计算机科学 ›› 2015, Vol. 42 ›› Issue (6): 139-144.doi: 10.11896/j.issn.1002-137X.2015.06.031
刘树波,王颖,刘梦君
LIU Shu-bo, WANG Ying and LIU Meng-jun
摘要: 随着移动设备的发展,参与式感知具有广泛的应用前景。由于参与式感知的用户主体是具有社会属性的人,因此,其面临许多传统传感器网络未曾遇到的问题,用户在 采集与共享数据过程中的安全与隐私问题便是其中之一,在用户与用户交互过程中怎样使用户通过单次交易就能获得全部必需的数据,以及在获得全部必需数据的同时如何保证用户的身份隐私和偏好隐私是用户十分关心的问题,也是参与式感知应该解决的问题。首先,通过采用双线性映射和盲签名来保护用户的身份隐私;其次,采用布隆过滤器,使用户通过单次数据交易就能获得全部必需的数据,同时保护用户的偏好隐私不被泄露给匹配失败的数据提供者;最后,通过分析表明了该方案的安全性和可行性。
[1] 任丰原,黄海宁,林闯.无线传感器网络[J].软件学报,2003,(10):1282-1290 Ren Feng-yuan,Huang Hai-ning,Lin Chuang.Wireless Sensor Networks[J].Journal of Software,2003,(10):1282-1290 [2] Burke J,Estin D,Hansen M,et al.Participatory.Sensing.http://citeseerx.ist.psu.edu/riewdoc/summary?doi=10.1.1.122.3024 [3] Christin D,Reinhardt A,Kanhere S S,et al.A survey on privacy in mobile participatory sensing applications[J].Journal of Systems and Software,2011,84(11):1928-1946 [4] Gaonkar S,Li J,Choudhury R,et al.Micro-Blog:Sharing andQuerying Content through Mobile Phones and Social Participation[C]∥Proceedings of the 6th ACM International Conference on Mobile Systems,Applications,and Services(MobiSys).2008:174-186 [5] Kanjo E.NoiseSPY:A Real-Time Mobile Phone Platform forUrban Noise Monitoring and Mapping[J].Mobile Networks and Applications,2010,15(4):562-574 [6] Shilton K,Burke J,Estrin D,et al.Participatory Privacy in Urban Sensing[M].MODUS,2008 [7] Ahmadi H,Abdelzaher T,Han J,et al.The sparse regressioncube:A reliable modeling technique for open cyber-physical systems[C]∥Proc.2nd International Conference on Cyber-Physical Systems(ICCPS’11).2011:87-96 [8] Zhang J,Ma J,Wang W,et al.A novel privacy protectionscheme for participatory sensing with incentives[C]∥2012 IEEE 2nd International Conference on Cloud Computing and Intelligent Systems(CCIS).IEEE,2012,3:1017-1021 [9] Ahmadi H,Pham N,Ganti R,et al.Privacy-aware regression modeling of participatory sensing data[C]∥Proceedings of the 8th ACM Conference on Embedded Networked Sensor Systems.ACM,2010:99-112 [10] 朱晓玲.VANET安全和隐私保护机制研究[D].合肥:合肥工业大学,2013 Zhu Xiao-ling.Security and Privacy Preservation Mechanisms in Vehicular Ad Hoc Network[D].Hefei:Hefei University of Technology,2013 [11] Sweeney L.K-anonymity:a model for protecting privacy.International Journal on Uncertainty[J].Fuzziness and Knowledge-based Syatems,2002,10(5):557-570 [12] Camenisch J,Groth J.Group Signatures:Better Efficiency and New Theoretical Aspects[C]∥SCN 2004,LNCS 3352,2005:120-133 [13] Agrawal R,Evfimievski A,Srikant R.Information SharingAcross Private Databases[C]∥Proceedings of SIGMOD.2003:86-97 [14] Xie Q,Hengartner U.Privacy-Preserving Matchmaking for Mobile Social Networking Secure Against Malicious Users[C]∥Proceedings 9th Int.Conf.on Privacy,Security.2011:252-259 [15] Li S D,Wang D S,Lou P,et al.Symmetric Cryptographic Solution to Yao’s Millionaires’Problem and an Evaluation of Secure Multiparty Computations[J].Information Sciences,2008,8(1):244-255 [16] Liu R X,Lin X D,Liang X H,et al.Secure Handshake with Symptoms-matching[C]∥The Essential to the Success of mHealthcare Social Network.BodyNets 2010,Corfu Island,Greece,September 2010:10-12 [17] Chaum D.Blind signature system[C]∥Advances in cryptology.Springer US,1984:153-153 [18] Bloom B.Space/time trade-offs in hash coding with allowableerrors[J].Comm.ACM,1970,13(7):422-426 [19] Broder A,Mitzenmacher M.Network applications of bloom filters:A survey[J].Internet Mathematics,2005,1(4):485-509 [20] Zhao Y,Wu J.B-sub:A practical bloom-filter-based publish-subscribe system for human networks[C]∥2010 IEEE 30th International Conference on Distributed Computing Systems(ICDCS).IEEE,2010:634-643 [21] Gremillion L L.Designing a Bloom filter for differential file access[J].Communications of the ACM,1982,25(9):600-604 [22] Qiu Ling,Li Ying-jiu,Wu Xin-tao.An Approach to Outsourcing Data Mining Tasks While Protecting Business Intelligence and Customer Privacy[C]∥Proc.of the 6th IEEE International Conference on Data Mining.Hong Kong,China:[s.n.],2006:551-558 [23] Zhang Y,Ren K.DP2AC:Distributed Privacy-Preserving Access Control in Sensor Networks[C]∥INFOCOM 2009.IEEE,2009:1251-1259 [24] Sun J,Zhang R,Zhang Y.Privacy-preserving spatiotemporalmatching[C]∥2013 Proceedings IEEE INFOCOM.IEEE,2013:800-808 |
No related articles found! |
|