity theft, and the destruction of sensitive information such as home addresses and lifestyle habits. Therefore, location privacy protection, or more generally, worker privacy protection is an important aspect of space crowdsourcing because it can motivate workers to actively participate in space missions. This is especially important for emergency management because more active workers usually mean that tasks can be completed faster.
现有众包平台上的任务(如Amazon Mechanical Turk)对所有工人都是公开的。这种模式可能不适合在紧急情况下的空间众包。一旦任务的位置被公开,由利他主义激励的过度工作者便可以去那里执行任务,即使他们没有被要求这样做。这可能引起更多其他的混论,比如交通堵塞。因此,任务的位置不应该被工作人员掌握,除了任务被分配到的人。有时,从任务请求者的角度来看,任务位置保护也是受欢迎的。例如,在家中患有健康问题的人可以通过众包寻求帮助,但是公开其健康问题以及家庭地址明显侵犯了个人隐私。因此,任务位置隐私也应该在空间众包中得到保护。Tasks on existing crowdsourcing platforms, such as Amazon Mechanical Turk, are open to all workers. This mode may not be suitable for space crowdsourcing in an emergency. Once the position of the mission is made public, the over-workers motivated by altruism can go there to perform the task, even if they are not required to do so. This may lead to more other mixed discussions, such as traffic jams. Therefore, the location of the task should not be mastered by the staff, except for the person to whom the task is assigned. Sometimes, from the perspective of the task requester, task location protection is also welcome. For example, people with health problems at home can seek help through crowdsourcing, but publicizing their health issues and home addresses clearly violates personal privacy. Therefore, task location privacy should also be protected in space crowdsourcing.
在基于位置服务的场景下,虽然已经有很多针对位置隐私策略的努力,但是在空间众包应用中的研究工作较少。在[To,H.,Ghinita,G.and Shahabi,C.:A framework for protecting worker location privacy in spatial crowdsourcing.PVLDB,7(10),919-930(2014)]中,工作人员的位置被信任方收集和干扰,根据隐私差分注入校准噪声到原始数据 [参见Dwork,C.,2008,April.Differential privacy:A survey of results.In International Conference on Theory and Applications of Models of Computation(pp.1-19).Springer Berlin Heidelberg.]。在接收到空间任务时,SC服务器查询被干扰过的位置数据,以确定在任务位置附近可能包含足够工人的区域。位于该区域的工人将会接到任务通知,并有权决定是否执行。在这项开创性的工作中提出的解决方案有几个缺点。首先,它只考虑工人的位置隐私,而不考虑任务位置的隐私。第二,它主要基于工人的行进距离执行任务分配,而没有考虑到其他重要因素,例如工人的行进速度,这使得分配结果有时不能令人满意。此外,它的工作基于一个非常强的假设,即有一个可信任方有权访问所有工人的位置。In the location-based service-based scenario, although there have been many efforts for location privacy policies, there is less research work in space crowdsourcing applications. In [To, H., Ghinita, G. and Shahabi, C.: A framework for protecting worker location privacy in spatial crowdsourcing. PVLDB, 7(10), 919-930 (2014)], the position of the staff member is trusted. Party collection and interference, injecting calibration noise into raw data based on privacy differential [See Dwork, C., 2008, April. Differential privacy: A survey of results. In International Conference on Theory and Applications of Models of Computation (pp. 1-19). Springer Berlin Heidelberg.]. Upon receiving the spatial task, the SC server queries the interfered location data to determine an area that may contain sufficient workers near the mission location. Workers located in the area will be notified of the task and have the right to decide whether or not to proceed. The solution proposed in this groundbreaking work has several drawbacks. First, it only considers the location privacy of the worker, regardless of the privacy of the task location. Second, it performs task assignment based mainly on the distance traveled by the worker, without taking into account other important factors, such as the speed of the worker's travel, which makes the distribution result sometimes unsatisfactory. In addition, its work is based on a very strong assumption that there is a trusted party with access to all workers.
因此,亟需研发一种既可以保护工人的位置隐私,还可以保护任务位置隐私的空间众包任务分配系统。Therefore, there is an urgent need to develop a space crowdsourcing task distribution system that can protect the privacy of workers' locations and protect the privacy of mission locations.
发明内容Summary of the invention
本发明要解决的技术问题在于提供一种隐私保护空间众包的任务分配系统模型,在任务分配期间,不仅应保护工作者的隐私,还应保护任务隐私,本发明实现了对双方的私人数据进行加密,从而实现强大的互保性。为此,本发明还提供该隐私保护空间众包的任务分配系统模型的实现方法。The technical problem to be solved by the present invention is to provide a task distribution system model for privacy protection space crowdsourcing. During the task assignment, not only the privacy of the worker but also the privacy of the task should be protected, and the present invention implements private data for both parties. Encryption for strong mutual security. To this end, the present invention also provides a method for implementing the task allocation system model of the privacy protection space crowdsourcing.
为解决上述技术问题,本发明提供一种隐私保护空间众包的任务分配系统模型,包括空间众包服务器、加密服务提供单元、空间任务请求单元和工人移动端;To solve the above technical problem, the present invention provides a task allocation system model for privacy protection space crowdsourcing, including a space crowdsourcing server, an encryption service providing unit, a space task requesting unit, and a worker mobile terminal;
所述空间任务请求单元用于创建空间任务,将任务信息传送给所述空间众包服务器;The spatial task requesting unit is configured to create a spatial task, and transmit task information to the spatial crowdsourcing server;
所述空间众包服务器将任务分配给所述工人移动端;The space crowdsourcing server assigns a task to the worker mobile terminal;
所述加密服务提供单元对所述空间任务请求单元、所述空间众包服务器和所述工人移动端提供隐私保护任务分配管理。The encryption service providing unit provides privacy protection task assignment management to the spatial task request unit, the space crowdsourcing server, and the worker mobile terminal.
作为本发明优选的技术方案,所述空间任务s是指要在位置ls执行,并与截止日期es相关联的任务;所述工人移动端的工人w是愿意执行空间任务的人,每个工人与由空间众包服务器指定的ID idw,速度vw和其当前所处的位置lw相关联。所述空间众包服务器根据工人集合W={w1,w2,…,wn}和空间任务s的位置ls和截止日期es,通过任务分配算法,将任务分配给工作者wi*,工作者wi*需满足两个条件:第一,wi*可以在截止日期es之前到达ls;第二,没有其他工人可以在wi*之前到达lsAs a preferred technical solution of the present invention, the space task s refers to a task to be executed at the position l s and associated with the expiration date e s ; the worker w of the worker mobile is a person who is willing to perform a spatial task, each The worker is associated with the ID id w specified by the space crowdsourcing server, the speed v w and its current location l w . The space crowdsourcing server assigns the task to the worker w i by the task assignment algorithm according to the worker set W={w 1 , w 2 , . . . , w n } and the position l s of the spatial task s and the expiration date e s . *, w i * worker must satisfy two conditions: first, w i * l s can be reached before the deadline e s; second, no other workers l s can be reached before w i *.
作为本发明优选的技术方案,所述加密服务提供单元提供隐私保护功能,其向空间众包服务器和工人移动端提供密钥服务,隐私保护功能通过对传输数据的加密,并且使空间众包服务器能对加密数据进行计算,保证在通信过程中除了被选中的工作者wi*外,空间众包服务器,加密服务提供单元和所有其他工人都无法获得wi*的ID信息。As a preferred technical solution of the present invention, the encryption service providing unit provides a privacy protection function, which provides a key service to the space crowdsourcing server and the worker mobile terminal, and the privacy protection function encrypts the transmission data and makes the space crowdsourcing server The encrypted data can be calculated to ensure that the space crowdsourcing server, the encryption service providing unit and all other workers cannot obtain the ID information of the w i* except for the selected worker w i* in the communication process.
作为本发明优选的技术方案,所述加密服务提供单元采用Paillier密码系统和ElGamal密码系统,所述加密服务提供单元生成ElGamal的域参数和Paillier和ElGamal的密钥对,其对私钥进行保密,并向空间众包服务器和所有工人发送公钥。As a preferred technical solution of the present invention, the encryption service providing unit adopts a Paillier cryptosystem and an ElGamal cryptosystem, and the cryptographic service providing unit generates a domain parameter of ElGamal and a key pair of Paillier and ElGamal, and the private key is kept secret. And send the public key to the space crowdsourcing server and all workers.
此外,本发明还提供一种隐私保护空间众包的任务分配系统模型的实现方法,包括如下步骤:In addition, the present invention also provides a method for implementing a task allocation system model for privacy protection space crowdsourcing, comprising the following steps:
步骤一,空间任务请求单元创建并发布空间任务;Step 1: The space task request unit creates and publishes a space task;
步骤二,空间任务发布至空间众包服务器,空间众包服务器通过任务分配算法,将任务分配给工作者;Step 2: The spatial task is released to the space crowdsourcing server, and the space crowdsourcing server assigns the task to the worker through the task allocation algorithm;
步骤三,加密服务提供单元提供隐私保护功能,其向空间众包服务器和工人移动端提供密钥服务。In step three, the encryption service providing unit provides a privacy protection function, which provides a key service to the space crowdsourcing server and the worker mobile terminal.
作为本发明优选的技术方案,步骤二中所述的任务分配算法具体包括如下阶段:As a preferred technical solution of the present invention, the task allocation algorithm described in step 2 specifically includes the following stages:
第一阶段,任务位置与工人位置距离计算:空间众包服务器用Paillier公钥加密任务 位置ls=(xs,ys)后,向所有工人发送三份密文:E(xs 2+ys 2),E(xs)和E(ys),从空间众包服务器接收到该加密信息后,每个工人wi计算ls和其当前位置li的距离的平方,并进行加密,即:In the first stage, the distance between the task position and the worker position is calculated: the space crowdsourcing server uses the Paillier public key to encrypt the task. After the position ls=(x s , y s ), three ciphertexts are sent to all workers: E(x s 2 +y s 2 ), E(x s ) and E(y s ), after receiving the encrypted information from the space crowdsourcing server, each worker w i calculates the square of the distance between l s and its current position l i and encrypts ,which is:
Figure PCTCN2017113454-appb-000001
Figure PCTCN2017113454-appb-000001
第二阶段,每个工人行进时间计算:令W={w1,w2,…,wn}是n个工人的集合,V是所有工人速度的乘积,即
Figure PCTCN2017113454-appb-000002
且vk‘=V/vk,其中1≤k≤n;对于任意两个工人wi,wj∈W,当且仅当d(li,ls)vi‘<d(lj,ls)vj‘时有d(li,ls)/vi<d(lj,ls)/vj;为每个工人计算虚拟行程时间ti’=d(li,ls)vi’,其等同于确切的行程时间ti=d(li,ls)/vi,即具有最短虚拟行程时间的工人必定具有最短的确切行程时间;
In the second stage, each worker travels time calculation: Let W={w 1 , w 2 ,..., w n } be the set of n workers, and V is the product of the speeds of all workers, ie
Figure PCTCN2017113454-appb-000002
And v k '=V/v k , where 1 ≤ k ≤ n; for any two workers w i , w j ∈ W, if and only if d(l i , l s )v i '<d(l j , l s )v j ' is d(l i ,l s )/v i <d(l j ,l s )/v j ; for each worker, the virtual travel time t i '=d(l i , l s )v i ', which is equivalent to the exact travel time t i =d(l i ,l s )/v i , ie the worker with the shortest virtual travel time must have the shortest exact travel time;
第三阶段,获胜工人计算:空间众包服务器具有2元组<i,E(ti2)>的列表,其中i是人wi的ID,1≤i≤n;为了保护工人,尤其是获胜者的身份,它通过一个PRF fk函数加密每个工人的ID,并向加密服务提供单元发送<fk(i),E(tfk(i)2)>,以找到哪个工人的行程时间最短,以及其是否可以在截止日期es之前到达任务位置;In the third stage, the winning worker calculates: the space crowdsourcing server has a list of 2-tuple <i, E(t i ' 2 )>, where i is the ID of the person w i , 1 ≤ i ≤ n; Is the identity of the winner, which encrypts each worker's ID by a PRF f k function and sends <f k (i), E(t fk(i) ' 2 )> to the cryptographic service provider to find which worker The travel time is the shortest and whether it can reach the mission location before the deadline e s ;
第四阶段,任务位置广播:一旦接收到E’C(fk(i*)),空间众包服务器便加密任务位置ls并向所有工人广播
Figure PCTCN2017113454-appb-000003
以如下方式加密ls
The fourth stage, task location broadcast: Once E' C (f k (i * )) is received, the space crowdsourcing server encrypts the task location l s and broadcasts to all workers
Figure PCTCN2017113454-appb-000003
Encrypt l s as follows:
Figure PCTCN2017113454-appb-000004
Figure PCTCN2017113454-appb-000004
其中h是长度匹配哈希函数,用于将较长的位串映射到较短的位串;一种被证明是语义安全的h的构建方法是,将一个较长的位串截断为多个固定长度的较短位串,并在这些较短位串上进行异或计算并输出;只有获得E’C(fk(i*))信息的工人才能通过计算
Figure PCTCN2017113454-appb-000005
Figure PCTCN2017113454-appb-000006
得到任务位置信息。
Where h is a length matching hash function for mapping a longer bit string to a shorter bit string; a method of constructing h that proves to be semantically secure is to truncate a longer bit string into multiple Fixed-length shorter bit strings, and XOR calculations and outputs on these shorter bit strings; only workers who obtain E' C (f k (i * )) information can pass the calculation
Figure PCTCN2017113454-appb-000005
Figure PCTCN2017113454-appb-000006
Get the task location information.
作为本发明优选的技术方案,所述第一阶段中,要求所有工人以E(xi 2+yi 2),E(xi)和E(yi)的形式向空间众包服务器发送加密位置,并要求空间众包服务器计算E(d2(li,ls))。As a preferred technical solution of the present invention, in the first stage, all workers are required to send encryption to the space crowdsourcing server in the form of E(x i 2 +y i 2 ), E(x i ) and E(y i ). Location, and ask the space crowdsourcing server to calculate E(d 2 (l i , l s )).
作为本发明优选的技术方案,所述第二阶段中,每个工人通过ElGamal密码系统对其速度进行加密,并将E‘(vi)发送给空间众包服务器,空间众包服务器通过将所有加密的速度相乘获得E’(V);然后,空间众包服务器要求加密服务提供单元解密E’(V),并给所有工人移动端发送V;通过用其速度vi除V,每个工人wi得到vi’的值并计算E(d2(li,ls))vi’2=E(d2(li,ls)vi2)=E(ti2);加密的虚拟行程时间被发送到空间众包服务器进行进一步处理;该过程中加密服务提供单元和所有工人都知道V的确切值,这并不违反任何工人的个人隐私。As a preferred technical solution of the present invention, in the second phase, each worker encrypts its speed through the ElGamal cryptosystem and sends E'(v i ) to the space crowdsourcing server, and the space crowdsourcing server passes all The encrypted speed is multiplied to obtain E'(V); then, the space crowdsourcing server asks the cryptographic service providing unit to decrypt E'(V) and send V to all workers' mobile terminals; by dividing V by its speed v i , each Worker w i obtains the value of v i ' and calculates E(d 2 (l i , l s )) vi'2 = E(d 2 (l i , l s )v i ' 2 )=E(t i ' 2 The encrypted virtual travel time is sent to the space crowdsourcing server for further processing; during this process, the cryptographic service providing unit and all workers know the exact value of V, which does not violate the personal privacy of any worker.
作为本发明优选的技术方案,所述第三阶段中,由于加密服务提供单元具有Paillier的私钥,因此能通过解密E(ti2)来获得ti2并计算实际的行程时间
Figure PCTCN2017113454-appb-000007
然后,加密服务提供单元很容易的找到具有最短行程时间的工人,并判断其是否可以满足截止日期限制;如果不能,加密服务提供单元通知空间众包服务器没有获胜者,否则,它使用ElGamal加密获胜者的ID fk(i*),并将E’C(fk(i*))发送到空间众包服务器。
As a preferred technical solution of the present invention, in the third stage, since the encryption service providing unit has the private key of Paillier, it is possible to obtain t i ' 2 by decrypting E(t i ' 2 ) and calculate the actual travel time.
Figure PCTCN2017113454-appb-000007
Then, the cryptographic service providing unit can easily find the worker with the shortest travel time and judge whether it can meet the deadline limit; if not, the cryptographic service providing unit notifies the space crowdsourcing server that there is no winner, otherwise it wins with ElGamal encryption. The ID f k (i * ) and E' C (f k (i * )) are sent to the space crowdsourcing server.
