Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Edge computing-oriented federated learning indoor positioning privacy protection method

A privacy protection and indoor positioning technology, applied in security devices, network planning, electrical components, etc., can solve the problems of difficulty in adapting to the exponential growth of terminal equipment data volume, privacy, confusing contributions, inapplicability, etc., and achieve accurate indoor positioning services. Effect

Active Publication Date: 2020-10-30
LANZHOU JIAOTONG UNIV
View PDF8 Cites 32 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Secondly, the cloud server aggregates the model parameters of each edge device node for differential privacy protection, confuses the contribution of each edge node to the global model, and realizes the protection of the edge node model; patent CN110267197A proposes a WIFI fingerprint-based indoor positioning A lightweight privacy protection system and method. While providing services to users, the method uses encryption algorithms such as Paillier to perform encryption processing when data is uploaded and processed to achieve the effect of protecting user privacy; however, the method uses public key cryptography system, the calculation overhead is very large, and it is not suitable for the edge computing environment; the patent CN107222851A proposes a differential private protection method, while providing location services for users, the server uses the AP sequence uploaded by the client to construct a fingerprint data set, using differential privacy protection The technology performs disturbance processing in the clustering process to protect the user's location privacy and the server's data privacy
However, this method is based on the cloud server architecture, which is difficult to adapt to the exponential growth of the current terminal device data volume and the privacy of the model training process.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Edge computing-oriented federated learning indoor positioning privacy protection method
  • Edge computing-oriented federated learning indoor positioning privacy protection method
  • Edge computing-oriented federated learning indoor positioning privacy protection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The present invention and its effects will be further described below in conjunction with the accompanying drawings.

[0031] like figure 1 As shown, the system model of the present invention consists of three entities: terminal equipment, edge nodes and cloud servers. These systems are described as follows:

[0032] (1) Terminal device: The user's terminal device collects wireless signal strength RSSI data from multiple wireless sensor beacons in indoor areas (eg, shopping malls, underground parking lots, exhibition halls, etc.). In order to solve the problem of privacy leakage, the terminal device first independently performs privacy protection processing on the original RSSI data that satisfies differential privacy, and then sends the processed data to nearby edge nodes, where multi-user data aggregation is performed. End devices are considered trusted in this model.

[0033] (2) Edge nodes: Edge nodes are some intelligent gateways with data computing and storage ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an edge computing-oriented federated learning indoor positioning privacy protection method. The method is based on federated learning and differential privacy protection technologies. According to the method, credible federation training of an indoor positioning model is carried out in an edge computing environment; in the training process, all participating users do not share training data, distributed training and credible aggregation of the indoor positioning model are carried out only by sharing positioning model parameters, meanwhile, the model parameters are updated in an end-cloud cooperation iteration mode, so that the indoor positioning model is continuously optimized, and privacy protection and cooperative benefits of multi-user positioning model training are achieved. Experimental results show that compared with a traditional centralized model training method and a federated learning-based model training method, the method provided by the invention notonly can provide proven privacy protection, but also ensures the positioning effect of the model under the condition of increasing extremely little calculation overhead.

Description

technical field [0001] The invention relates to the service field of indoor positioning, and relates to protecting the data privacy of the user when the user obtains the service by using the location. Background technique [0002] In the traditional cloud-centric computing method, the data collected by the mobile device will be all uploaded and stored in the cloud server for centralized computing and processing. However, with the rapid development of technologies and fields such as the Internet of Things, crowdsensing, and social networks, ubiquitous mobile devices and sensors continue to generate massive amounts of data, and hundreds of millions of users have a huge amount of interactions while enjoying Internet services. The explosive growth of data on the edge side has caused cloud computing to consume a lot of computing and storage resources when processing this data, and its capabilities will be stretched. Edge computing can migrate the pressure of cloud computing and ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/02H04W16/22H04W64/00H04L29/08H04L29/06
CPCH04W12/02H04W16/225H04W64/006H04L67/10H04L63/0407Y02D30/70
Inventor 张学军何福存陈前盖继扬鲍俊达巨涛黄海燕杜晓刚
Owner LANZHOU JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products