Privacy information protection method based on cloud assistance in crowd sensing

A privacy information and crowd-sensing technology, applied in the field of privacy information protection, can solve problems such as the inability to protect user privacy information, privacy leakage, and inability to effectively prevent attacker data.

Pending Publication Date: 2020-06-09
XUZHOU COLLEGE OF INDAL TECH
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

When this information is stolen by attackers, it will lead to serious privacy leaks and even personal attacks
Although the existing privacy protection schemes prevent the leakage of private information to a certain extent, when the requester monitors in the cloud, the requester colludes with the honest and curious cloud, and the requester’s homomorphic encryption private key leaks, etc. , the user's private information will not be protected
[0003] Although existing technologies can protect user privacy information to a certain extent, they cannot effectively prevent attackers, clouds, and requesters from directly obtaining data contributed by users, and will increase the computing and storage burden of requesters.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privacy information protection method based on cloud assistance in crowd sensing
  • Privacy information protection method based on cloud assistance in crowd sensing
  • Privacy information protection method based on cloud assistance in crowd sensing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] Paillier public key cryptosystem is a probabilistic public key encryption system invented by Paillier. Its security is based on the difficult problem of judging the composite residual class. The encryption algorithm is a homomorphic encryption algorithm that supports arbitrary multiple addition homomorphic operations. Like other encryption schemes, it mainly contains 3 algorithms: KeyGen, Encrypt and Decrypt.

[0041] Key generation algorithm KeyGen: Let p, q be two large prime numbers satisfying gcd(pq,(p-1)(q-1))=1, and N=pq, randomly selected Let L(x)=(x-1) / N, then the public key is pk=(N,g), the private key is sk=λ(N)=lcm(p-1,q-1), where N is Open the mold, g is the open base.

[0042] Encryption algorithm Encrypt: For any plaintext m∈Z N ,choose randomly The encryption process is:

[0043] c=E pk (m)=g m r N modN 2 ;

[0044] Decryption algorithm Decrypt: For any ciphertext The decryption process is:

[0045]

[0046] Since the Paillier public-key encryption algorith...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a privacy information protection method based on cloud assistance in crowd sensing. The method comprises the steps that TA registers a mobile user, a requester, a cloud and PCAin a system, and generates an RSA secret key for the requester, the cloud, the mobile user and the PCA; the requester generates an own Paillier homomorphic encryption public key and private key, andsends the task tau and the public key hpk to the TA; after receiving {tau, hpk} from the requester, the TA sends the {tau, hpk} to the participant; the user requests a plurality of pseudonyms from thePCA as anonymous certificates; after receiving the pseudonym, the user decrypts the information by using a private key ski of the user, executes the task and submits sensing data; the cloud verifiesthe anonymous certificate after receiving the message sent from the user; after the cloud verification succeeds and the interaction with the PCA is completed, statistical summation operation is carried out on all the received data; and after the requester receives the data sent by the cloud, the fusion result is decrypted by using the homomorphic encryption private key of the requester. Accordingto the method, the privacy information of the mobile user can be well protected.

Description

Technical field [0001] The invention relates to a cloud-assisted privacy information protection method in group intelligence perception. Background technique [0002] Mobile Smart Sensing (MCS) reduces the cost of data collection for task owners by acquiring sensing data from smart devices that are embedded with a large number of sensors carried by ordinary users. Therefore, it has broad application prospects, such as environmental monitoring intelligent transportation, Emerging applications such as smart healthcare and public safety. However, the perception data contributed by users will contain sensitive information such as the user's age, whereabouts, and health status. When this information is stolen by an attacker, it will cause serious privacy leaks and even personal attacks. Although the existing privacy protection schemes prevent the leakage of private information to a certain extent, when the requester monitors in the cloud, the requester colludes with the honest and c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/00H04W12/02H04W12/06H04W12/10H04W12/12H04W12/041H04W12/069H04W12/106
CPCH04W12/02H04W12/03H04W12/122H04W12/106H04W12/069
Inventor 龙浩霍娜
Owner XUZHOU COLLEGE OF INDAL TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products