作为本发明优选的技术方案,所述第四阶段中,以下步骤确保只有获胜者才能获得E’C(fk(i*))信息:As a preferred technical solution of the present invention, in the fourth stage, the following steps ensure that only the winner can obtain the E' C (f k (i * )) information:
首先,每个工人wi从空间众包服务器获取加密的ID fk(i)),并使用自己的公钥通过ElGamal进行加密,然后将加密后的信息E’wi(fk(i))发送给加密服务提供单元,加密服务提供单元接收到该信息后,使用其公钥和用于加密E’C(fk(i*))的相同随机数r再次通过 ElGamal进行加密;加密服务提供单元随后将结果
Figure PCTCN2017113454-appb-000008
发送到每个可以通过其私钥来解密以获得E’C(fk(i))的工人;所述公钥应该保密,以保护隐私。
First, each worker w i obtains the encrypted ID f k (i) from the space crowdsourcing server and encrypts it with ElGamal using its own public key, and then encrypts the information E' wi (f k (i)) Sent to the encryption service providing unit, after receiving the information, the encryption service providing unit encrypts again through ElGamal using its public key and the same random number r for encrypting E' C (f k (i * )); the encryption service provides Unit will then result
Figure PCTCN2017113454-appb-000008
Sent to each worker who can be decrypted by their private key to obtain E' C (f k (i)); the public key should be kept secret to protect privacy.
与现有技术相比,本发明具有以下有益效果:Compared with the prior art, the present invention has the following beneficial effects:
1、双方的隐私保护。在任务分配期间,不仅应保护工作者的隐私,还应保护任务隐私。本发明采用著名的密码系统对双方的私人数据进行加密,从而实现强大的互保性。1. Privacy protection of both parties. During the assignment of tasks, not only the privacy of workers should be protected, but also the privacy of tasks should be protected. The invention uses a well-known cryptosystem to encrypt private data of both parties, thereby realizing strong mutual security.
2、高效的任务分配。在任务分配期间,行进时间比行进距离更加重要,特别是对于有最后期限的任务,因此在最近的空间众包应用中工作者速度被认为是一个重要指标。本发明统一工人速度与工人的位置,以实现更有效的任务分配。2. Efficient task assignment. During task assignment, travel time is more important than travel distance, especially for missions with deadlines, so worker speed is considered an important indicator in recent space crowdsourcing applications. The present invention unifies worker speed and worker position to achieve more efficient task assignment.
3、可接收的开销。隐私保护的强度以附加的计算或通信成本为代价。在任务分配期间,本发明组合部分同态加密方案以有效地实现在加密数据上所需的复杂操作,从而避免显著的性能损失。3. The overhead that can be received. The strength of privacy protection comes at the expense of additional computing or communication costs. During task assignment, the present invention combines a partially homomorphic encryption scheme to efficiently implement the complex operations required on encrypting data, thereby avoiding significant performance penalties.
4、本发明可以实现空间众包中进行高效的任务分配,并提供工作者和任务两方面的隐私保护。这是首次在空间众包中实现双方隐私保护,具有创造性。4. The invention can realize efficient task assignment in space crowdsourcing and provide privacy protection for both workers and tasks. This is the first time in the space crowdsourcing to achieve mutual privacy protection, creative.
5、本发明可以实现现有实用密码系统不能支持的一些复杂操作,通过这种策略,本发明协议可以在可接受的开销下实现双方的隐私保护。5. The present invention can implement some complicated operations that the existing practical cryptosystem cannot support. Through this strategy, the protocol of the present invention can implement privacy protection of both parties with acceptable overhead.
附图说明DRAWINGS
下面结合附图和实施例对本发明进一步说明。The invention will now be further described with reference to the drawings and embodiments.
图1是空间众包的系统模型示意图;其中,图1(a)是非私人空间众包的系统模型示意图;图1(b)是本发明隐私保护空间众包的任务分配系统模型示意图。1 is a schematic diagram of a system model of space crowdsourcing; wherein FIG. 1(a) is a schematic diagram of a system model of a non-private space crowdsourcing; FIG. 1(b) is a schematic diagram of a task allocation system model of the privacy protection space crowdsourcing of the present invention.
图2是本发明隐私保护空间众包的任务分配系统模型的实现方法的流程图。2 is a flow chart of a method for implementing a task allocation system model of privacy protection space crowdsourcing according to the present invention.
图3是本发明的隐私保护任务分配协议的概览图。3 is an overview of the privacy protection task assignment protocol of the present invention.
图4是本发明协议中工人数量相对于行程时间的效率示意图;其中图4(a)代表密钥长度为1024,图4(b)代表密钥长度为2048。4 is a schematic diagram showing the efficiency of the number of workers in the protocol of the present invention with respect to travel time; wherein FIG. 4(a) represents a key length of 1024, and FIG. 4(b) represents a key length of 2048.
图5是本发明协议中工人数量相对于各方通信开销的示意图;其中图5(a)代表密钥长度为1024,图5(b)代表密钥长度为2048。5 is a schematic diagram of the number of workers in the protocol of the present invention relative to the communication overhead of the parties; wherein FIG. 5(a) represents a key length of 1024, and FIG. 5(b) represents a key length of 2048.
图6是通过改变MAR来显示本发明协议在WTD(工人行程距离)方面的效率示意图;其中,图6(a)代表所使用数据集为Gowalla,工人接受率为行程时间的线性递减函数,图6(b)代表所使用数据集为Gowalla,工人接受率服从Zipf分布,图6(c)代表所使用数据集为Yelp,工人接受率为行程时间的线性递减函数,图6(d)代表所使用数据集为Yelp,工人接受率服从Zipf分布。Figure 6 is a schematic diagram showing the efficiency of the protocol of the present invention in terms of WTD (Worker Stroke Distance) by changing MAR; wherein Figure 6(a) represents a linear decreasing function of the travel time for the data set used by Gowalla, the worker acceptance rate, 6(b) represents that the data set used is Gowalla, the worker acceptance rate obeys the Zipf distribution, Figure 6(c) represents that the data set used is Yelp, the worker acceptance rate is a linear decreasing function of the travel time, and Figure 6(d) represents the Using the data set for Yelp, the worker acceptance rate is subject to the Zipf distribution.
图7是通过改变α来显示本发明协议在WTD(工人行程距离)方面的效率示意图;其中,图7(a)代表所使用数据集为Gowalla,工人接受率为行程时间的线性递减函数,图7(b)代表所使用数据集为Gowalla,工人接受率服从Zipf分布,图7(c)代表所使用数据集为Yelp,工人接受率为行程时间的线性递减函数,图7(d)代表所使用数据集为Yelp,工人接受率服从Zipf分布。Figure 7 is a schematic diagram showing the efficiency of the protocol of the present invention in WTD (Worker Stroke Distance) by changing α; wherein Figure 7(a) represents a linear decreasing function of the travel time of the data set used by Gowalla, the worker acceptance rate, 7(b) represents that the data set used is Gowalla, the worker acceptance rate obeys the Zipf distribution, and Figure 7(c) represents that the data set used is Yelp, the worker acceptance rate is a linear decreasing function of the travel time, and Figure 7(d) represents the Using the data set for Yelp, the worker acceptance rate is subject to the Zipf distribution.
图8是通过改变ε来显示本发明协议在WTD(工人行程距离)方面的效率示意图;其中,图8(a)代表所使用数据集为Gowalla,工人接受率为行程时间的线性递减函数,图8(b)代表所使用数据集为Gowalla,工人接受率服从Zipf分布,图8(c)代表所使用数据集为Yelp,工人接受率为行程时间的线性递减函数,图8(d)代表所使用数据集为Yelp,工人接受率服从Zipf分布。Figure 8 is a schematic diagram showing the efficiency of the protocol of the present invention in WTD (Worker Stroke Distance) by changing ε; wherein Figure 8(a) represents a linear decreasing function of the travel time of the data set used by Gowalla, the worker acceptance rate, 8(b) represents that the data set used is Gowalla, the worker acceptance rate obeys the Zipf distribution, and Figure 8(c) represents that the data set used is Yelp, the worker acceptance rate is a linear decreasing function of the travel time, and Figure 8(d) represents the Using the data set for Yelp, the worker acceptance rate is subject to the Zipf distribution.
图9是通过改变MAR来显示本发明协议在NNW(通知人数)方面的效率示意图;其中,图9(a)代表所使用数据集为Gowalla,工人接受率为行程时间的线性递减函数,图9(b) 代表所使用数据集为Gowalla,工人接受率服从Zipf分布,图9(c)代表所使用数据集为Yelp,工人接受率为行程时间的线性递减函数,图9(d)代表所使用数据集为Yelp,工人接受率服从Zipf分布。Figure 9 is a schematic diagram showing the efficiency of the protocol of the present invention in terms of NNW (number of notifications) by changing the MAR; wherein, Figure 9(a) represents the linear decreasing function of the travel time for the data set used by Gowalla, Figure 9(a), Figure 9 (b) The representative data set is Gowalla, the worker acceptance rate obeys the Zipf distribution, Figure 9(c) represents that the data set used is Yelp, the worker acceptance rate is a linear decreasing function of the travel time, and Figure 9(d) represents the data set used. Yelp, the worker acceptance rate is subject to the Zipf distribution.
图10是通过改变α来显示本发明协议在NNW(通知人数)方面的效率示意图;其中,图10(a)代表所使用数据集为Gowalla,工人接受率为行程时间的线性递减函数,图10(b)代表所使用数据集为Gowalla,工人接受率服从Zipf分布,图10(c)代表所使用数据集为Yelp,工人接受率为行程时间的线性递减函数,图10(d)代表所使用数据集为Yelp,工人接受率服从Zipf分布。Figure 10 is a schematic diagram showing the efficiency of the protocol of the present invention in terms of NNW (notification of the number of people) by changing α; wherein, Figure 10(a) represents a linear decreasing function of the travel time for the data set used by Gowalla, Figure 10(a), Figure 10 (b) represents the data set used for Gowalla, the worker acceptance rate obeys the Zipf distribution, Figure 10(c) represents that the data set used is Yelp, the worker acceptance rate is a linear decreasing function of the travel time, and Figure 10(d) represents the used The data set is Yelp and the worker acceptance rate is subject to the Zipf distribution.
图11是通过改变ε来显示本发明协议在NNW(通知人数)方面的效率示意图;其中,图11(a)代表所使用数据集为Gowalla,工人接受率为行程时间的线性递减函数,图11(b)代表所使用数据集为Gowalla,工人接受率服从Zipf分布,图11(c)代表所使用数据集为Yelp,工人接受率为行程时间的线性递减函数,图11(d)代表所使用数据集为Yelp,工人接受率服从Zipf分布。Figure 11 is a schematic diagram showing the efficiency of the protocol of the present invention in terms of NNW (notification of number of people) by changing ε; wherein, Figure 11(a) represents a linear decreasing function of the travel time for the data set used by Gowalla, Figure 11 (a), Figure 11 (b) represents the data set used for Gowalla, the worker acceptance rate obeys the Zipf distribution, Figure 11(c) represents the data set used for Yelp, the worker acceptance rate is a linear decreasing function of travel time, and Figure 11(d) represents the used The data set is Yelp and the worker acceptance rate is subject to the Zipf distribution.
具体实施方式Detailed ways
现在结合附图对本发明作进一步详细的说明。这些附图均为简化的示意图,仅以示意方式说明本发明的基本结构,因此其仅显示与本发明有关的构成。The invention will now be described in further detail with reference to the drawings. These drawings are simplified schematic diagrams, and only the basic structure of the present invention is illustrated in a schematic manner, and thus only the configurations related to the present invention are shown.
一、系统模型和问题定义First, the system model and problem definition
图1描述了空间众包的系统模型。对于非私人空间众包(见图1(a))有三个组成部分,即SC服务器(SC-server),持有移动设备的工人(workers)和空间任务请求者(task requester)。SC服务器负责将适当的工作人员分配给任务请求者创建的空间任务。工人需要通过他们的移动设备向SC服务器报告他们的私人信息(如位置location和速度velocity)。基于该框架,我们给出以下定义。Figure 1 depicts the system model for space crowdsourcing. For non-private space crowdsourcing (see Figure 1(a)), there are three components, the SC server (SC-server), the workers holding the mobile device and the task requester. The SC server is responsible for assigning the appropriate staff to the space tasks created by the task requester. Workers need to report their private information (such as location location and speed velocity) to the SC server through their mobile device. Based on this framework, we give the following definitions.
定义1(空间任务)空间任务s是要在位置ls执行并与截止日期es相关联的任务。Definition 1 (space task) The space task s is the task to be executed at position l s and associated with the expiration date e s .
定义2(工人)工人w是愿意执行空间任务的人。每个工人与由SC服务器指定的ID idw,速度vw和其当前所处的位置lw相关联。Definition 2 (worker) worker w is the person who is willing to perform a space mission. Each worker is associated with an ID id w specified by the SC server, a speed v w and its current location l w .
利用空间众包,任务请求者创建空间任务s并且指定其位置ls和截止日期es。要执行该任务,工人必须在截止日期es之前到达位置ls。在接收到空间任务时,SC服务器基于某些预定义的策略将其分配给适当的工作者。在本发明中,我们假设SC服务器优先选择可能最先到达ls的工作者。我们还假设每个工人以一定的概率接受被分配的任务,表示为接受率(AR)。假设每个工人的AR是100%,我们首先定义简单的任务分配问题如下:With space crowdsourcing, the task requester creates a spatial task s and specifies its location l s and expiration date e s . To perform this task, the worker must reach the position of the deadline l s e s. Upon receiving a spatial task, the SC server assigns it to the appropriate worker based on some predefined policy. In the present invention, we assume that the SC server preferentially selects workers who may arrive at the first s . We also assume that each worker accepts the assigned task with a certain probability, expressed as an acceptance rate (AR). Assuming each worker's AR is 100%, we first define a simple task assignment problem as follows:
定义3(任务分配问题)令W={w1,w2,…,wn}是n个工人的集合。给定空间任务s,任务分配问题PTA(W,s)是将任务s分配给工作者wi*,使得:Definition 3 (task assignment problem) Let W = {w 1 , w 2 , ..., w n } be a collection of n workers. Given a space task s, the task assignment problem P TA (W, s) assigns the task s to the worker w i* such that:
1,wi*可以在截止日期es之前到达ls1, w i * l s can be reached before the deadline e s;
2,没有其他工人可以在wi*之前到达ls2. No other worker can reach l s before w i* .
在定义3中,第一个要求意味着tc+d(li*,ls)/vi*≤es,其中tc是当前时间,li*是wi*的当前位置,vi*是wi*的速度,d(li*,ls)是位置li*和ls之间的欧几里得距离。第二个要求意味着不存在wj使得d(lj*,ls)/vj<d(li*,ls)/vi*。为了便于以后的讨论,我们称这个问题的胜者为wi*,并将i*作为其ID。注意,当所有的工人在截止日期之前都不能到达ls时,这样的获胜者便不存在。在这种情况下,SC服务器会通知任务请求者没有胜任者。In definition 3, the first requirement means t c +d(l i* , l s )/v i* ≤ e s , where t c is the current time, l i* is the current position of w i* , v i* is the speed of w i* , and d(l i* , l s ) is the Euclidean distance between the positions l i* and l s . The second requirement means that there is no w j such that d(l j* , l s )/v j <d(l i* , l s )/v i* . For the sake of future discussion, we call the winner of this problem w i* and i* as its ID. Note that such a winner does not exist when all workers cannot reach l s before the deadline. In this case, the SC server notifies the task requester that there is no competent person.
然而,在实践中,工人不一定会接受分配给他们的任务。为了保证任务被高概率的接受,可以要求多个工人执行任务。假设工人wi的AR是ai。用η(W,s)表示W中至少一个工人接受任务s的概率。显然,
Figure PCTCN2017113454-appb-000009
因此,我们定义下面的另一个任务分配的问题:
However, in practice, workers do not necessarily accept the tasks assigned to them. In order to ensure that the task is accepted with high probability, multiple workers can be required to perform tasks. Assume that the AR of the worker w i is a i . Use η(W,s) to indicate the probability that at least one worker in W accepts the task s. Obviously,
Figure PCTCN2017113454-appb-000009
Therefore, we define another problem assigned by the following task:
定义4(具有接受保证的任务分配问题)令W={w1,w2,…,wn}是n个工人的集合。给定空间任务s,具有接受保证的任务分配问题PTAG(W,s)是将任务s分配给一组工人W*(称为优胜者集合),使得:Definition 4 (with a task assignment problem with acceptance guarantee) Let W = {w 1 , w 2 , ..., w n } be a collection of n workers. Given a space task s, the task assignment problem with acceptance assurance P TAG (W, s) assigns the task s to a group of workers W * (called the winner set), such that:
