Sensing original data safety protection method supporting data processing

A technology for data security and data processing, which is applied in transmission systems, climate sustainability, sustainable communication technology, etc., can solve problems such as inability to effectively solve data integrity identification, and meet security protection requirements, low overhead, and realize data security. The effect of privacy protection and integrity verification

Active Publication Date: 2016-03-16
716TH RES INST OF CHINA SHIPBUILDING INDAL CORP
View PDF2 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] Although the integrity authentication problem of sensor network data has been widely concerned at the beginning of the rise of sensor network, and a large number of solutions have emerged, but most of these works are independent of data privacy protection and cannot be effectively implemented. Solve the integrity authentication of privacy-protected data
There are not many technologies that can realize data privacy protection and integrity authentication at the same time. He et al. respectively extended the privacy protection mechanism PDA and CPDA proposed by He et al., and proposed the mechanism iPDA and iCPDA. However, these works are only applicable to summation Data processing requires a large amount of data communication and requires dense deployment of network nodes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Sensing original data safety protection method supporting data processing
  • Sensing original data safety protection method supporting data processing
  • Sensing original data safety protection method supporting data processing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] Embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0029] A security protection method for raw sensing data supporting data processing in the present invention, the system of which is as follows figure 1 As shown, it includes: a cluster node, a data recovery group and a data recovery node, a data processing node and a base station.

[0030] For any cluster node that is μ-hop away from the base station, define its neighbor node that is (μ-1) hop away from the base station as its predecessor node, and the neighbor nodes at the same level are the same number of hops away from the base station; and define “data recovery group” and “data recovery node " means the following:

[0031] Data Recovery Group CG i : For any cluster, the set composed of some nodes randomly selected from the public predecessor nodes of its cluster members is called the data recovery group CG 1 ; called from CG 1 The set composed...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a sensing original data safety protection method supporting data processing. The method comprises an initialization stage and a data reporting stage executed repeatedly. The initialization stage comprises clustering nodes, obtaining data recovery groups by various clusters and distributing secret sharing data to the nodes. The data reporting stage comprises hiding sensing data of the nodes by the nodes, generating watermark data, and recovering the sensing data through cooperation of data recovery nodes. The method has good expansibility for the addition of the nodes and good robustness for node failures. Tolerance for the captured nodes is improved, good privacy protection effectiveness is provided, and energy consumption is reduced at the same time; and integrity of data can be identified, so filtering for tampered data is achieved, and a network communication resource is prevented from being wasted.

Description

technical field [0001] The invention relates to network data security protection technology, in particular to a sensory original data security protection method supporting data processing. Background technique [0002] Sensor network (referred to as sensor network) is an important part of the Internet of Things and Cyber-Physical System (CPS, Cyber-Physical System), and has broad application prospects in the fields of environmental monitoring, medical and health, and smart home. When sensor networks are used in areas such as medical applications and smart homes, the exposure of sensory data, including categories such as pulse, heart rate, and water and electricity usage, may cause personal safety or moral damage. This requires that the sensor data not only maintain confidentiality to external attackers, but also to internal nodes, that is, to ensure the privacy of the data, so as to ensure that people accept the collection of their personal information by the sensor network....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0428H04L63/0464H04L63/123H04L67/12Y02D30/50
Inventor 曾玮妮吴爱国苏培培陈海荣张兴堂宋汉广张鹏姚小城徐振朋杨阳
Owner 716TH RES INST OF CHINA SHIPBUILDING INDAL CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products