计算机科学 ›› 2015, Vol. 42 ›› Issue (6): 139-144.doi: 10.11896/j.issn.1002-137X.2015.06.031

• 信息安全 • 上一篇    下一篇

隐私保护的参与式感知数据分享与访问方案

刘树波,王颖,刘梦君   

  1. 武汉大学空天信息安全与可信计算教育部重点实验室 武汉430072 武汉大学计算机学院 武汉430072,武汉大学空天信息安全与可信计算教育部重点实验室 武汉430072 武汉大学计算机学院 武汉430072,武汉大学空天信息安全与可信计算教育部重点实验室 武汉430072 武汉大学计算机学院 武汉430072
  • 出版日期:2018-11-14 发布日期:2018-11-14
  • 基金资助:
    本文受国家973计划项目(2011CB302306),中央高校基本科研业务费专项资金(211-274230),国家自然科学基金(41371402),水利部“948”项目(201044),湖北省水利厅农村饮用水水资源远程监控项目资助

Privacy-preserving Data Sharing and Access Control in Participatory Sensing

LIU Shu-bo, WANG Ying and LIU Meng-jun   

  • Online:2018-11-14 Published:2018-11-14

摘要: 随着移动设备的发展,参与式感知具有广泛的应用前景。由于参与式感知的用户主体是具有社会属性的人,因此,其面临许多传统传感器网络未曾遇到的问题,用户在 采集与共享数据过程中的安全与隐私问题便是其中之一,在用户与用户交互过程中怎样使用户通过单次交易就能获得全部必需的数据,以及在获得全部必需数据的同时如何保证用户的身份隐私和偏好隐私是用户十分关心的问题,也是参与式感知应该解决的问题。首先,通过采用双线性映射和盲签名来保护用户的身份隐私;其次,采用布隆过滤器,使用户通过单次数据交易就能获得全部必需的数据,同时保护用户的偏好隐私不被泄露给匹配失败的数据提供者;最后,通过分析表明了该方案的安全性和可行性。

关键词: 参与式感知,身份隐私和偏好隐私,双线性映射,盲签名,布隆过滤器

Abstract: With the development of mobile devices,participatory sensing has a broad application prospect.As the main users of participatory sensing are persons social attributes,participatory sensing is facing many problems which don’t encounter in conventional sensor networks.The security and privacy for users to collecte and share data with others are one of the most important issues.One of the most concerned problems is how to get all the necessary data through single transaction and how to keep identity privacy and preference privacy for users to get all the necessary data when users interact with others.Meanwhile,if participatory sensing wants to be developed,the problems should be solved first.The scheme uses bilinear mapping and blind signature to protect the identity privacy of users,and uses bloom filter to make users get all the necessary data through single transaction and protect the preference privacy of users from data providers at the same time if the matching request fails between users and data providers.Finally,performance analysis shows the security and feasibility of proposed scheme.

Key words: Participatory sensing,Identity privacy and preference privacy,Bilinear mapping,Blind signature,Bloom filter