1,每个工人wi*∈W*都可以在截止日期es之前到达位置ls1, each worker w i * ∈W * l s position can be reached before the deadline e s;
2,没有其他工人wj∈W\W*可以在任何工人wi*∈W*之前到达位置ls2, no other workers w j ∈W \ W * may be any worker l s i ∈W before reaching the position w * *;
3,η(W*,s)≥α,其中α是W*中至少一名工人接受任务s的预期概率。3, η(W * , s) ≥ α, where α is the expected probability that at least one worker in W * accepts the task s.
对手模型。图1(b)是隐私保护空间众包的系统模型。其引入了新的密码服务提供者(CSP,Crypto Service Provider),向SC服务器和工人密钥生成等密钥服务。对于对手模型,我们假设虽有各方都是半诚实的。也就是说,他们完全遵循一个规定的协议,但是可能根据他们所看到的尝试在协议执行时,尽可能多地从其他方的隐私输入学习。特别的,SC服务器会对每个工人的位置和速度以及每个获胜者的ID感兴趣。CSP也对此以及任务的位置感兴趣。而每个工人则愿意知道其他工作人员的位置和速度,每位获胜者的ID,以及任务的位置。作为一个特殊的工人,每个获胜者都有权知道其ID和任务的位置,但其也想知道其他工作人员的位置和速度,以及其他获胜者的ID。基于对手模型,我们有如下定义:Opponent model. Figure 1(b) is a system model of privacy protection space crowdsourcing. It introduces a new cryptographic service provider (CSP, Crypto Service Provider), and key services such as SC server and worker key generation. For the opponent model, we assume that all parties are semi-honest. That is to say, they fully follow a prescribed agreement, but may learn as much as possible from the privacy input of other parties when the agreement is executed according to the attempts they see. In particular, the SC server is interested in the location and speed of each worker and the ID of each winner. The CSP is also interested in this and the location of the task. And each worker is willing to know the location and speed of other staff, the ID of each winner, and the location of the mission. As a special worker, each winner has the right to know his ID and the location of the task, but he also wants to know the location and speed of other staff, as well as the IDs of other winners. Based on the opponent model, we have the following definitions:
定义5(隐私保护任务分配问题)令W={w1,w2,…,wn}是n个工人的集合。给定空间任务s,隐私保护任务分配问题PPTA(W,s)是以如下方式找到PTA(W,s)的获胜者wi*Definition 5 (Privacy Protection Task Assignment Question) Let W = {w 1 , w 2 , ..., w n } be a collection of n workers. Given a spatial task s, the privacy protection task assignment problem P PTA (W, s) is to find the winner w i* of P TA (W, s) as follows:
1,对于每个工人wi∈W,其位置li和和速度vi信息不能被SC服务器,CSP和其他任何工作者wj∈W,wj<>wj获得;1, for each worker w i ∈ W, its position l i and speed v i information can not be obtained by the SC server, CSP and any other workers w j ∈ W, w j <> w j ;
2,任务位置信息ls不能被CSP和除了wi*之外的所有工人获得;2. The task location information l s cannot be obtained by the CSP and all workers except w i* ;
3,除了wi*之外,SC服务器,CSP和所有其他工人都无法获得wi*的ID信息。3. Except for w i* , SC server, CSP and all other workers cannot obtain the ID information of w i* .
虽然它的非隐私版本(即PTA)很简单,但PPTA在尝试同时保护工人隐私和任务隐私方面非常具有挑战性。特别是获胜者不仅由工人的位置决定,而且还由其速度决定,两者都应该在计算过程中保密。乍一看,这个要求意味着我们需要对密文进行划分。然而,有效的同态分裂现在仍然是一个悬而未决的问题。此外,任务位置ls需要对除了获胜者之外的所有工作人员保密,这使得d(li,ls)的计算比通过明文更难。注意,获胜者必须知道任务位置ls,因为其需要达到该位置以执行任务,所以者不被视为隐私泄露。PPTA的最后一个要求表明,SC服务器不被允许知道获胜者的身份。如果SC服务器知道谁是获胜者,则可能会根据某些背景知识(例如任务位置和截止日期)来推断获胜者的大概位置。显然,SC服务器来决定PTA的获胜者。然而,在PPTA中,SC服务器不被允许知道谁是获胜者。这个矛盾是PPTA的另一个难题。Although its non-private version (ie P TA) is very simple, but very challenging P PTA at the same time trying to protect the privacy of workers and tasks privacy. In particular, the winner is determined not only by the position of the worker, but also by its speed, both of which should be kept secret during the calculation process. At first glance, this requirement means that we need to divide the ciphertext. However, effective homomorphic splitting is still an open question. In addition, the task location l s needs to be kept secret for all workers except the winner, which makes the calculation of d(l i , l s ) more difficult than through plaintext. Note that the winner must know the task location l s because it needs to reach that location to perform the task, so the person is not considered a privacy leak. The last requirement of P PTA indicates that the SC server is not allowed to know the identity of the winner. If the SC server knows who the winner is, it may be based on some background knowledge (such as task location and due date) to infer the approximate location of the winner. Obviously, SC P TA server to determine the winner. However, in P PTA , the SC server is not allowed to know who is the winner. This contradiction is another problem with P PTA .
同样,我们对具有接受保证的隐私保护任务分配问题的定义如下:Similarly, we define the issue of privacy-protected task assignments with acceptance guarantees as follows:
定义6(具有接受保证的隐私保护任务分配问题)令W={w1,w2,…,wn}是n个工人的集合。给定空间任务s,具有接受保证的隐私保护任务分配问题PPTAG(W,s)是以如下方式找到PTAG(W,s)的获胜者集W*Definition 6 (with privacy protection task assignment problem with acceptance guarantee) Let W = {w 1 , w 2 , ..., w n } be a collection of n workers. Given a space task s, with a guaranteed privacy protection task assignment problem P PTAG (W, s) is to find the winner set W * of P TAG (W, s) as follows:
1,对于每个工人wi∈W,其位置li和和速度vi信息不能被SC服务器,CSP和其他任何工作者wj∈W,wj<>wj获得;1, for each worker w i ∈ W, its position l i and speed v i information can not be obtained by the SC server, CSP and any other workers w j ∈ W, w j <> w j ;
2,任务位置信息ls不能被CSP和除了W*之中的获胜者之外的所有工人获得;2. The task location information l s cannot be obtained by all workers except the CSP and the winner other than W * ;
3,除了wi*之外,SC服务器,CSP和所有其他工人都无法获得wi*的ID信息。3. Except for w i* , SC server, CSP and all other workers cannot obtain the ID information of w i* .
如图2所示,本发明一种隐私保护空间众包的任务分配系统模型,包括空间众包服务器(SC服务器)、加密服务提供单元(CSP)、空间任务请求单元和工人移动端;As shown in FIG. 2, a privacy distribution space crowdsourcing task distribution system model includes a space crowdsourcing server (SC server), a cryptographic service providing unit (CSP), a space task requesting unit, and a worker mobile terminal;
所述空间任务请求单元用于创建空间任务,将任务信息传送给所述空间众包服务器;The spatial task requesting unit is configured to create a spatial task, and transmit task information to the spatial crowdsourcing server;
所述空间众包服务器将任务分配给所述工人移动端;The space crowdsourcing server assigns a task to the worker mobile terminal;
所述加密服务提供单元对所述空间任务请求单元、所述空间众包服务器和所述工人移动端提供隐私保护任务分配管理。 The encryption service providing unit provides privacy protection task assignment management to the spatial task request unit, the space crowdsourcing server, and the worker mobile terminal.
如图2所示,本发明隐私保护空间众包的任务分配系统模型的实现方法,包括如下步骤:As shown in FIG. 2, the method for implementing the task allocation system model of the privacy protection space crowdsourcing of the present invention comprises the following steps:
1)空间任务请求者创建并发布空间任务。空间任务s是指要在位置ls执行,并与截止日期es相关联的任务。1) The spatial task requester creates and publishes a spatial task. The space task s refers to the task to be executed at the position l s and associated with the expiration date e s .
2)空间任务发布至SC服务器。SC服务器根据工人集合W={w1,w2,…,wn}和任务s的位置ls和截止日期es,通过任务分配算法(该任务分配算法即下面“四、隐私保护任务分配协议的算法1”),将任务分配给工作者wi*。工作者wi*需满足两个条件:第一,wi*可以在截止日期es之前到达ls;第二,没有其他工人可以在wi*之前到达ls2) The space task is released to the SC server. The SC server passes the task assignment algorithm according to the worker set W={w 1 , w 2 , . . . , w n } and the position l s of the task s and the expiration date e s (the task assignment algorithm is as follows) 4. The privacy protection task assignment The algorithm of the protocol 1") assigns the task to the worker w i* . W i * worker must satisfy two conditions: first, w i * l s can be reached before the deadline e s; second, no other workers l s can be reached before w i *.
3)加密服务提供者(CSP)提供隐私保护功能,其向SC服务器和工人提供密钥服务。隐私保护功能通过对传输数据的加密,并且使SC服务器可以对加密数据进行加法、乘法等计算,保证在通信过程中除了被选中的工作者wi*外,SC服务器,CSP和所有其他工人都无法获得wi*的ID信息。3) The Cryptographic Service Provider (CSP) provides privacy protection functions that provide key services to SC servers and workers. The privacy protection function encrypts the transmitted data and allows the SC server to perform addition, multiplication, and the like on the encrypted data to ensure that the SC server, the CSP, and all other workers are in addition to the selected worker w i* in the communication process. Unable to get the ID information of w i* .
二、隐私标准定义Second, the definition of privacy standards
本发明使用理想的范例来定义协议的安全性。直观的说,在协议执行的过程中,如果所涉及的每一方获取的信息都不会比其有权获取的信息更多,那么协议就是安全的或者说是隐私保护的。这可以通过理想范式定义如下:对于所有对手,存在一个基于概率的多项式时间模拟器,使得现实世界中对手的观点和理想世界中模拟器的观点在计算上无法区分。The present invention uses the ideal paradigm to define the security of the protocol. Intuitively, in the process of protocol implementation, if each party involved does not receive more information than it has access to, the agreement is secure or privacy-protected. This can be defined by the ideal paradigm as follows: For all opponents, there is a probability-based polynomial time simulator that makes the viewpoints of the opponents in the real world and the viewpoints of the simulators in the ideal world computationally indistinguishable.
令P-1为CSP,P0为SC服务器,P1,…,Pn为n个工人。令viewi,xi和Ki(-1≤i≤n)分别为Pi的观点,其隐私输入以及在协议P执行期间可以获得的额外信息。协议P的隐私要求的标准定义如下:Let P -1 be CSP, P 0 be SC server, P 1 ,..., P n be n workers. Let view i , x i and K i (-1 ≤ i ≤ n) be the views of P i , their privacy input and additional information that can be obtained during the execution of protocol P. The standard definition of the privacy requirements of Protocol P is as follows:
定义7如果存在一个基于概率的多项式时间模拟器Si,使得:Definition 7 If there is a probability-based polynomial time simulator S i , such that:
Figure PCTCN2017113454-appb-000010
Figure PCTCN2017113454-appb-000010
因为协议P不泄漏比Pi的最终输出更多的信息,我们认为协议P对Pi是完全隐私保护的。其中对于所有可能输入(x-1,x0,…,xn),
Figure PCTCN2017113454-appb-000011
≡表示在计算上无法区分。如果
Figure PCTCN2017113454-appb-000012
则认为协议P对Pi的隐私保护有Ki泄漏,因为它不会泄漏最终输出和比Ki更多的信息给Pi
Since protocol P does not leak more information than the final output of P i , we believe that protocol P is completely privately protected against P i . Where for all possible inputs (x -1 , x 0 ,...,x n ),
Figure PCTCN2017113454-appb-000011
≡ indicates that it is not possible to distinguish between calculations. in case
Figure PCTCN2017113454-appb-000012
P believes that there is agreement on privacy leak K i P i, because it does not leak and the final output more information than the K i for P i.
很明显,完全的隐私保护是一个非常强的隐私保证。然而,如此强的保证有时难以通过有效的协议实现。实际上,只要不破坏隐私,在协议P的执行过程中可以允许额外知识Ki的公开。也就是说,即使基于知识Ki,对手可以获得任何一方的隐私输入的概率也是可以忽略不计的。Obviously, full privacy protection is a very strong privacy guarantee. However, such a strong guarantee is sometimes difficult to achieve through an effective protocol. In fact, as long as the privacy is not broken, the disclosure of the additional knowledge K i can be allowed during the execution of the protocol P. That is to say, even based on the knowledge K i , the probability that an opponent can obtain privacy input from either party is negligible.
三、密码构建块Third, the password building block
为解决以上定义的PPTA和PPTAG问题,本发明采用了几种加密工具:伪随机函数,Paillier密码系统和ElGamal密码系统,简要介绍如下。To solve the P PTA and P PTAG problems defined above, the present invention employs several encryption tools: a pseudo-random function, a Paillier cryptosystem and an ElGamal cryptosystem, which are briefly described below.
伪随机函数(PRF)通过黑盒方式观察结果,且随机特性不能与真实随机函数区分。通常,PRF由fk表示,其属于PRF函数族Fλ={fk:{0,1}λ→{0,1}λ}k∈{0,1}λ,以k为索引。我们的工作假设键控单向散列函数(如HMAC)可以被建模为伪随机函数。因此,fk函数可以通过使用k键入散列函数并将其应用于x来实现。The pseudo-random function (PRF) observes the result in a black box manner, and the random characteristics cannot be distinguished from the real random function. In general, the PRF is represented by f k , which belongs to the PRF function family F λ ={f k :{0,1} λ →{0,1} λ }k∈{0,1} λ , indexed by k. Our work assumes that a keyed one-way hash function (such as HMAC) can be modeled as a pseudo-random function. Therefore, the f k function can be implemented by typing a hash function with k and applying it to x.
Paillier是一个公钥密码系统,其安全性基于与分解硬度有关(是否等同还未可知)的假设。它由以下三种算法组成:Paillier is a public key cryptosystem whose security is based on the assumption that it is related to the decomposition hardness (whether it is equivalent or not). It consists of the following three algorithms:
–密钥生成:选择两个不同的随机大质数p和q,计算N=pq。选择元素g∈Z* N 2。公钥pk为(N,g),而私钥sk为(p,q)。– Key generation: Select two different random large prime numbers p and q and calculate N=pq. Select the element g∈Z * N 2 . The public key pk is (N, g), and the private key sk is (p, q).
–加密E:令m为ZN中的一条消息。其通过选择Z* N中的一个随机数来加密,并计算– Encrypt E: Let m be a message in Z N . It is encrypted by selecting a random number in Z * N and is calculated
c=E(m)=gmrN mod N,        (1)c=E(m)=g m r N mod N, (1)
其中N和g从公钥pk中获得,c为m的密文。 Where N and g are obtained from the public key pk, and c is the ciphertext of m.
–解密D:密文c通过如下计算进行解密:– Decrypt D: The ciphertext c is decrypted by the following calculation:
Figure PCTCN2017113454-appb-000013
Figure PCTCN2017113454-appb-000013
其中λ=lcm(p-1,q-1)可以通过私钥sk进行计算。Where λ=lcm(p-1, q-1) can be calculated by the private key sk.
Paillier密码系统最重要的特性之一是同态加法。具体地说,将m1的密文和m2的密文相乘,则得到m1+m2的密文;m的密文的k次方,即为km的密文。即:One of the most important features of the Paillier cryptosystem is the homomorphic addition. Specifically, multiplying the ciphertext of m 1 and the ciphertext of m 2 yields a ciphertext of m 1 + m 2 ; the k-th power of the ciphertext of m, that is, the ciphertext of km. which is:
E(m1)E(m2)=E(m1+m2),         (3)E(m 1 )E(m 2 )=E(m 1 +m 2 ), (3)
E(m)k=E(km).         (4)E(m) k =E(km). (4)
此外,Paillier是语义安全的,也就是说,攻击者不能从密文中获得任何关于明文部分的信息。同时,它也是一种概率加密方案,这意味着在多次加密相同的消息时,会产生不同的密文。从等式(1)可以清晰的看到,随机数r参与了加密过程。In addition, Paillier is semantically secure, meaning that an attacker cannot obtain any information about the plaintext from the ciphertext. At the same time, it is also a probabilistic encryption scheme, which means that different ciphertexts are generated when the same message is encrypted multiple times. It can be clearly seen from equation (1) that the random number r participates in the encryption process.
ElGamal是一个公钥密码系统,其安全性基于离散对数问题的难解性。它由一些可以由多个用户共享的公共域参数和三种算法组成:ElGamal is a public key cryptosystem whose security is based on the intractability of the discrete logarithm problem. It consists of several public domain parameters and three algorithms that can be shared by multiple users:
–域参数。令p为大素数,q为中等素数,使得q|p–1。令g=r(p–1/q)mod p<>1,其中r∈Fp *。这些公共参数使用用生成参数g创建质数阶q的公共有限阿贝尔组G。– domain parameters. Let p be a large prime number and q be a medium prime number such that q|p–1. Let g=r (p–1/q) mod p<>1, where r∈F p * . These public parameters use the public finite Abelian group G that creates the prime order q with the generation parameter g.
