Computer Science ›› 2015, Vol. 42 ›› Issue (6): 139-144.doi: 10.11896/j.issn.1002-137X.2015.06.031

Previous Articles     Next Articles

Privacy-preserving Data Sharing and Access Control in Participatory Sensing

LIU Shu-bo, WANG Ying and LIU Meng-jun   

  • Online:2018-11-14 Published:2018-11-14

Abstract: With the development of mobile devices,participatory sensing has a broad application prospect.As the main users of participatory sensing are persons social attributes,participatory sensing is facing many problems which don’t encounter in conventional sensor networks.The security and privacy for users to collecte and share data with others are one of the most important issues.One of the most concerned problems is how to get all the necessary data through single transaction and how to keep identity privacy and preference privacy for users to get all the necessary data when users interact with others.Meanwhile,if participatory sensing wants to be developed,the problems should be solved first.The scheme uses bilinear mapping and blind signature to protect the identity privacy of users,and uses bloom filter to make users get all the necessary data through single transaction and protect the preference privacy of users from data providers at the same time if the matching request fails between users and data providers.Finally,performance analysis shows the security and feasibility of proposed scheme.

Key words: Participatory sensing,Identity privacy and preference privacy,Bilinear mapping,Blind signature,Bloom filter

[1] 任丰原,黄海宁,林闯.无线传感器网络[J].软件学报,2003,(10):1282-1290 Ren Feng-yuan,Huang Hai-ning,Lin Chuang.Wireless Sensor Networks[J].Journal of Software,2003,(10):1282-1290
[2] Burke J,Estin D,Hansen M,et al.Participatory.Sensing.http://citeseerx.ist.psu.edu/riewdoc/summary?doi=10.1.1.122.3024
[3] Christin D,Reinhardt A,Kanhere S S,et al.A survey on privacy in mobile participatory sensing applications[J].Journal of Systems and Software,2011,84(11):1928-1946
[4] Gaonkar S,Li J,Choudhury R,et al.Micro-Blog:Sharing andQuerying Content through Mobile Phones and Social Participation[C]∥Proceedings of the 6th ACM International Conference on Mobile Systems,Applications,and Services(MobiSys).2008:174-186
[5] Kanjo E.NoiseSPY:A Real-Time Mobile Phone Platform forUrban Noise Monitoring and Mapping[J].Mobile Networks and Applications,2010,15(4):562-574
[6] Shilton K,Burke J,Estrin D,et al.Participatory Privacy in Urban Sensing[M].MODUS,2008
[7] Ahmadi H,Abdelzaher T,Han J,et al.The sparse regressioncube:A reliable modeling technique for open cyber-physical systems[C]∥Proc.2nd International Conference on Cyber-Physical Systems(ICCPS’11).2011:87-96
[8] Zhang J,Ma J,Wang W,et al.A novel privacy protectionscheme for participatory sensing with incentives[C]∥2012 IEEE 2nd International Conference on Cloud Computing and Intelligent Systems(CCIS).IEEE,2012,3:1017-1021
[9] Ahmadi H,Pham N,Ganti R,et al.Privacy-aware regression modeling of participatory sensing data[C]∥Proceedings of the 8th ACM Conference on Embedded Networked Sensor Systems.ACM,2010:99-112
[10] 朱晓玲.VANET安全和隐私保护机制研究[D].合肥:合肥工业大学,2013 Zhu Xiao-ling.Security and Privacy Preservation Mechanisms in Vehicular Ad Hoc Network[D].Hefei:Hefei University of Technology,2013
[11] Sweeney L.K-anonymity:a model for protecting privacy.International Journal on Uncertainty[J].Fuzziness and Knowledge-based Syatems,2002,10(5):557-570
[12] Camenisch J,Groth J.Group Signatures:Better Efficiency and New Theoretical Aspects[C]∥SCN 2004,LNCS 3352,2005:120-133
[13] Agrawal R,Evfimievski A,Srikant R.Information SharingAcross Private Databases[C]∥Proceedings of SIGMOD.2003:86-97
[14] Xie Q,Hengartner U.Privacy-Preserving Matchmaking for Mobile Social Networking Secure Against Malicious Users[C]∥Proceedings 9th Int.Conf.on Privacy,Security.2011:252-259
[15] Li S D,Wang D S,Lou P,et al.Symmetric Cryptographic Solution to Yao’s Millionaires’Problem and an Evaluation of Secure Multiparty Computations[J].Information Sciences,2008,8(1):244-255
[16] Liu R X,Lin X D,Liang X H,et al.Secure Handshake with Symptoms-matching[C]∥The Essential to the Success of mHealthcare Social Network.BodyNets 2010,Corfu Island,Greece,September 2010:10-12
[17] Chaum D.Blind signature system[C]∥Advances in cryptology.Springer US,1984:153-153
[18] Bloom B.Space/time trade-offs in hash coding with allowableerrors[J].Comm.ACM,1970,13(7):422-426
[19] Broder A,Mitzenmacher M.Network applications of bloom filters:A survey[J].Internet Mathematics,2005,1(4):485-509
[20] Zhao Y,Wu J.B-sub:A practical bloom-filter-based publish-subscribe system for human networks[C]∥2010 IEEE 30th International Conference on Distributed Computing Systems(ICDCS).IEEE,2010:634-643
[21] Gremillion L L.Designing a Bloom filter for differential file access[J].Communications of the ACM,1982,25(9):600-604
[22] Qiu Ling,Li Ying-jiu,Wu Xin-tao.An Approach to Outsourcing Data Mining Tasks While Protecting Business Intelligence and Customer Privacy[C]∥Proc.of the 6th IEEE International Conference on Data Mining.Hong Kong,China:[s.n.],2006:551-558
[23] Zhang Y,Ren K.DP2AC:Distributed Privacy-Preserving Access Control in Sensor Networks[C]∥INFOCOM 2009.IEEE,2009:1251-1259
[24] Sun J,Zhang R,Zhang Y.Privacy-preserving spatiotemporalmatching[C]∥2013 Proceedings IEEE INFOCOM.IEEE,2013:800-808

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!