[1] 任丰原,黄海宁,林闯.无线传感器网络[J].软件学报,2003,(10):1282-1290 Ren Feng-yuan,Huang Hai-ning,Lin Chuang.Wireless Sensor Networks[J].Journal of Software,2003,(10):1282-1290
[2] Burke J,Estin D,Hansen M,et al.Participatory.Sensing.http://citeseerx.ist.psu.edu/riewdoc/summary?doi=10.1.1.122.3024
[3] Christin D,Reinhardt A,Kanhere S S,et al.A survey on privacy in mobile participatory sensing applications[J].Journal of Systems and Software,2011,84(11):1928-1946
[4] Gaonkar S,Li J,Choudhury R,et al.Micro-Blog:Sharing andQuerying Content through Mobile Phones and Social Participation[C]∥Proceedings of the 6th ACM International Conference on Mobile Systems,Applications,and Services(MobiSys).2008:174-186
[5] Kanjo E.NoiseSPY:A Real-Time Mobile Phone Platform forUrban Noise Monitoring and Mapping[J].Mobile Networks and Applications,2010,15(4):562-574
[6] Shilton K,Burke J,Estrin D,et al.Participatory Privacy in Urban Sensing[M].MODUS,2008
[7] Ahmadi H,Abdelzaher T,Han J,et al.The sparse regressioncube:A reliable modeling technique for open cyber-physical systems[C]∥Proc.2nd International Conference on Cyber-Physical Systems(ICCPS’11).2011:87-96
[8] Zhang J,Ma J,Wang W,et al.A novel privacy protectionscheme for participatory sensing with incentives[C]∥2012 IEEE 2nd International Conference on Cloud Computing and Intelligent Systems(CCIS).IEEE,2012,3:1017-1021
[9] Ahmadi H,Pham N,Ganti R,et al.Privacy-aware regression modeling of participatory sensing data[C]∥Proceedings of the 8th ACM Conference on Embedded Networked Sensor Systems.ACM,2010:99-112
[10] 朱晓玲.VANET安全和隐私保护机制研究[D].合肥:合肥工业大学,2013 Zhu Xiao-ling.Security and Privacy Preservation Mechanisms in Vehicular Ad Hoc Network[D].Hefei:Hefei University of Technology,2013
[11] Sweeney L.K-anonymity:a model for protecting privacy.International Journal on Uncertainty[J].Fuzziness and Knowledge-based Syatems,2002,10(5):557-570
[12] Camenisch J,Groth J.Group Signatures:Better Efficiency and New Theoretical Aspects[C]∥SCN 2004,LNCS 3352,2005:120-133
[13] Agrawal R,Evfimievski A,Srikant R.Information SharingAcross Private Databases[C]∥Proceedings of SIGMOD.2003:86-97
[14] Xie Q,Hengartner U.Privacy-Preserving Matchmaking for Mobile Social Networking Secure Against Malicious Users[C]∥Proceedings 9th Int.Conf.on Privacy,Security.2011:252-259
[15] Li S D,Wang D S,Lou P,et al.Symmetric Cryptographic Solution to Yao’s Millionaires’Problem and an Evaluation of Secure Multiparty Computations[J].Information Sciences,2008,8(1):244-255
[16] Liu R X,Lin X D,Liang X H,et al.Secure Handshake with Symptoms-matching[C]∥The Essential to the Success of mHealthcare Social Network.BodyNets 2010,Corfu Island,Greece,September 2010:10-12
[17] Chaum D.Blind signature system[C]∥Advances in cryptology.Springer US,1984:153-153
[18] Bloom B.Space/time trade-offs in hash coding with allowableerrors[J].Comm.ACM,1970,13(7):422-426
[19] Broder A,Mitzenmacher M.Network applications of bloom filters:A survey[J].Internet Mathematics,2005,1(4):485-509
[20] Zhao Y,Wu J.B-sub:A practical bloom-filter-based publish-subscribe system for human networks[C]∥2010 IEEE 30th International Conference on Distributed Computing Systems(ICDCS).IEEE,2010:634-643
[21] Gremillion L L.Designing a Bloom filter for differential file access[J].Communications of the ACM,1982,25(9):600-604
[22] Qiu Ling,Li Ying-jiu,Wu Xin-tao.An Approach to Outsourcing Data Mining Tasks While Protecting Business Intelligence and Customer Privacy[C]∥Proc.of the 6th IEEE International Conference on Data Mining.Hong Kong,China:[s.n.],2006:551-558
[23] Zhang Y,Ren K.DP2AC:Distributed Privacy-Preserving Access Control in Sensor Networks[C]∥INFOCOM 2009.IEEE,2009:1251-1259
[24] Sun J,Zhang R,Zhang Y.Privacy-preserving spatiotemporalmatching[C]∥2013 Proceedings IEEE INFOCOM.IEEE,2013:800-808

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!