–密钥生成。选择一个整数x,使得0≤x≤q–1并计算h=gx mod p。公钥pk为h,密钥sk为x。– Key generation. Select an integer x such that 0 ≤ x ≤ q - 1 and calculate h = g x mod p. The public key pk is h and the key sk is x.
–加密E’。令m为G中的消息。通过选择随机数r来加密,其中0≤r≤q–1,并计算:– Encrypt E’. Let m be the message in G. Encrypt by selecting the random number r, where 0 ≤ r ≤ q – 1, and calculate:
c1=gr,c2=mhr.          (5)c 1 =g r ,c 2 =mh r . (5)
m的密文c为E’(m)=(c1,c2)。The ciphertext c of m is E'(m)=(c 1 , c 2 ).
–解密D’。密文c通过如下计算进行解密:– Decrypt D’. The ciphertext c is decrypted by the following calculation:
m=D’(c)=c2(c1 x)-1          (6)m=D'(c)=c 2 (c 1 x ) -1 (6)
ElGamal也是一种概率加密方案,因为每个消息都由不同的随机数r加密,如等式(5)所示。ElGamal密码系统有一个有趣的属性是同态乘法。具体而言,将m1的密文和m2的密文相乘,则得到m1m2的密文,即:ElGamal is also a probabilistic encryption scheme because each message is encrypted by a different random number r, as shown in equation (5). An interesting property of the ElGamal cryptosystem is homomorphic multiplication. Specifically, multiplying the ciphertext of m 1 and the ciphertext of m 2 to obtain a ciphertext of m 1 m 2 , namely:
E’(m1)E’(m2)=E’(m1m2),       (7)E'(m 1 )E'(m 2 )=E'(m 1 m 2 ), (7)
交换式加密满足两个加密顺序无关的属性。ElGamal可以被扩展为支持交换式加密。特别的,两种新算法定义如下:Switched encryption satisfies two encryption-independent attributes. ElGamal can be extended to support switched encryption. In particular, the two new algorithms are defined as follows:
–二次加密
Figure PCTCN2017113454-appb-000014
给定用公钥ha加密的密文E’ha(m)=(gra,mha ra),其可以通过选择随机数rb,其中0≤rb≤q–1,并计算c1=gra,c2=grb和c3=mha rahb rb,其中hb为公钥,来进行二次加密。E’ha(m)的密文为
Figure PCTCN2017113454-appb-000015
– secondary encryption
Figure PCTCN2017113454-appb-000014
With the public key h a given ciphertext encrypted E 'ha (m) = ( g ra, mh a ra), which can be selected by the random number r b, where 0≤r b ≤q-1, and c 1 is calculated =g ra , c 2 =g rb and c 3 =mh a ra h b rb , where h b is the public key for secondary encryption. The ciphertext of E' ha (m) is
Figure PCTCN2017113454-appb-000015
–二次解密
Figure PCTCN2017113454-appb-000016
密文(c1,c2,c3)可以通过以不同的顺序使用私钥xa和xb进行解密,其解密结果是相同的。如果首先使用私钥xa,我们有
Figure PCTCN2017113454-appb-000017
Figure PCTCN2017113454-appb-000018
可以被xb再次解密以获得m。很容易验证,如果首先使用xb然后使用xa,解密结果也是相同的。
– secondary decryption
Figure PCTCN2017113454-appb-000016
The ciphertext (c1, c2, c3) can be decrypted by using the private keys x a and x b in a different order, and the decryption result is the same. If we use the private key x a first, we have
Figure PCTCN2017113454-appb-000017
Figure PCTCN2017113454-appb-000018
It can be decrypted again by x b to obtain m. It's easy to verify that if x b is used first and then x a is used , the decryption result is the same.
四、隐私保护任务分配协议Fourth, privacy protection task assignment agreement
根据定义5,我们的目标是在不泄露工人位置信息的前提下找到PTA的获胜者。虽然可以采用一些现有的隐私保护工具,如k匿名和差异隐私来保护个人隐私,但它们通常假设存 在可信的第三方可以访问整个原始数据(比如所有工人的位置信息),这在实践中很难实现。此外,它们以降低数据的利用率为代价来保护个人隐私,这意味着基于它们的方法可能无法准确找到PTA的获胜者。因此,我们决定利用加密工具准确地解决PPTA问题。为了防止隐私泄露,每个工人的死人数据在发送到SC服务器之前都已被加密。从定义3可知,PPTA问题的关键在于确定哪个工作人员最先到达位置ls。为了解决这个问题,我们需要比较两个工人wi和wj的行程时间,即计算以下不等式:According to Definition 5, our goal is to find the winner of the PTA without revealing the location information of the worker. While some existing privacy protection tools, such as k-anonymity and differential privacy, can be used to protect personal privacy, they usually assume that trusted third parties have access to the entire raw data (such as the location information of all workers), which is in practice difficult to realize. In addition, they are lower utilization data at the expense of the protection of personal privacy, which means that P TA may not find the winner based on their accurate. Therefore, we decided to use the encryption tool to accurately solve the P PTA problem. To prevent privacy breaches, each worker's dead data is encrypted before being sent to the SC server. From definition 3, the key to the P PTA problem is to determine which worker first arrives at position l s . In order to solve this problem, we need to compare the travel time of two workers w i and w j , that is, calculate the following inequality:
Figure PCTCN2017113454-appb-000019
Figure PCTCN2017113454-appb-000019
显然,计算包括几个基本操作:加法和乘法(用于距离计算),除法以及比较。需要注意的是,这些操作应该通过密文执行,因为,比如说,为进行隐私保护,li和vi此时已经被加密了。理论上讲,我们可以设计一种基于完全同态加密(FHE)的方案来实现上述计算,但这将导致高昂的计算成本,使得该方法具有有限的实际意义。因此,我们考虑使用部分同态加密方案。虽然它们比FHE效率更高,但它们都不能支持计算不等式(8)所需的所有操作。我们将在下一小节中展示如何解决这个难题。Obviously, the calculation involves several basic operations: addition and multiplication (for distance calculation), division and comparison. It should be noted that these operations should be performed in ciphertext because, for example, for privacy protection, l i and v i are now encrypted. In theory, we can design a scheme based on Complete Homomorphic Encryption (FHE) to achieve the above calculations, but this will result in high computational cost, making the method have limited practical significance. Therefore, we consider using a partially homomorphic encryption scheme. Although they are more efficient than FHE, they do not support all the operations required to calculate inequality (8). We will show how to solve this problem in the next section.
4.1协议概述4.1 Protocol Overview
算法1隐私保护任务分配协议 Algorithm 1 Privacy Protection Task Assignment Protocol
输入:n个工人的集合,每个工人wi的ID为i,位置信息为li,速度信息为vi;一个空间任务s(由任务请求者创建),任务位置为ls,截止日期为es;一个SC服务器和一个CSP。Input: a collection of n workers, each worker w i has an ID of i, the location information is l i , the speed information is v i ; a spatial task s (created by the task requester), the task position is l s , the due date For e s ; an SC server and a CSP.
输出:获胜者w*得到任务位置lsOutput: Winner w * gets the task position l s .
1:阶段0-密钥生成1: Phase 0 - Key Generation
2:CSP生成Paillier密钥对(pk,sk)和ElGamal密钥对(pk’,sk’)。SC服务器和所有工人得到公钥pk和pk’。私钥sk和sk’信息只由CSP掌握。2: The CSP generates a Paillier key pair (pk, sk) and an ElGamal key pair (pk', sk'). The SC server and all workers get the public keys pk and pk'. The private key sk and sk' information is only known by the CSP.
3:CSP生成另外一个ElGamal域参数集并公开。基于这些参数,CSP再次生成一个公钥pk’’但将其保密。每个工人wi也生成一个密钥对(pki”,ski”)并保密。3: The CSP generates another set of ElGamal domain parameters and exposes them. Based on these parameters, the CSP generates a public key pk'' again but keeps it secret. Each worker w i also generates a key pair (pki", ski") and keeps it secret.
4:阶段1-隐私保护距离计算4: Phase 1 - Privacy Protection Distance Calculation
5:SC服务器使用公钥pk加密
Figure PCTCN2017113454-appb-000020
xs和ys并将结果发送给所有工人。
5: SC server uses public key pk encryption
Figure PCTCN2017113454-appb-000020
x s and y s and send the results to all workers.
6:for每个工人wi(1≤i≤n)do6: for each worker w i (1 ≤ i ≤ n) do
7:wi使用pk加密
Figure PCTCN2017113454-appb-000021
以得到
Figure PCTCN2017113454-appb-000022
7:w i uses pk encryption
Figure PCTCN2017113454-appb-000021
To get
Figure PCTCN2017113454-appb-000022
8:wi计算
Figure PCTCN2017113454-appb-000023
8: w i calculation
Figure PCTCN2017113454-appb-000023
9:end for9:end for
10:阶段2-隐私保护行进时间计算10: Stage 2 - Privacy Protection Travel Time Calculation
11:for每个工人wi(1≤i≤n)do11: for each worker w i (1 ≤ i ≤ n) do
12:wi使用pk’加密vi并将E′(vi)发送至SC服务器。12: w i using pk 'and v i encrypted E' (v i) is sent to the SC server.
13:end for13:end for
14:SC服务器计算
Figure PCTCN2017113454-appb-000024
并发送至CSP。
14: SC server calculation
Figure PCTCN2017113454-appb-000024
And sent to the CSP.
15:CSP解密E′(V)并将其发送回SC服务器。 15: The CSP decrypts E'(V) and sends it back to the SC server.
16:SC服务器向所有工人广播V。16: The SC server broadcasts V to all workers.
17:for每个工人wi(1≤i≤n)do17: for each worker w i (1 ≤ i ≤ n) do
18:wi计算
Figure PCTCN2017113454-appb-000025
并将E(t′i 2)发送至SC服务器。
18: w i calculation
Figure PCTCN2017113454-appb-000025
And send E(t' i 2 ) to the SC server.
19:end for19:end for
20:阶段3-隐私保护获胜者计算20: Stage 3 - Privacy Protection Winner Calculation
21:SC服务器将fk(i)发送至工人wi,其中fk是一个PRF。21: The SC server sends f k (i) to worker w i , where f k is a PRF.
22:SC服务器将
Figure PCTCN2017113454-appb-000026
,其中1≤i≤n。
22: SC server will
Figure PCTCN2017113454-appb-000026
Where 1 ≤ i ≤ n.
23:CSP解密
Figure PCTCN2017113454-appb-000027
,并计算
Figure PCTCN2017113454-appb-000028
其中1≤i≤n。
23: CSP decryption
Figure PCTCN2017113454-appb-000027
And calculate
Figure PCTCN2017113454-appb-000028
Where 1 ≤ i ≤ n.
24:CSP计算得到行进时间最小的获胜者
Figure PCTCN2017113454-appb-000029
,其行进时间为
Figure PCTCN2017113454-appb-000030
24: CSP calculates the winner with the least travel time
Figure PCTCN2017113454-appb-000029
, its travel time is
Figure PCTCN2017113454-appb-000030
25:CSP使用k’加密fk(i*),并将E′C(fk(i*))发送至SC服务器。25: The CSP encrypts f k (i * ) using k' and sends E' C (f k (i * )) to the SC server.
26:阶段4-隐私保护获胜者声明26: Stage 4 - Privacy Protection Winner Statement
27:通过计算
Figure PCTCN2017113454-appb-000031
,SC服务器将ls加密并将
Figure PCTCN2017113454-appb-000032
广播至所有工人。其中h为长度匹配哈希函数
27: by calculation
Figure PCTCN2017113454-appb-000031
, the SC server will encrypt l s and
Figure PCTCN2017113454-appb-000032
Broadcast to all workers. Where h is the length matching hash function
28:for每个工人wi(1≤i≤n)do28: for each worker w i (1 ≤ i ≤ n) do
29:wi使用pk″i加密fk(i)并将
Figure PCTCN2017113454-appb-000033
发送至CSP。
29:w i encrypts f k (i) with pk′′ i and
Figure PCTCN2017113454-appb-000033
Send to CSP.
30:CSP使用pk″i
Figure PCTCN2017113454-appb-000034
加密,并发送
Figure PCTCN2017113454-appb-000035
至wi
30: CSP uses pk′′ i will
Figure PCTCN2017113454-appb-000034
Encrypt and send
Figure PCTCN2017113454-appb-000035
To w i .
31:wi使用私钥sk″i解密
Figure PCTCN2017113454-appb-000036
以得到E′C(fk(i))。
31: w i using the private key sk "i decrypting
Figure PCTCN2017113454-appb-000036
To get E' C (f k (i)).
32:wi尝试通过计算
Figure PCTCN2017113454-appb-000037
解密
Figure PCTCN2017113454-appb-000038
32:w i try to calculate
Figure PCTCN2017113454-appb-000037
Decrypt
Figure PCTCN2017113454-appb-000038
33:end for33:end for
图3给出了隐私保护任务分配协议的概览图。基于上述讨论,我们采用两个部分同态加密方案Paillier和ElGamal来构建我们的解决方案,它由图3中描绘的五个阶段组成。在第0阶段,根据安全要求,CSP生成ElGamal的域参数和Paillier和ElGamal的密钥对。其对私钥进行保密,并向SC服务器和所有工人发送公钥。任务请求者创建空间任务触发阶 段1的开始,在该阶段期间,SC服务器和所有工人基于加密的位置信息运行隐私保护距离计算协议,并输出加密后的距离信息。在第2阶段,每个工人的速度被加密并发送到与CSP协作的SC服务器,以计算每个工作人员的行程时间。基于第2阶段获得的加密行程时间,SC服务器在第3阶段借助CSP计算获胜者,但结果仍然是加密形式。在第4阶段,将加密任务的位置信息广播给所有的工人,但只有获胜者能够检索任务的位置。之后,获胜者到达指定位置执行相应的任务。Figure 3 shows an overview of the privacy protection task assignment protocol. Based on the above discussion, we use two partial homomorphic encryption schemes, Paillier and ElGamal, to construct our solution, which consists of the five phases depicted in Figure 3. In phase 0, according to security requirements, the CSP generates the domain parameters of ElGamal and the key pairs of Paillier and ElGamal. It keeps the private key secret and sends the public key to the SC server and all workers. Task requester creates space task trigger stage At the beginning of segment 1, during this phase, the SC server and all workers run the privacy protection distance calculation protocol based on the encrypted location information and output the encrypted distance information. In the second phase, each worker's speed is encrypted and sent to the SC server in collaboration with the CSP to calculate the travel time of each worker. Based on the encrypted travel time obtained in the second stage, the SC server calculates the winner by means of CSP in the third stage, but the result is still in encrypted form. In phase 4, the location information of the encrypted task is broadcast to all workers, but only the winner can retrieve the location of the task. After that, the winner arrives at the designated location to perform the corresponding task.
4.2详细构建4.2 Detailed construction
算法1为隐私保护任务分配协议的具体实现。我们详细解释如下。 Algorithm 1 is a concrete implementation of a privacy protection task assignment protocol. We explain in detail as follows.
第1阶段。因为“三、密码构建块”中已经介绍了第0阶段所需的Paillier和ElGamal密码系统的关键代码,我们从第1阶段开始介绍协议的详细构建。SC服务器用Paillier公钥加密任务位置ls=(xs,ys)后,向所有工人发送三份密文:E(xs 2+ys 2),E(xs)和E(ys)。从SC服务器接收到该加密信息后,每个工人wi计算ls和其当前位置li的距离的平方,并进行加密,即:Phase 1. Since the key code of the Paillier and ElGamal cryptosystems required for phase 0 has been introduced in "Three, Password Building Blocks", we will introduce the detailed construction of the protocol from the first stage. After the SC server encrypts the task location ls=(x s , y s ) with the Paillier public key, it sends three ciphertexts to all workers: E(x s 2 +y s 2 ), E(x s ) and E(y s ). After receiving the encrypted information from the SC server, each worker w i calculates the square of the distance between l s and its current location l i and encrypts it, namely:
Figure PCTCN2017113454-appb-000039
Figure PCTCN2017113454-appb-000039
其正确性很容易根据等式(3)和(4)进行验证。注意,我们还可以要求所有工作人员向SC服务器发送加密位置(以E(xi 2+yi 2),E(xi)和E(yi)的形式),并要求SC服务器计算E(d2(li,ls))。虽然这个过程与我们在非隐私案例中的做法类似,但它会为SC服务器带来更多的计算成本。换句话说,我们目前的设计具有为所有工人分摊计算成本的优点。Its correctness is easily verified according to equations (3) and (4). Note that we can also ask all staff to send encrypted locations (in the form of E(x i 2 +y i 2 ), E(x i ) and E(y i )) to the SC server and ask the SC server to calculate E ( d 2 (l i , l s )). Although this process is similar to what we did in the non-privacy case, it will bring more computing costs to the SC server. In other words, our current design has the advantage of sharing the cost of calculation for all workers.
第2阶段。如前所述,隐私保护行程时间计算需要对密文进行除法运算。然而,同态分裂的高效实现仍然是一个悬而未决的问题。因此,我们的目标不是设计一个有效的同态分裂方案,而是在计算行程时间的过程中,从技术上排除除法运算。为此,我们使用一个有趣的属性来比较行程时间,也就是说,确切的行程时间的计算是不必要的。此属性由以下引理保证: Phase 2. As mentioned earlier, the privacy protection travel time calculation requires division of the ciphertext. However, the efficient implementation of homomorphic splitting remains an open question. Therefore, our goal is not to design an effective homomorphic splitting scheme, but to technically exclude division operations in the calculation of travel time. To do this, we use an interesting attribute to compare the travel time, which means that the exact travel time calculation is unnecessary. This property is guaranteed by the following lemma:
引理1令W={w1,w2,…,wn}是n个工人的集合,V是所有工人速度的乘积,即
Figure PCTCN2017113454-appb-000040
Figure PCTCN2017113454-appb-000041
且vk‘=V/vk,其中1≤k≤n。对于任意两个工人wi,wj∈W,当且仅当d(li,ls)vi‘<d(lj,ls)vj‘时有d(li,ls)/vi<d(lj,ls)/vj
Lemma 1 makes W = {w 1 , w 2 , ..., w n } is a collection of n workers, and V is the product of the speed of all workers, ie
Figure PCTCN2017113454-appb-000040
