Unlock instant, AI-driven research and patent intelligence for your innovation.

A task distribution method of a group intelligence perception system with privacy protection

A technology of group intelligence sensing system and task assignment, which is applied in transmission systems, commerce, instruments, etc., to achieve the effect of protecting price privacy

Active Publication Date: 2019-02-15
SUZHOU INST FOR ADVANCED STUDY USTC
View PDF5 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, the above-mentioned patented technologies are still unable to achieve the optimal matching between users and tasks without revealing the privacy of users and data consumers

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A task distribution method of a group intelligence perception system with privacy protection
  • A task distribution method of a group intelligence perception system with privacy protection
  • A task distribution method of a group intelligence perception system with privacy protection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0065] The task allocation method of the group intelligence sensing system with privacy protection proposed by the present invention, such as figure 1 As shown, the specific implementation of the task release and combination module includes the following steps:

[0066] S11: A semi-trusted third party uses the Paillier encryption system to generate an encrypted public key Pk a and the decryption private key Sk a . where the public key Pk a It can be used for data encryption and is disclosed to the entire system; the decryption private key is not disclosed to others and is only used to decrypt encrypted data by a semi-trusted third party. Since the Paillier encryption system can achieve homomorphic operations, the required mathematical operations can be completed on the basis of privacy protection. The specific supported homomorphic operations include homomorphic addition and homomorphic multiplication, as follows:

[0067] E(key+N i )=E(key)E(N i ) Formula 6

[0068] E...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a task distribution method of a group intelligence perception system with privacy protection, which comprises the following steps that a semi-trusted third party generates an encryption public key and a decryption private key, and issues the encryption public key to others in the group intelligence perception system; the task publisher submits the group intelligence perception task to the platform of the group intelligence perception system, including task requirements, the budget and weight after each task is encrypted by a public key, and then the platform publishes the task requirements information to an intelligent mobile terminal user; after reading the task description, the intelligent mobile terminal user submits the task set of interest and the task quotation encrypted with the public key to the platform. The method of the invention has the advantages that the user adopts dynamic IP to interact with the platform, and combines the digital authentication technology to realize anonymization, which can ensure that the platform can not establish the association between the real IP of the user and the provided data, thereby protecting the potential privacydata contained in the submitted perceptual data from being disclosed; Homomorphic encryption and permutation techniques are used to protect the price privacy of users and task publishers.

Description

technical field [0001] The invention belongs to the field of resource allocation, and in particular relates to a method for task allocation of a group intelligence sensing system with privacy protection. Background technique [0002] As one of the key technologies of the Internet of Things application, crowd sensing aims to obtain information of interest to users in real time in a wider sensing area through various mobile devices attached to people such as smartphones and PDAs. Compared with traditional data collection methods, crowd sensing can effectively reduce the time and cost required for data collection. The problem of task allocation, that is, how to assign sensing tasks to the most suitable users, and how to achieve the optimal matching between tasks and users is the core issue in crowd sensing, and it is also the most important problem facing the realization of crowd sensing systems. One of the challenges. [0003] A crowd-sensing system includes several intellig...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q30/06H04L29/06
CPCG06Q30/0601G06Q30/0611H04L63/0442
Inventor 黄河曹振孙玉娥吴晓灿杜扬黄丹镭
Owner SUZHOU INST FOR ADVANCED STUDY USTC
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More