Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An efficient privacy protection perception big data collection method based on fog computing

A technology of privacy protection and fog computing, which is applied in security devices, network traffic/resource management, electrical components, etc., and can solve problems such as ignoring the privacy protection of sensitive data

Active Publication Date: 2019-05-10
NANJING UNIV OF POSTS & TELECOMM
View PDF3 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The second and third types of schemes have great performance advantages, but ignore the privacy protection of sensitive data during data transmission and processing

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An efficient privacy protection perception big data collection method based on fog computing
  • An efficient privacy protection perception big data collection method based on fog computing
  • An efficient privacy protection perception big data collection method based on fog computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] The present invention will be further described in detail below through the specific examples, the following examples are only descriptive, not restrictive, and cannot limit the protection scope of the present invention with this.

[0052] Such as figure 1 As shown, an efficient privacy protection-aware big data collection method based on fog computing includes the following steps:

[0053] (1) Design a layered perception fog computing architecture. The perception fog computing architecture is divided into interconnected perception layer, fog layer and user layer from bottom to top.

[0054] The sensing layer consists of various sensing devices for monitoring designated areas. According to the location information of sensing devices, it is divided into multiple clusters. That is, the perception layer consists of K clusters, each cluster contains L perception nodes, and the sampling period of the perception nodes is N. The perception device performs disturbance and en...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an efficient privacy protection perception big data collection method based on fog computing. A hierarchical fog computing auxiliary data collection framework is designed, so that a computing task can be processed on local equipment or network edge equipment, long-distance communication with a cloud center is avoided, and effective support is provided for exploring space-time correlation of perception data. Meanwhile, through the sampling disturbance encryption method, the data privacy is protected from being damaged by eavesdroppers and active attackers, the encryptionmethod does not damage the correlation of the data, and the decryption and reconstruction operation on the encrypted sampling data is simplified. Meanwhile, through the designed fog node data processing mode and anobservation matrix optimization model, the redundant data transmission amount is greatly reduced, the spatial correlation is effectively explored, and it is guaranteed that data can bereconstructed with high precision.

Description

technical field [0001] The invention belongs to the technical field of wireless communication networks and wireless sensor networks, and in particular relates to a method for collecting large data with high efficiency privacy protection perception based on fog computing. Background technique [0002] Data collection is integral to wireless sensor network (WSN), ad hoc, and Internet of things (IoT) applications. Usually, components in these networks (such as sensors, etc.) are resource-constrained, so how to overcome these constraints, develop energy-efficient data collection, and build green communication networks becomes a great challenge. Currently proposed schemes for efficient data collection can be roughly divided into the following three categories: mathematical model-based, compressed sensing (Compressive sensing, CS)-based and query-driven approximate data collection schemes. However, these traditional data processing processes or structures can no longer meet the n...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/02H04W28/06H04W40/22H04W84/18
Inventor 陈思光朱曦汤蓓王晓玲王堃代海波孙雁飞
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products