Figure PCTCN2017113454-appb-000041
And v k '=V/v k , where 1≤k≤n. For any two workers w i , w j ∈W, if and only if d(l i ,l s )v i '<d(l j ,l s )v j ', there is d(l i ,l s ) /v i <d(l j ,l s )/v j .
基于该引理,我们为每个工人计算虚拟行程时间ti’=d(li,ls)vi’,其等同于确切Based on this lemma, we calculate the virtual travel time t i '=d(l i ,l s )v i ' for each worker, which is equivalent to the exact
Figure PCTCN2017113454-appb-000042
的行程时间ti=d(li,ls)/vi,即具有最短虚拟行程时间的工人必定具有最短的确切行程时间。具体来说,每个工人通过ElGamal密码系统对其速度进行加密,并将E‘(vi)发送给SC服务器。SC服务器可以通过将所有加密的速度相乘获得E’(V)。然后,SC服务器要求CSP解密E’(V),并给所有工人发送V。通过用其速度vi除V,每个工人wi可以得到vi’的值并计算E(d2(li,ls))vi’2=E(d2(li,ls)vi2)=E(ti2)。加密的虚拟行程时间被发送到SC服务器进行进一步处理。请注意,上述过程中CSP和所有工作人员都知道V的确切值。但是,这并不违反任何工人的个人隐私,这将在下一小节中得到证明。
Figure PCTCN2017113454-appb-000042
The travel time t i =d(l i ,l s )/v i , ie the worker with the shortest virtual travel time must have the shortest exact travel time. Specifically, each worker encrypts its speed through the ElGamal cryptosystem and sends E'(v i ) to the SC server. The SC server can obtain E'(V) by multiplying all the encrypted speeds. The SC server then asks the CSP to decrypt E'(V) and send V to all workers. By dividing V by its velocity v i , each worker w i can get the value of v i ' and calculate E(d 2 (l i , l s )) vi'2 =E(d 2 (l i ,l s ) v i ' 2 )=E(t i ' 2 ). The encrypted virtual travel time is sent to the SC server for further processing. Please note that the CSP and all staff in the above process know the exact value of V. However, this does not violate the personal privacy of any worker, as will be demonstrated in the next section.
第3阶段。现在,SC服务器具有2元组<i,E(ti2)>的列表,其中i是人wi的ID,1≤i≤n。为了保护工人,尤其是获胜者的身份,它通过一个PRF fk函数加密每个工人的ID,并向CSP发送<fk(i),E(tfk(i)2)>,以找到哪个工人的行程时间最短,以及其是否可以在截 止日期es之前到达任务位置。由于CSP具有Paillier的私钥,因此可以通过解密E(ti2)来获得ti2并计算实际的行程时间
Figure PCTCN2017113454-appb-000043
然后,CSP可以很容易的找到具有最短行程时间的工人,并判断其是否可以满足截止日期限制。如果不能,CSP则通知SC服务器没有获胜者。否则,它使用ElGamal加密获胜者的ID fk(i*),并将E’C(fk(i*))发送到SC服务器。这里的加密是必要的,因为SC服务器可以在得到fk(i*)后推断谁是获胜者。另一方面,由于PRF的伪随机性,获胜者的隐私仍然是受到保护的。
Phase 3. Now, the SC server has a list of 2-tuple <i, E(t i ' 2 )>, where i is the ID of the person w i , 1 ≤ i ≤ n. In order to protect the identity of the worker, especially the winner, it encrypts each worker's ID by a PRF f k function and sends <f k (i), E(t fk(i) ' 2 )> to the CSP to find Which worker has the shortest travel time and whether he can reach the mission location before the deadline e s . Since the CSP has Paillier's private key, it is possible to obtain t i ' 2 by decrypting E(t i ' 2 ) and calculate the actual travel time.
Figure PCTCN2017113454-appb-000043
Then, the CSP can easily find the worker with the shortest travel time and determine if it can meet the deadline limit. If not, the CSP notifies the SC server that there is no winner. Otherwise, it uses ElGamal to encrypt the winner's ID f k (i * ) and sends E' C (f k (i * )) to the SC server. Encryption here is necessary because the SC server can infer who is the winner after getting f k (i * ). On the other hand, due to the pseudo-randomness of the PRF, the winner's privacy is still protected.
第4阶段。一旦接收到E’C(fk(i*)),SC服务器便加密任务位置ls并向所有工人广播
Figure PCTCN2017113454-appb-000044
(ls)。具体地,以如下方式加密ls
Phase 4. Upon receiving E' C (f k (i * )), the SC server encrypts the task location l s and broadcasts to all workers
Figure PCTCN2017113454-appb-000044
(l s ). Specifically, ls is encrypted in the following manner:
Figure PCTCN2017113454-appb-000045
Figure PCTCN2017113454-appb-000045
其中h是长度匹配哈希函数,用于将较长的位串映射到较短的位串。一种被证明是语义安全的h的构建方法是,将一个较长的位串截断为多个固定长度的较短位串,并在这些较短位串上进行异或计算并输出。显然,只有获得E’C(fk(i*))信息的工人才可以通过计算
Figure PCTCN2017113454-appb-000046
Figure PCTCN2017113454-appb-000047
得到任务位置信息。以下流程确保只有获胜者可以获得E’C(fk(i*))信息。
Where h is a length matching hash function for mapping a longer bit string to a shorter bit string. A method of constructing semantically secure h is to truncate a longer bit string into a plurality of fixed-length shorter bit strings, and perform an exclusive-OR calculation on these shorter bit strings and output. Obviously, only workers who get E' C (f k (i * )) information can pass the calculation.
Figure PCTCN2017113454-appb-000046
Figure PCTCN2017113454-appb-000047
Get the task location information. The following process ensures that only the winner can get E' C (f k (i * )) information.
首先,每个工人wi从SC服务器获取加密的ID fk(i)),并使用自己的公钥通过ElGamal进行加密,然后将加密后的信息E’wi(fk(i))发送给CSP。CSP接收到该信息后,使用其公钥和用于加密E’C(fk(i*))的相同随机数r再次通过ElGamal进行加密。CSP随后将结果
Figure PCTCN2017113454-appb-000048
发送到每个可以通过其私钥来解密以获得E’C(fk(i))的工人。显然,只有获胜者wfk(i*)可以获得E’C(fk(i*))。需要注意的是,这里使用的公钥应该保密,以保护隐私。
First, each worker w i obtains the encrypted ID f k (i) from the SC server and encrypts it with ElGamal using its own public key, and then sends the encrypted information E' wi (f k (i)) to CSP. After receiving the information, the CSP encrypts it again via ElGamal using its public key and the same random number r used to encrypt E' C (f k (i * )). CSP will then result
Figure PCTCN2017113454-appb-000048
Sent to each worker who can be decrypted by his private key to obtain E' C (f k (i)). Obviously, only the winner w fk(i*) can get E' C (f k (i * )). It should be noted that the public key used here should be kept confidential to protect privacy.
备注。在计算E’(V)时,应设置适当的密钥长度,以避免所有工人的速度乘积溢出。例如,我们在实验中使用2048位的密钥来处理1000名工人。如果工人数量很大,可能的方法是使用最小公倍数(LCM)而不是乘法。然而,隐私保护的LCM计算(即计算多个加密数字的最小公倍数)是一个非常具有挑战性的问题,我们将其作为我们未来的研究方向之一。Remarks. When calculating E'(V), the appropriate key length should be set to avoid overflow of all workers' speed products. For example, we used a 2048-bit key to process 1,000 workers in the experiment. If the number of workers is large, the likely method is to use the least common multiple (LCM) instead of multiplication. However, privacy-protected LCM calculations (that is, calculating the least common multiple of multiple encrypted numbers) is a very challenging problem, and we use it as one of our future research directions.
4.3性能分析4.3 Performance Analysis
计算代价。表1总结了我们协议的计算代价。我们假设所有工人可以并行执行计算(如加密和解密),并且可以并行与SC服务器和CSP进行交互,因此我们只需要考虑一个用户的计算代价。此外,我们忽略代价小的操作,如大整数乘法和位串的异或操作。详细分析如下。在算法1中,SC服务器执行三次Paillier加密(第5行),工人wi执行一次Paillier加密和两次模幂运算(第7,8行),用于行程距离的隐私计算。在第2阶段,工人执行一次ElGamal加密保护其速度(第12行)。加密的速度的乘积由CSP(第15行)解密,以实现后续行程时间的计算。这需要工人wi进行一次模幂运算(第18行)。在第3阶段,SC服务器使用n个PRF函数来保护工人的ID(第21行),CSP执行n次ElGamal解密(第23行)和一次ElGamal加密(第25行)来寻找获胜者并保护其ID。在第4阶段,为了交换解密密钥,工人wi将执行一次ElGamal加密(第29行)和一次ElGamal二次解密(第31行),CSP则需执行n次ElGamal二次加密(第30行)。Calculate the cost. Table 1 summarizes the computational cost of our protocol. We assume that all workers can perform calculations (such as encryption and decryption) in parallel, and can interact with the SC server and CSP in parallel, so we only need to consider the computational cost of a user. In addition, we ignore low-cost operations such as large integer multiplication and bit-wise XOR operations. The detailed analysis is as follows. In Algorithm 1, the SC server performs three Paillier encryptions (line 5), and the worker w i performs a Paillier encryption and two modular exponentiation operations (lines 7, 8) for privacy calculation of the travel distance. In the second phase, the worker performs an ElGamal encryption to protect its speed (line 12). The product of the encrypted speed is decrypted by the CSP (line 15) to achieve the calculation of the subsequent travel time. This requires the worker w i to perform a modular exponentiation (line 18). In phase 3, the SC server uses n PRF functions to protect the worker's ID (line 21), the CSP performs n times of ElGamal decryption (line 23) and an ElGamal encryption (line 25) to find the winner and protect it. ID. In the fourth stage, in order to exchange the decryption key, the worker w i will perform one ElGamal encryption (line 29) and one ElGamal secondary decryption (line 31), and the CSP will perform n times of ElGamal secondary encryption (line 30). ).
表1所提出协议的计算代价。E,D,E′,D′,
Figure PCTCN2017113454-appb-000049
e,PRF分别表示Paillier加密,Paillier解密,ElGamal加密,ElGamal解密,ElGamal二次加密,ElGamal二次解密,模幂和伪随机函数。
The calculation cost of the protocol presented in Table 1. E, D, E', D',
Figure PCTCN2017113454-appb-000049
e, PRF denotes Paillier encryption, Paillier decryption, ElGamal encryption, ElGamal decryption, ElGamal secondary encryption, ElGamal secondary decryption, modular power and pseudo-random function, respectively.
Figure PCTCN2017113454-appb-000050
Figure PCTCN2017113454-appb-000050
表2 所提出协议的通信开销。L和L′分别为Paillier和ElGamal加密系统密钥长度。Table 2 shows the communication overhead of the proposed protocol. L and L' are the key lengths of the Paillier and ElGamal encryption systems, respectively.
Figure PCTCN2017113454-appb-000051
Figure PCTCN2017113454-appb-000051
通信开销。表2总结了我们协议的通信开销。由于密文的大小通常大于明文大小,我们只考虑每一方发送和接收的密文。需要注意的是,ElGamal加密和二次加密的密文长度分别是密钥长度的两倍和三倍。我们省略了详细的分析,分析结果请参考表2。Communication overhead. Table 2 summarizes the communication overhead of our protocol. Since the size of the ciphertext is usually larger than the plaintext size, we only consider the ciphertext sent and received by each party. It should be noted that the ciphertext lengths of ElGamal encryption and secondary encryption are twice and three times the length of the key, respectively. We have omitted the detailed analysis. Please refer to Table 2 for the analysis results.
4.4安全分析4.4 Security Analysis
以下分析所提出协议的安全性。The following analysis analyzes the security of the proposed protocol.
定理1我们的任务分配协议(算法1)对SC服务器,CSP和所有工人是分别有K0=V,K-1={V,tfk(1),…,tfk(n)}和Ki=V(1≤i≤n)泄露的隐私保护的。 Theorem 1 Our task assignment protocol (Algorithm 1) has K 0 =V, K -1 ={V,t fk(1) ,...,t fk(n) } and K for the SC server, CSP and all workers respectively. i = V (1 ≤ i ≤ n) leaked privacy protection.
证明:我们首先证明存在一个多项式时间的概率模拟器S0可以在K0=V的条件下模拟SC服务器的视角(view)。假设SC服务器的视角为view0={E′(v1),...,E′(vn),E(t′1 2),...,E(t′n 2),E′C(fk(i*)),V},S0生成视角view0′={E′(x1),...,E′(xn),E(y1),...,E(yn),E′(xn+1),V},其中xi(1≤i≤n+1)是G中服从均匀分布的随机元素,yi(1≤i≤n)是ZN中服从均匀分布的随机元素。由于Paillier和ElGamal都是语义安全的,我们可以很容易证明view0≡view0′。Proof: We first prove that there is a polynomial time probability simulator S 0 that can simulate the SC server's view under K 0 =V. Suppose the perspective of the SC server is view 0 = {E'(v 1 ),..., E'(v n ), E(t' 1 2 ),...,E(t' n 2 ), E' C (f k (i * )), V}, S 0 generates a view 0 '={E'(x 1 ),..., E'(x n ), E(y 1 ),..., E(y n ), E'(x n+1 ), V}, where x i (1≤i≤n+1) is a random element subject to uniform distribution in G, y i (1≤i≤n) is Z N obeys evenly distributed random elements. Since both Paillier and ElGamal are semantically secure, we can easily prove view 0 ≡view 0 '.
然后,我们证明存在一个多项式时间的概率模拟器Si可以在Ki=V的条件下模拟工人wi 的视角(view)。若wi不是获胜者,则
Figure PCTCN2017113454-appb-000052
对其进行模拟时,Si生成
Figure PCTCN2017113454-appb-000053
其中xi(i=1,2,3)是ZN中服从均匀分布的随机元素,y从G中随机取样,k是均匀分布于{0,1}λ上的随机元素。对获胜者
Figure PCTCN2017113454-appb-000054
,其视角
Figure PCTCN2017113454-appb-000055
所以
Figure PCTCN2017113454-appb-000056
生成
Figure PCTCN2017113454-appb-000057
Figure PCTCN2017113454-appb-000058
。在这两种情况中,根据Paillier和ElGamal的语义安全性和PRF的伪随机性,我们都可以得到viewi≡viewi′。
Then, we prove that the probability simulator S i with a polynomial time can simulate the view of the worker w i under the condition of K i =V. If w i is not the winner, then
Figure PCTCN2017113454-appb-000052
When simulating it, S i is generated
Figure PCTCN2017113454-appb-000053
Where x i (i = 1, 2, 3) is a random element subject to uniform distribution in Z N , y is randomly sampled from G, and k is a random element uniformly distributed over {0, 1} λ . For the winner
Figure PCTCN2017113454-appb-000054
, its perspective
Figure PCTCN2017113454-appb-000055
and so
Figure PCTCN2017113454-appb-000056
generate
Figure PCTCN2017113454-appb-000057
for
Figure PCTCN2017113454-appb-000058
. In both cases, we can get view i ≡view i ' based on the semantic security of Paillier and ElGamal and the pseudo-randomness of PRF.
最后,我们证明存在一个多项式时间的概率模拟器S-1可以在
Figure PCTCN2017113454-appb-000059
的条件下模拟CSP的视角(view)。协议中,CSP的视角为
Figure PCTCN2017113454-appb-000060
对其进行模拟时,S-1生成view-1′={E′(x1),...,E′(xn)}∪K-1,其中xi(1≤i≤n)是G中服从均匀分布的随机元素。因为ElGamal的语义安全性,view-1≡view-1′显然成立。
Finally, we prove that there is a polynomial time probability simulator S -1 can be
Figure PCTCN2017113454-appb-000059
Simulate the view of the CSP under the conditions. In the agreement, the perspective of CSP is
Figure PCTCN2017113454-appb-000060
When simulating it, S -1 generates view -1 '={E'(x 1 ),...,E'(x n )}∪K -1 , where x i (1≤i≤n) is G obeys evenly distributed random elements. Because of the semantic security of ElGamal, view -1 ≡view -1 'is clearly established.
上述定理证明了我们的协议是K泄露安全的。在说明泄露K对个人隐私的影响有限之前,我们给出以下引理。The above theorem proves that our protocol is K leak safe. Before explaining the impact of Leakage K on personal privacy, we give the following lemma.
引理2连乘积
Figure PCTCN2017113454-appb-000061
由范围在1到d(d>n)之间的随机整数
Figure PCTCN2017113454-appb-000062
生成。当d→∞时,对
Figure PCTCN2017113454-appb-000063
方程
Figure PCTCN2017113454-appb-000064
解的个数至少为n!的概率为1。
Lemma 2 continuous product
Figure PCTCN2017113454-appb-000061
By a random integer ranging from 1 to d (d>n)
Figure PCTCN2017113454-appb-000062
generate. When d→∞, right
Figure PCTCN2017113454-appb-000063
equation
Figure PCTCN2017113454-appb-000064
The number of solutions is at least n! The probability is 1.
证明:
Figure PCTCN2017113454-appb-000065
中各元素都不相等的概率为
prove:
Figure PCTCN2017113454-appb-000065
The probability that each element is not equal is
Figure PCTCN2017113454-appb-000066
Figure PCTCN2017113454-appb-000066
序列
Figure PCTCN2017113454-appb-000067
的任何排列都是合法解。因此,方程
Figure PCTCN2017113454-appb-000068
至少有n!个解的概率为η(d,n),并且我们有limd→∞η(d,n)=1。
sequence
Figure PCTCN2017113454-appb-000067
Any arrangement is a legal solution. Therefore, the equation
Figure PCTCN2017113454-appb-000068
At least n! The probability of a solution is η(d,n), and we have lim d→∞ η(d,n)=1.
引理3连乘积π和正有理数集{b1,…,bn}由范围在1到d(d>n)之间的随机正整数
Figure PCTCN2017113454-appb-000069
生成,且满足以下方程:
The lemma 3 product π and the positive rational number set {b 1 ,...,b n } are random positive integers ranging from 1 to d (d>n)
Figure PCTCN2017113454-appb-000069
Generated and satisfies the following equation:
Figure PCTCN2017113454-appb-000070
Figure PCTCN2017113454-appb-000070
其中(σ(1),···,σ(n))是(1,…,n)的全排列,那么当d→∞时,该方程至少有n!个解的概率为1。Where (σ(1),···, σ(n)) is the full permutation of (1,...,n), then when d→∞, the equation has at least n! The probability of a solution is 1.
