Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A k-anonymity-based Location and Data Privacy Protection Method in Population Intelligence Perception

A crowd-sensing, data privacy technology, applied in digital data protection, electronic digital data processing, platform integrity maintenance, etc., to resist collusion attacks and ensure ownership privacy

Active Publication Date: 2019-01-15
ANHUI NORMAL UNIV
View PDF11 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

User-aware data solves the problem of ownership of user-aware data by iterating over equivalence classes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A k-anonymity-based Location and Data Privacy Protection Method in Population Intelligence Perception
  • A k-anonymity-based Location and Data Privacy Protection Method in Population Intelligence Perception
  • A k-anonymity-based Location and Data Privacy Protection Method in Population Intelligence Perception

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] The specific implementation manner of the present invention will be described in further detail below by describing the best embodiment with reference to the accompanying drawings.

[0041] Crowd perception system: such as figure 2 As shown, a large-scale data collection system that uses a large number of mobile terminal sensing data, the crowd sensing system is composed of a crowd sensing application server in the cloud and a group of mobile terminal users.

[0042] Participants: Users added to the equivalence class are the final participants of the group intelligence sensing system.

[0043] Application server: A server that obtains the participant's perception data without exposing the participant's location and data privacy.

[0044] A k-anonymous location and data privacy protection method based on group intelligence in the present invention, the execution process is as follows figure 1 As shown, the steps are as follows:

[0045] (1) Construct an equivalence ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a population intelligence perception method based on k-anonymous location and data privacy protection method comprises the following steps of: (1) constructing an equivalent class: an equivalent class is a group composed of N users, each user has the functions of sensing data and uploading data directly to a server; in the equivalent class, all users are independent and donot trust each other; (2) Data iteration: a user is randomly selected as the first user in the equivalent class, and the user judges whether to upload perceptual data in the form of flipping a coin. If the user uploads the perceptual data, the perceptual data and the transmitted data are transmitted to the next random user, and if the user does not upload, the transmitted data is only transmittedto the next randomly selected user. And so on until all the users in the equivalent class are active and all the data is uploaded to the server. The invention can effectively protect the privacy of the perceived user's personal position and the data privacy from being disclosed.

Description

technical field [0001] The present invention relates to the field of location privacy protection and data aggregation research, in particular to a location and data privacy protection method based on k-anonymity in crowd intelligence sensing. Background technique [0002] With the development of the Internet of Things today, the demand for perceptual computing is becoming stronger and stronger. With the explosive popularity of wireless communication and sensor technology and wireless mobile terminal equipment, smart devices such as mobile phones and tablet computers on the market integrate more and more Sensors have increasingly powerful computing and perception capabilities. In this context, it is inevitable that crowd-sensing computing will become the core of scholars' research. The content collected by the mobile device is uploaded to the server, and the server processes and releases the data provided by the user for different purposes. The collected data has the charac...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/62G06F21/56
CPCG06F21/56G06F21/6245
Inventor 王涛春刘盈金鑫陈付龙赵传信罗永龙
Owner ANHUI NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products