检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:曾菊儒 陈红[1,2] 彭辉[1,2] 吴垚[1,2] 李翠平[1,2] 王珊[1,2]
机构地区:[1]中国人民大学数据工程与知识工程教育部重点实验室,北京100872 [2]中国人民大学信息学院,北京100872
出 处:《计算机学报》2016年第3期595-614,共20页Chinese Journal of Computers
基 金:国家"九七三"重点基础研究发展规划项目基金(2012CB316205);国家"八六三"高技术研究发展计划项目基金(2014AA015204);国家自然科学基金(61070056;61033010;61272137;61202114)资助~~
摘 要:移动智能终端正在成为人们日常生活的核心通信设备,参与式感知的隐私保护技术已成为研究热点.研究和解决数据以及位置隐私保护问题对参与式感知的大规模安全使用具有重要意义,然而参与式感知的特征使得隐私保护技术面临诸多挑战.该文对参与式感知隐私保护现有的研究成果进行了综述,首先介绍了参与式感知的基本应用和攻击模型,然后按照基于分组统计、第三方验证、K-匿名、数字加密4种策略对现有成果进行了分类,阐述了代表性的隐私保护技术,接着分析和比较了各技术的性能并总结了各技术的主要优缺点,最后提出了未来的研究方向.Participatory sensing (PS) is an emerging area of interest for researchers as mobile intelligent terminals are becoming the core communication device in people's everyday lives. Privacy preservation techniques in PS have attracted more and more attentions. Researching and solving the problems of data privacy preservation along with location privacy preservation is essential to widespread employment of PS. However, inherent characteristics of PS make privacy preservation face series of challenging problems. This paper surveys the state-of-the-art privacy preservation techniques in PS. First, this paper reviews the basic applications and attack models. Second, existing works are classified into four categories, including packet statistics, third-party verification, K-anonymous and digital encryption. Then this paper describes the key techniques of privacy preservation in PS, analyzes and compares the performance of these techniques, and summarizes the main advantages and disadvantages of these techniques. Finally, suggestions for future research works are put forward. Packet statistics are used when participants upload data. First, the data are cut into a number of packets or chosen from n packets data. Then the data packets are distributed to neighboring nodes. After that the sink or the qureier completes information reorganization and integrity verification. Packet statistics are always used along with random walker, delayed transmitting, hop-by-hop eneryption and data perturbation. In order to protect the participant privacy in the case of an untrusted server, one of the present methods is to add Trusted Third-Party (TTP) between participants and server. Participants upload data or the server assigns tasks all needs to go through TTP verification. Because the server cannot contact with participants' sensitive information directly, so as to effectively prevent the correlation attack and other attacks with background knowledge. Special network coding techniques are often needed when a TTP is used for v
关 键 词:移动参与式感知 隐私保护 分组统计 第三方验证 K-匿名 数字加密
分 类 号:TP311[自动化与计算机技术—计算机软件与理论]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:3.19.75.212