证明:该证明过程与引理2的证明类似。当d→∞时,
Figure PCTCN2017113454-appb-000071
互不相等的概率为1,且序列
Figure PCTCN2017113454-appb-000072
的任何排列都产生一个不同的解。
Proof: The proof process is similar to the proof of Lemma 2. When d→∞,
Figure PCTCN2017113454-appb-000071
The probability of unequal unequal is 1, and the sequence
Figure PCTCN2017113454-appb-000072
Any arrangement of the ones produces a different solution.
引理4从1,…,d中选取随机数a,当d→∞时,a为质数的概率为1/log d。Lemma 4 selects the random number a from 1, ..., d, and when d → ,, the probability that a is a prime number is 1/log d.
此引理可以直接从素数定理[24]中得到,其指出当d→∞时,数字d之前素数的数目收敛于d/log d。This lemma can be obtained directly from the prime number theorem [24], which states that when d→∞, the number of prime numbers before the number d converges to d/log d.
备注。通过引理4,可知xi为素数或为1的概率可近似为(1/log d+1/d)。因此,所有xi都具有至少两个素因子的概率为Remarks. By Lemma 4, it can be seen that the probability that x i is prime or is 1 can be approximated as (1/log d+1/d). Therefore, the probability that all x i have at least two prime factors is
(1–1/log d–1/d)n     (11)(1–1/log d–1/d) n (11)
当d→∞时,该值收敛于1。这意味着只要d选择得足够大,连乘积π有至少2n个素因子的概率为1。在实践中,方程
Figure PCTCN2017113454-appb-000073
解的个数远大于所述的n!。
This value converges to 1 when d→∞. This means that as long as d is chosen to be large enough, the probability that the product π has at least 2n prime factors is one. In practice, the equation
Figure PCTCN2017113454-appb-000073
The number of solutions is much larger than the stated n! .
定理2基于信息Ki(-1≤i≤n),入侵者Pi在执行任务分配协议(算法1)期间可以获得任何一方的私人信息的概率是可以忽略不计的。 Theorem 2 is based on the information K i (-1 ≤ i ≤ n), and the probability that the intruder P i can obtain private information of either party during the execution of the task assignment protocol (Algorithm 1) is negligible.
证明:首先考虑P0,SC服务器的情况,其拥有信息K0=V。SC服务器可以构建方程
Figure PCTCN2017113454-appb-000074
假设1≤vi≤d,η(vi)为P0可以获取vi的概率,η(vi|K0)为P0在K0的情况下可以获取vi的概率。由引理2,我们有
Figure PCTCN2017113454-appb-000075
Proof: First consider the case of P 0 , SC server, which has the information K 0 =V. SC server can build equations
Figure PCTCN2017113454-appb-000074
Suppose 1≤v i ≤d, η (v i ) is the probability P 0 can obtain the v i, η (v i | K 0 ) is the probability P 0 v i can be acquired in the case of K 0. By Lemma 2, we have
Figure PCTCN2017113454-appb-000075
一般情况下,这显然是可以忽略不计的。In general, this is obviously negligible.
对Pi的证明与P0类似,我们现在考虑P-1(即CSP)的情况。因为
Figure PCTCN2017113454-appb-000076
则CSP可以构建一个包含n+1个方程的非线性系统:
The proof of P i is similar to P 0 , and we now consider the case of P -1 (ie CSP). because
Figure PCTCN2017113454-appb-000076
Then CSP can construct a nonlinear system with n+1 equations:
Figure PCTCN2017113454-appb-000077
Figure PCTCN2017113454-appb-000077
由引理3,我们亦有 By Lemma 3, we also have
Figure PCTCN2017113454-appb-000078
Figure PCTCN2017113454-appb-000078
在一般情况下,这是可以忽略不计的。并且,即使CSP获取了d(ls,li)的精确值,其不能获取ls和li信息的概率也远远高于随机猜测。证毕。In general, this is negligible. Moreover, even if the CSP obtains the exact value of d(l s , l i ), the probability that it cannot acquire l s and l i information is much higher than the random guess. The certificate is completed.
备注。需要注意的是,定理2表明隐私保护任务分配协议在一般情况下是安全的。在某些极端情况下,例如,V=1,入侵者可以立即知道每个工人的速度为1。但是随着工人人数的增加,发生这种情况的可能性会急剧下降。Remarks. It should be noted that Theorem 2 indicates that the privacy protection task assignment protocol is generally safe. In some extreme cases, for example, V=1, an intruder can immediately know that each worker has a speed of one. But as the number of workers increases, the likelihood of this happening will drop dramatically.
五、性能评估V. Performance evaluation
5.1实验设置5.1 experiment settings
我们基于两类指标来评估我们协议(算法1)的性能:效率相关和有效性相关。前者包括运行时间和通信开销,工人行程距离(WTD),工人行程时间(WTT)和通知人数(NNW)。通常,工人倾向于更短的WTD,任务请求者也如此,因为如果工人具有相同的速度,那么任务便可以更早的被执行。不过,如果工人的速度不同,那么WTD短不一定会更好。在这种情况下,工作人员和任务请求者都更倾向与短的WTT。NNW应保持在较低水平,以降低计算成本和通信开销。We evaluate the performance of our protocol (Algorithm 1) based on two types of metrics: efficiency related and effectiveness related. The former includes run time and communication overhead, worker travel distance (WTD), worker travel time (WTT), and number of notifications (NNW). Often, workers tend to have shorter WTDs, as do task requesters, because if workers have the same speed, tasks can be executed earlier. However, if the speed of the workers is different, then the WTD will not necessarily be better. In this case, both the staff and the task requester are more inclined to have a short WTT. NNW should be kept at a low level to reduce computing costs and communication overhead.
对于有效性评估,我们以To[To,H.,Ghinita,G.and Shahabi,C.:A framework for protecting worker location privacy in spatial crowdsourcing.PVLDB,7(10),919-930(2014)]等人的方法为基准。由于他们的方法没有考虑到速度的影响,所以每个工作人员的速度在实验中设置为1。在这种情况下,WTT等于WTD。此外,每个任务的截止日期都被设置为一个很大的值,以使所有工人都可以在截止日期之前到达。由于我们协议不考虑工人的接受率,并且总是返回一个工人(即NNW总是等于1),我们随机生成1000个任务并报告平均结果。For the effectiveness evaluation, we take To[To, H., Ghinita, G. and Shahabi, C.: A framework for protecting worker location privacy in spatial crowdsourcing. PVLDB, 7 (10), 919-930 (2014)] The human method is the benchmark. Since their method did not take into account the effects of speed, the speed of each worker was set to 1 in the experiment. In this case, WTT is equal to WTD. In addition, the deadline for each task is set to a large value so that all workers can arrive before the deadline. Since our agreement does not consider worker acceptance and always returns a worker (ie NNW is always equal to 1), we randomly generate 1000 tasks and report the average result.
对于效率评估,我们注意到,差分隐私比公钥密码系统明显计算代价更低,但其在计算过程中不能进保护数据(例如,允许受信任的第三方查看所有工人的位置)。因此,把我们的协议(基于公钥密码系统)与To等人的方法(基于差异隐私)在运行时间方面进行比较是无意义的。因此,我们只关注我们协议的效率,测试其开销在实践中是否可以被接受。我们运行我们的协议10次,并报告其平均结果。For efficiency evaluation, we note that differential privacy is significantly less expensive than public key cryptosystems, but it does not protect data during the calculation process (for example, allowing trusted third parties to view the location of all workers). Therefore, it is pointless to compare our protocol (based on public key cryptosystem) with the method of To et al. (based on differential privacy) in terms of runtime. Therefore, we only pay attention to the efficiency of our agreement and test whether its overhead can be accepted in practice. We run our agreement 10 times and report their average results.
我们使用两个真实世界数据集,Gowalla和Yelp对性能进行评估。Gowalla包含基于位置的社交网络中用户的登录历史记录。我们选择加利福尼亚州的一个地区,纬度为33.720183至34.149932,经度为-118.399999至-117.900516。这个地区有5830个用户的登录,这些用户被认为是空间众包系统中的工人。我们将用户登录最多的位置作为其当前位置,并假定可以在任何有过登录记录的位置创建空间任务。对于Yelp,我们选择凤凰城的一个区域,纬度从33.205308到33.924407,经度从-112.400283到-111.218100。该地区拥有约67000个用户和11200个公司。公司地点被视为任务,而用户的位置是从其查看过的公司中随机选取的。We used two real-world datasets, Gowalla and Yelp to evaluate performance. Gowalla contains the login history of users in a location-based social network. We chose a region of California with a latitude of 33.720183 to 34.149932 and a longitude of -118.399999 to -117.900516. There are 5,830 user logins in this area, and these users are considered to be workers in the space crowdsourcing system. We take the location where the user is logged in as their current location, and assume that a space task can be created anywhere that has a login record. For Yelp, we chose a region of Phoenix with a latitude from 33.205308 to 33.924407 and a longitude from -112.400283 to -111.218100. The region has approximately 67,000 users and 11,200 companies. A company location is considered a task, and the user's location is randomly selected from the companies it has viewed.
我们设定工人人数#W∈{100,400,700,1000},最大接受率MAR∈{0.4,0.6,0.8,1},预期任务接受概率α∈{0.7,0.8,0.9,0.99}。由于性能基准依赖于基于隐私预算ε的差异隐私,我们还设置了ε∈{0.1,0.4,0.7,1.0}。对于Paillier和ElGamal的安全参数,我们参考了NIST建议书(2016),并设置密钥长度KL∈{1024,2048},其中1024的密钥长度适用于当前的应用,并且在未来15年(2016-2030)推荐使用长度为2048的密钥。每个参数的默认值以黑体显示。 We set the number of workers #W∈{100,400,700,1000}, the maximum acceptance rate is MAR∈{0.4,0.6,0.8,1}, and the expected task acceptance probability is α∈{0.7,0.8,0.9,0.99}. Since the performance benchmark relies on differential privacy based on the privacy budget ε, we also set ε∈{0.1,0.4,0.7,1.0}. For the safety parameters of Paillier and ElGamal, we refer to the NIST Recommendation (2016) and set the key length KL∈{1024,2048}, where the key length of 1024 is suitable for the current application and will be in the next 15 years (2016) -2030) It is recommended to use a key with a length of 2048. The default value for each parameter is shown in bold.
在我们的实验中,SC服务器和CSP在具有四个Intel Xeon E7-8860 2.2GHz CPU(每个CPU有16个核心)和1TB RAM的机器上运行。每个工人由具有APQ 8064 1.5GHz CPU和2GB RAM的Mi 2手机进行模拟。我们使用Bouncy Castle Crypto包实现我们的协议。代码用Java编写,并在JDK 1.8中执行。从表1可以看到,我们协议的性能瓶颈是一系列的Paillier解密过程。幸运的是,这些昂贵的操作很容易并行进行计算,因为它们是独立执行的。在我们的实验中,我们使用64个线程来执行这些解密。In our experiments, the SC server and CSP were running on machines with four Intel Xeon E7-8860 2.2GHz CPUs (16 cores per CPU) and 1TB of RAM. Each worker was simulated by a Mi 2 phone with an APQ 8064 1.5 GHz CPU and 2 GB RAM. We implemented our agreement using the Bouncy Castle Crypto package. The code is written in Java and executed in JDK 1.8. As can be seen from Table 1, the performance bottleneck of our protocol is a series of Paillier decryption processes. Fortunately, these expensive operations are easy to calculate in parallel because they are executed independently. In our experiments, we used 64 threads to perform these decryptions.
4.2实验结果4.2 Experimental results
4.2.1效率4.2.1 Efficiency
图4(a)显示了工人数#W从100增加到1000,步长为300是协议的运行时间。如预料所期,当#W增加时,SC服务器和CSP的CPU时间也线性增加,因为它们的计算代价主要来自与工人数量成比例的密码操作。另一方面,尽管工人人数众多,但是使用中等配置手机的工人的计算成本几乎是一个常数,例如约0.1秒。因此,我们的协议在实践中具有良好的可扩展性。在总运行时间方面,我们的协议只需要少于2秒的时间即可实现超过1000名工人的隐私保护任务分配。在图4(b)中可以看到类似的性能趋势,其中使用的2048位密钥可提供更强大的安全保证(这个密钥长度在未来15年被推荐使用)。即使在这种情况下,我们协议的总运行时间依然小于7秒。Figure 4(a) shows that the number of workers #W is increased from 100 to 1000, and the step size is 300 is the running time of the protocol. As expected, when the #W increases, the CPU time of the SC server and the CSP also increases linearly, because their computational cost mainly comes from the cryptographic operation proportional to the number of workers. On the other hand, despite the large number of workers, the computational cost of workers using medium-sized mobile phones is almost constant, for example about 0.1 second. Therefore, our agreement has good scalability in practice. In terms of total uptime, our protocol requires less than 2 seconds to achieve a privacy protection task assignment of more than 1,000 workers. A similar performance trend can be seen in Figure 4(b), where the 2048-bit key used provides a more robust security guarantee (this key length is recommended for the next 15 years). Even in this case, the total running time of our agreement is still less than 7 seconds.
在图5中,我们测量了协议中各方的通信开销。从图5(b)可以看出,当使用2048位密钥执行任务分配时,SC服务器,CSP和工人分别需要发送或接收2.7MB,2.1MB和0.008MB的数据。我们认为这些开销并不能成为当前移动应用的负担。通过将工人数量从100变为1000,我们在图5中观察到SC服务器和CSP的线性增长趋势,因为传输的数据主要是密码,其总通信量与工人的数量成正比。In Figure 5, we measured the communication overhead of the parties in the protocol. As can be seen from Figure 5(b), when task assignment is performed using a 2048-bit key, the SC server, CSP, and worker need to send or receive 2.7 MB, 2.1 MB, and 0.008 MB of data, respectively. We believe that these costs are not a burden on current mobile applications. By changing the number of workers from 100 to 1000, we observe the linear growth trend of SC server and CSP in Figure 5, because the transmitted data is mainly passwords, and the total traffic is proportional to the number of workers.
4.2.2有效性4.2.2 Effectiveness
图6,7和8分别通过改变MAR,α和ε来显示我们的协议在WTD(工人行程距离)方面的表现。在所有图表中,我们的协议在数据集(Gowalla,Yelp)和接受率函数(Linear,Zipf)的所有组合中表现均优于基准。具体来说,在图6中,我们观察到当MAR下降时,我们的协议和基准之间的差异增加。为了解释这一点,我们首先注意到,基准需要访问更多的网格单元才能达到所需的接受率。每个单元通常都包含一些工人。其中一些可能离任务位置较远,但他们可以接受任务。然而,我们的协议总是根据他们的行程时间(或在这种情况下的旅行距离)选择工人。这就是为什么当MAR很小时,我们的协议比基准要好得多。图8示出了当提供更强的隐私保护(例如,ε=0.1)时,基准具有较大的WTD。然而,即使仅提供弱的隐私保护(例如,ε=1),我们的协议仍然优于基准。Figures 6, 7 and 8 show the performance of our protocol in WTD (Worker Stroke Distance) by changing MAR, α and ε, respectively. In all charts, our protocol outperforms the benchmark in all combinations of datasets (Gowalla, Yelp) and acceptance rate functions (Linear, Zipf). Specifically, in Figure 6, we observe an increase in the difference between our protocol and the benchmark as the MAR declines. To explain this, we first noticed that the benchmark needs to access more grid cells to achieve the desired acceptance rate. Each unit usually contains some workers. Some of them may be far from the mission location, but they can accept the mission. However, our agreement always selects workers based on their travel time (or travel distance in this case). That's why when the MAR is small, our agreement is much better than the benchmark. Figure 8 shows that the benchmark has a larger WTD when stronger privacy protection is provided (e.g., ε = 0.1). However, even if only weak privacy protection is provided (eg, ε=1), our agreement is still superior to the benchmark.
我们通过改变MAR,α和ε来进一步评估我们的协议在NNW(通知人数)方面的表现,并分别在图9,10和11中报告结果。再次,我们的协议在数据集(Gowalla,Yelp)和接受率函数(Linear,Zipf)的所有组合中表现均优于基准。在大多数情况下,被通知的工人数量不大于5。在某些极端情况下,例如,α=0.99,我们的协议选择了少于15名工人来执行任务。这可以解释为什么我们的协议可以以非常低的开销扩展到PPTAG。另一方面,基准需要通知很多工人,因为它在网格单元上工作。We further evaluate the performance of our agreement on NNW (number of notifications) by changing MAR, α and ε, and report the results in Figures 9, 10 and 11, respectively. Again, our protocol outperforms benchmarks in all combinations of datasets (Gowalla, Yelp) and acceptance rate functions (Linear, Zipf). In most cases, the number of workers notified is no more than 5. In some extreme cases, for example, α = 0.99, our agreement selects fewer than 15 workers to perform the task. This explains why our protocol can be extended to P PTAG with very low overhead. On the other hand, the benchmark needs to notify many workers because it works on the grid unit.
以上述依据本发明的理想实施例为启示,通过上述的说明内容,相关工作人员完全可以在不偏离本项发明技术思想的范围内,进行多样的变更以及修改。本项发明的技术性范围并不局限于说明书上的内容,必须要根据权利要求范围来确定其技术性范围。 In view of the above-described embodiments of the present invention, various changes and modifications may be made by those skilled in the art without departing from the scope of the invention. The technical scope of the present invention is not limited to the contents of the specification, and the technical scope thereof must be determined according to the scope of the claims.

Claims (10)

  1. 一种隐私保护空间众包的任务分配系统模型,其特征在于,包括空间众包服务器、加密服务提供单元、空间任务请求单元和工人移动端;A task distribution system model for privacy protection space crowdsourcing, comprising: a space crowdsourcing server, an encryption service providing unit, a space task requesting unit, and a worker mobile terminal;
    所述空间任务请求单元用于创建空间任务,将任务信息传送给所述空间众包服务器;The spatial task requesting unit is configured to create a spatial task, and transmit task information to the spatial crowdsourcing server;
    所述空间众包服务器将任务分配给所述工人移动端;The space crowdsourcing server assigns a task to the worker mobile terminal;
    所述加密服务提供单元对所述空间任务请求单元、所述空间众包服务器和所述工人移动端提供隐私保护任务分配管理。The encryption service providing unit provides privacy protection task assignment management to the spatial task request unit, the space crowdsourcing server, and the worker mobile terminal.
  2. 如权利要求1所述的系统模型,其特征在于,所述空间任务s是指要在位置ls执行,并与截止日期es相关联的任务;所述工人移动端的工人w是愿意执行空间任务的人,每个工人与由空间众包服务器指定的ID idw,速度vw和其当前所处的位置lw相关联;所述空间众包服务器根据工人集合W={w1,w2,…,wn}和空间任务s的位置ls和截止日期es,通过任务分配算法,将任务分配给工作者wi*,工作者wi*需满足两个条件:第一,wi*可以在截止日期es之前到达ls;第二,没有其他工人可以在wi*之前到达lsThe system model according to claim 1, wherein said spatial task s refers to a task to be executed at position l s and associated with an expiration date e s ; said worker w of said worker mobile is willing to execute space The person of the task, each worker is associated with an ID id w specified by the space crowdsourcing server, the speed v w and its current location l w ; the space crowdsourcing server according to the worker set W={w 1 ,w 2 ,...,w n } and the position l s of the space task s and the expiration date e s , the task is assigned to the worker w i* by the task assignment algorithm, and the worker w i* needs to satisfy two conditions: first, w i * l s can be reached before the deadline e s; second, no other workers l s can be reached before w i *.
  3. 如权利要求2所述的系统模型,其特征在于,所述加密服务提供单元提供隐私保护功能,其向空间众包服务器和工人移动端提供密钥服务,隐私保护功能通过对传输数据的加密,并且使空间众包服务器能对加密数据进行计算,保证在通信过程中除了被选中的工作者wi*外,空间众包服务器,加密服务提供单元和所有其他工人都无法获得wi*的ID信息。The system model according to claim 2, wherein said encryption service providing unit provides a privacy protection function for providing a key service to the space crowdsourcing server and the worker mobile terminal, and the privacy protection function encrypts the transmission data by And the space crowdsourcing server can calculate the encrypted data to ensure that the space crowdsourcing server, the encryption service providing unit and all other workers cannot obtain the ID of the w i* except the selected worker w i* in the communication process. information.
  4. 如权利要求1所述的系统模型,其特征在于,所述加密服务提供单元采用Paillier密码系统和ElGamal密码系统,所述加密服务提供单元生成ElGamal的域参数和Paillier和ElGamal的密钥对,其对私钥进行保密,并向空间众包服务器和所有工人发送公钥。The system model according to claim 1, wherein said encryption service providing unit employs a Paillier cryptosystem and an ElGamal cryptosystem, said cryptographic service providing unit generating a domain parameter of ElGamal and a key pair of Paillier and ElGamal, The private key is kept secret and the public key is sent to the space crowdsourcing server and all workers.
  5. 一种如权利要求1-4任一项所述的系统模型的实现方法,其特征在于,包括如下步骤:A method for implementing a system model according to any one of claims 1 to 4, comprising the steps of:
    步骤一,空间任务请求单元创建并发布空间任务;Step 1: The space task request unit creates and publishes a space task;
    步骤二,空间任务发布至空间众包服务器,空间众包服务器通过任务分配算法,将任务分配给工作者;Step 2: The spatial task is released to the space crowdsourcing server, and the space crowdsourcing server assigns the task to the worker through the task allocation algorithm;
    步骤三,加密服务提供单元提供隐私保护功能,其向空间众包服务器和工人移动端提供密钥服务。In step three, the encryption service providing unit provides a privacy protection function, which provides a key service to the space crowdsourcing server and the worker mobile terminal.
  6. 如权利要求5所述的方法,其特征在于,步骤二中所述的任务分配算法具体包括如下阶段:The method according to claim 5, wherein the task assignment algorithm described in step 2 specifically comprises the following phases:
    第一阶段,任务位置与工人位置距离计算:空间众包服务器用Paillier公钥加密任务位置ls=(xs,ys)后,向所有工人发送三份密文:E(xs 2+ys 2),E(xs)和E(ys),从空间众包服务器接收到该加密信息后,每个工人wi计算ls和其当前位置li的距离的平方,并进行加密,即:In the first stage, the distance between the task position and the worker position is calculated: the space crowdsourcing server encrypts the task position ls=(x s , y s ) with the Paillier public key, and sends three ciphertexts to all workers: E(x s 2 +y s 2 ), E(x s ) and E(y s ), after receiving the encrypted information from the space crowdsourcing server, each worker w i calculates the square of the distance between l s and its current position l i and encrypts ,which is:
    Figure PCTCN2017113454-appb-100001
    Figure PCTCN2017113454-appb-100001
    第二阶段,每个工人行进时间计算:令W={w1,w2,…,wn}是n个工人的集合,V是所有工人速度的乘积,即
    Figure PCTCN2017113454-appb-100002
    且vk‘=V/vk,其中1≤k≤n;对于任意两个工人wi,wj∈W,当且仅当d(li,ls)vi‘<d(lj,ls)vj‘时有d(li,ls)/vi<d(lj,ls)/vj;为每个工人计算虚拟行程时间ti’=d(li,ls)vi’,其等同于确切的行程时间ti=d(li,ls)/vi,即具有最短虚拟行程时间的工人必定具有最短的确切行程时间;
    In the second stage, each worker travels time calculation: Let W={w 1 , w 2 ,..., w n } be the set of n workers, and V is the product of the speeds of all workers, ie
    Figure PCTCN2017113454-appb-100002
    And v k '=V/v k , where 1 ≤ k ≤ n; for any two workers w i , w j ∈ W, if and only if d(l i , l s )v i '<d(l j , l s )v j ' is d(l i ,l s )/v i <d(l j ,l s )/v j ; for each worker, the virtual travel time t i '=d(l i , l s )v i ', which is equivalent to the exact travel time t i =d(l i ,l s )/v i , ie the worker with the shortest virtual travel time must have the shortest exact travel time;
    第三阶段,获胜工人计算:空间众包服务器具有2元组<i,E(ti2)>的列表,其中i是人wi的ID,1≤i≤n;为了保护工人,尤其是获胜者的身份,它通过一个PRF fk函数加密每个工人的ID,并向加密服务提供单元发送<fk(i),E(tfk(i)2)>,以找到哪个工人的行程时间最短,以及其是否可以在截止日期es之前到达任务位置; In the third stage, the winning worker calculates: the space crowdsourcing server has a list of 2-tuple <i, E(t i ' 2 )>, where i is the ID of the person w i , 1 ≤ i ≤ n; Is the identity of the winner, which encrypts each worker's ID by a PRF f k function and sends <f k (i), E(t fk(i) ' 2 )> to the cryptographic service provider to find which worker The travel time is the shortest and whether it can reach the mission location before the deadline e s ;
    第四阶段,任务位置广播:一旦接收到E’C(fk(i*)),空间众包服务器便加密任务位置ls并向所有工人广播
    Figure PCTCN2017113454-appb-100003
    以如下方式加密ls
    The fourth stage, task location broadcast: Once E' C (f k (i * )) is received, the space crowdsourcing server encrypts the task location l s and broadcasts to all workers
    Figure PCTCN2017113454-appb-100003
    Encrypt l s as follows:
    Figure PCTCN2017113454-appb-100004
    Figure PCTCN2017113454-appb-100004
    其中h是长度匹配哈希函数,用于将较长的位串映射到较短的位串;一种被证明是语义安全的h的构建方法是,将一个较长的位串截断为多个固定长度的较短位串,并在这些较短位串上进行异或计算并输出;只有获得E’C(fk(i*))信息的工人才能通过计算
    Figure PCTCN2017113454-appb-100005
    Figure PCTCN2017113454-appb-100006
    得到任务位置信息。
    Where h is a length matching hash function for mapping a longer bit string to a shorter bit string; a method of constructing h that proves to be semantically secure is to truncate a longer bit string into multiple Fixed-length shorter bit strings, and XOR calculations and outputs on these shorter bit strings; only workers who obtain E' C (f k (i * )) information can pass the calculation
    Figure PCTCN2017113454-appb-100005
    Figure PCTCN2017113454-appb-100006
    Get the task location information.
  7. 如权利要求6所述的方法,其特征在于,所述第一阶段中,要求所有工人以E(xi 2+yi 2),E(xi)和E(yi)的形式向空间众包服务器发送加密位置,并要求空间众包服务器计算E(d2(li,ls))。The method of claim 6 wherein in the first phase, all workers are required to present space in the form of E(x i 2 +y i 2 ), E(x i ) and E(y i ) The crowdsourcing server sends the encrypted location and asks the space crowdsourcing server to calculate E(d 2 (l i , l s )).
  8. 如权利要求6所述的方法,其特征在于,所述第二阶段中,每个工人通过ElGamal密码系统对其速度进行加密,并将E‘(vi)发送给空间众包服务器,空间众包服务器通过将所有加密的速度相乘获得E’(V);然后,空间众包服务器要求加密服务提供单元解密E’(V),并给所有工人移动端发送V;通过用其速度vi除V,每个工人wi得到vi’的值并计算E(d2(li,ls))vi’2=E(d2(li,ls)vi2)=E(ti2);加密的虚拟行程时间被发送到空间众包服务器进行进一步处理;该过程中加密服务提供单元和所有工人都知道V的确切值,这并不违反任何工人的个人隐私。The method of claim 6 wherein in the second phase, each worker encrypts its speed via an ElGamal cryptosystem and sends E'(v i ) to the space crowdsourcing server, the space The packet server obtains E'(V) by multiplying all encryption speeds; then, the space crowdsourcing server asks the encryption service providing unit to decrypt E'(V) and sends V to all workers' mobile terminals; by using its speed v i In addition to V, each worker w i obtains the value of v i ' and calculates E(d 2 (l i , l s )) vi'2 = E(d 2 (l i , l s )v i ' 2 )=E (t i ' 2 ); The encrypted virtual travel time is sent to the space crowdsourcing server for further processing; in the process, the encrypted service providing unit and all workers know the exact value of V, which does not violate the personal privacy of any worker.
  9. 如权利要求6所述的方法,其特征在于,所述第三阶段中,由于加密服务提供单元具有Paillier的私钥,因此能通过解密E(ti2)来获得ti2并计算实际的行程时间
    Figure PCTCN2017113454-appb-100007
    Figure PCTCN2017113454-appb-100008
    然后,加密服务提供单元很容易的找到具有最短行程时间的工人,并判断其是否可以满足截止日期限制;如果不能,加密服务提供单元通知空间众包服务器没有获胜者,否则,它使用ElGamal加密获胜者的ID fk(i*),并将E’C(fk(i*))发送到空间众包服务器。
    The method according to claim 6, wherein in said third stage, since the encryption service providing unit has a private key of Paillier, it is possible to obtain t i ' 2 by decrypting E(t i ' 2 ) and calculate Actual travel time
    Figure PCTCN2017113454-appb-100007
    Figure PCTCN2017113454-appb-100008
    Then, the cryptographic service providing unit can easily find the worker with the shortest travel time and judge whether it can meet the deadline limit; if not, the cryptographic service providing unit notifies the space crowdsourcing server that there is no winner, otherwise it wins with ElGamal encryption. The ID f k (i * ) and E' C (f k (i * )) are sent to the space crowdsourcing server.
  10. 如权利要求6所述的方法,其特征在于,所述第四阶段中,以下步骤确保只有获胜者才能获得E’C(fk(i*))信息:The method of claim 6 wherein in the fourth phase, the following steps ensure that only the winner can obtain E' C (f k (i * )) information:
    首先,每个工人wi从空间众包服务器获取加密的ID fk(i)),并使用自己的公钥通过ElGamal进行加密,然后将加密后的信息E’wi(fk(i))发送给加密服务提供单元,加密服务提供单元接收到该信息后,使用其公钥和用于加密E’C(fk(i*))的相同随机数r再次通过ElGamal进行加密;加密服务提供单元随后将结果
    Figure PCTCN2017113454-appb-100009
    发送到每个可以通过其私钥来解密以获得E’C(fk(i))的工人;所述公钥应该保密,以保护隐私。
    First, each worker w i obtains the encrypted ID f k (i) from the space crowdsourcing server and encrypts it with ElGamal using its own public key, and then encrypts the information E' wi (f k (i)) Sent to the encryption service providing unit, after receiving the information, the encryption service providing unit encrypts again through ElGamal using its public key and the same random number r for encrypting E' C (f k (i * )); the encryption service provides Unit will then result
    Figure PCTCN2017113454-appb-100009
    Sent to each worker who can be decrypted by their private key to obtain E' C (f k (i)); the public key should be kept secret to protect privacy.
PCT/CN2017/113454 2017-07-03 2017-11-29 Task allocation system model of privacy protected spatial crowdsourcing, and implementation method WO2019006966A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201710533457.2 2017-07-03
CN201710533457.2A CN107257381B (en) 2017-07-03 2017-07-03 Task allocation system model for privacy protection space crowdsourcing and implementation method

Publications (1)

Publication Number Publication Date
WO2019006966A1 true WO2019006966A1 (en) 2019-01-10

Family

ID=60025375

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/113454 WO2019006966A1 (en) 2017-07-03 2017-11-29 Task allocation system model of privacy protected spatial crowdsourcing, and implementation method

Country Status (2)

Country Link
CN (1) CN107257381B (en)
WO (1) WO2019006966A1 (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110825810A (en) * 2019-10-28 2020-02-21 天津理工大学 Block chain-based crowd sensing double privacy protection method
CN111105142A (en) * 2019-11-25 2020-05-05 哈尔滨工程大学 Crowdsourcing task allocation method facing user personalized privacy protection
CN111314883A (en) * 2020-02-24 2020-06-19 武汉大学深圳研究院 Internet of vehicles privacy perception data scheduling method based on incentive mechanism
CN112488585A (en) * 2020-12-18 2021-03-12 湖南大学 Privacy preserving task matching based on threshold similarity search in crowdsourcing environment
CN112865958A (en) * 2020-12-31 2021-05-28 北方工业大学 Privacy protection system and method for searching target through Internet of things camera
CN113591113A (en) * 2021-07-29 2021-11-02 华控清交信息科技(北京)有限公司 Privacy calculation method, device and system and electronic equipment
CN113949989A (en) * 2021-10-14 2022-01-18 中国电子科技集团公司第三十研究所 Location-based service query method and system for privacy protection in road network environment
CN115694877A (en) * 2022-08-30 2023-02-03 电子科技大学长三角研究院(衢州) Space crowdsourcing task allocation method based on federal preference learning

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107257381B (en) * 2017-07-03 2021-03-26 深圳大学 Task allocation system model for privacy protection space crowdsourcing and implementation method
CN109033865B (en) * 2018-06-20 2021-10-01 苏州大学 Task allocation method for privacy protection in space crowdsourcing
CN109600709B (en) * 2018-11-27 2021-01-26 南方科技大学 Space crowdsourcing task allocation method and system
CN109961215B (en) * 2019-02-19 2022-09-20 深圳大学 City perception-oriented general mobile crowdsourcing task allocation method and system
CN110062042B (en) * 2019-04-16 2021-09-24 南京信息工程大学 Decentralized video streaming service method and system supported by mobile crowdsourcing
CN110196763A (en) * 2019-05-09 2019-09-03 中国科学技术大学苏州研究院 A kind of efficient multi-task planning method of time domain continuous type space crowdsourcing
CN113905047A (en) * 2021-09-24 2022-01-07 山东师范大学 Space crowdsourcing task allocation privacy protection method and system
CN114978530B (en) * 2022-05-11 2023-09-08 西安电子科技大学 Distance calculation and privacy protection method for distributed space crowdsourcing in space information network
CN115879722B (en) * 2022-12-14 2023-09-22 南京捷崎信息科技有限公司 Space crowdsourcing task allocation method and system
CN116419216B (en) * 2023-04-18 2024-02-06 上海兴岩信息科技有限公司 Road rescue privacy protection system and method

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102244675A (en) * 2010-05-13 2011-11-16 微软公司 Contextual task assignment broker
CN103947240A (en) * 2011-10-01 2014-07-23 高通股份有限公司 Flexible architecture for location based crowdsourcing of contextual data
CN106408486A (en) * 2016-09-30 2017-02-15 深圳市华傲数据技术有限公司 Data collection method and system for grid management
CN107257381A (en) * 2017-07-03 2017-10-17 深圳大学 The task distribution system model and implementation method of a kind of secret protection space mass-rent

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3089399B1 (en) * 2011-11-28 2019-07-24 Porticor Ltd. Methods and devices for securing keys for a non-secured, distributed environment with applications to virtualization and cloud-computing security and management
CN105243501B (en) * 2015-10-13 2018-11-09 重庆大学 Space crowdsourcing network node location method for secret protection
CN107222302B (en) * 2017-07-03 2019-05-07 深圳大学 The space crowdsourcing task distribution system and method constructed with part homomorphic encryption scheme

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102244675A (en) * 2010-05-13 2011-11-16 微软公司 Contextual task assignment broker
CN103947240A (en) * 2011-10-01 2014-07-23 高通股份有限公司 Flexible architecture for location based crowdsourcing of contextual data
CN106408486A (en) * 2016-09-30 2017-02-15 深圳市华傲数据技术有限公司 Data collection method and system for grid management
CN107257381A (en) * 2017-07-03 2017-10-17 深圳大学 The task distribution system model and implementation method of a kind of secret protection space mass-rent

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110825810B (en) * 2019-10-28 2023-05-19 天津理工大学 Block chain-based crowd sensing dual privacy protection method
CN110825810A (en) * 2019-10-28 2020-02-21 天津理工大学 Block chain-based crowd sensing double privacy protection method
CN111105142A (en) * 2019-11-25 2020-05-05 哈尔滨工程大学 Crowdsourcing task allocation method facing user personalized privacy protection
CN111314883B (en) * 2020-02-24 2023-04-07 武汉大学深圳研究院 Internet of vehicles privacy perception data scheduling method based on incentive mechanism
CN111314883A (en) * 2020-02-24 2020-06-19 武汉大学深圳研究院 Internet of vehicles privacy perception data scheduling method based on incentive mechanism
CN112488585A (en) * 2020-12-18 2021-03-12 湖南大学 Privacy preserving task matching based on threshold similarity search in crowdsourcing environment
CN112488585B (en) * 2020-12-18 2024-01-12 湖南大学 Privacy protection task matching based on threshold similarity search in crowdsourcing environment
CN112865958B (en) * 2020-12-31 2023-04-18 北方工业大学 Privacy protection system and method for searching target through Internet of things camera
CN112865958A (en) * 2020-12-31 2021-05-28 北方工业大学 Privacy protection system and method for searching target through Internet of things camera
CN113591113A (en) * 2021-07-29 2021-11-02 华控清交信息科技(北京)有限公司 Privacy calculation method, device and system and electronic equipment
CN113591113B (en) * 2021-07-29 2024-04-05 华控清交信息科技(北京)有限公司 Privacy calculation method, device and system and electronic equipment
CN113949989A (en) * 2021-10-14 2022-01-18 中国电子科技集团公司第三十研究所 Location-based service query method and system for privacy protection in road network environment
CN113949989B (en) * 2021-10-14 2023-05-09 中国电子科技集团公司第三十研究所 Position service query method and system based on privacy protection in road network environment
CN115694877A (en) * 2022-08-30 2023-02-03 电子科技大学长三角研究院(衢州) Space crowdsourcing task allocation method based on federal preference learning
CN115694877B (en) * 2022-08-30 2023-08-15 电子科技大学长三角研究院(衢州) Space crowdsourcing task allocation method based on federal preference learning

Also Published As

Publication number Publication date
CN107257381B (en) 2021-03-26
CN107257381A (en) 2017-10-17

Similar Documents

Publication Publication Date Title
CN107257381B (en) Task allocation system model for privacy protection space crowdsourcing and implementation method
WO2019006968A1 (en) Warrantable task allocation system and method for privacy protected spatial crowdsourcing
WO2019006967A1 (en) Spatial crowdsourcing task allocation system and method using partial homomorphic cryptographic scheme construction
Belguith et al. Phoabe: Securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted iot
Paulet et al. Privacy-preserving and content-protecting location based queries
Yi et al. Privacy protection for wireless medical sensor data
Wang et al. Panda: Public auditing for shared data with efficient user revocation in the cloud
Puthal et al. A dynamic key length based approach for real-time security verification of big sensing data stream
US11088851B2 (en) Systems and methods for signing of a message
Misra et al. A unique key sharing protocol among three users using non-commutative group for electronic health record system
Yu et al. Verifiable outsourced computation over encrypted data
Murugesan et al. Analysis on homomorphic technique for data security in fog computing
Tang et al. Achieve privacy-preserving truth discovery in crowdsensing systems
Luo et al. Privacy-preserving identity-based file sharing in smart city
Vishwakarma et al. A secure three-party authentication protocol for wireless body area networks
Li et al. Epps: Efficient privacy-preserving scheme in distributed deep learning
Mookherji et al. Fog-based single sign-on authentication protocol for electronic healthcare applications
Al-Zumia et al. A novel fault-tolerant privacy-preserving cloud-based data aggregation scheme for lightweight health data
Wang et al. pdRide: Privacy-Preserving Distributed Online Ride-Hailing Matching Scheme
Misha et al. Zero Knowledge based Authentication for Internet of Medical Things
Karl et al. Cryptonite: A framework for flexible time-series secure aggregation with non-interactive fault recovery
Wang et al. Private Data Aggregation Based on Fog-Assisted Authentication for Mobile Crowd Sensing
Roberts et al. An Elliptic curve Cryptographic System Design Architecture with application to distributed simulation
Liao et al. Using Location-Labeling for Privacy Protection in Location-Based Services.
Subramani et al. Blockchain-Enabled Secure Data Collection Scheme for Fog-Based WBAN

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17917031

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 10/06/2020)

122 Ep: pct application non-entry in european phase

Ref document number: 17917031

Country of ref document: EP

Kind code of ref document: A1