Space crowdsourcing task allocation privacy protection method and system

A task allocation and privacy protection technology, applied in the field of spatial crowdsourcing privacy protection, can solve the problems of difficult task allocation, key management, user revocation and accountability cannot be well implemented, and meet the requirements of multi-user searchable encryption , Realize the effect of user revocation and accountability

Pending Publication Date: 2022-01-07
SHANDONG NORMAL UNIV
View PDF0 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Most of the existing methods use single-user symmetric searchable encryption. Due to single-user and symmetry, such methods cannot be well implemented in terms of key management, user revoca

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Space crowdsourcing task allocation privacy protection method and system
  • Space crowdsourcing task allocation privacy protection method and system
  • Space crowdsourcing task allocation privacy protection method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0074] Embodiment one, such as Figure 1-3 As shown, this embodiment provides a privacy protection method for spatial crowdsourcing task assignment, which is applied to a requester terminal. The requester terminal sends a registration request to the key issuing server, and receives the task encryption key returned by the key issuing server; uses the task encryption key to encrypt the task message to obtain the ciphertext of the task message, and submits it to the crowdsourcing server; the receiving worker terminal Send the radius message (by verifying the signature, it can be proved that the worker is negotiating the radius with the requester), and after verifying its validity, upload the task location grid code set and the radius trapdoor to the crowdsourcing server; the receiving worker terminal The task result information sent, and the accountability information can be sent to the crowdsourcing server. It specifically includes the initialization phase, registration phase, ...

Embodiment 2

[0107] Embodiment two, such as Figure 1-3 As shown, this embodiment provides a privacy protection method for spatial crowdsourcing task assignment, which is applied to worker terminals. The worker terminal sends a registration request to the key issuing server, and receives the worker encryption key returned by the key issuing server; uses the worker encryption key to encrypt the worker message to obtain the ciphertext of the worker message, and submits it to the crowdsourcing server; After receiving the ciphertext of the requester's identity information sent by the crowdsourcing server and verifying its validity, upload the task worker grid code set and radius ciphertext to the crowdsourcing server; receive the final task information sent by the crowdsourcing server, and send Accountability information is sent to the crowdsourcing server or task result information is sent to the requester terminal. It specifically includes the initialization phase, registration phase, encry...

Embodiment 3

[0140] Embodiment three, such as Figure 1-3 As shown, this embodiment provides a privacy protection method for spatial crowdsourcing task allocation, which is applied to crowdsourcing servers. The crowdsourcing server receives the task re-encryption key and the worker re-encryption key of the key issuing server, the task message ciphertext of the requester terminal and the worker message ciphertext of the worker terminal, and obtains by re-encryption and inner product calculation The requester’s identity information that satisfies the worker’s requirements, encrypts and signs the requester’s identity information and forwards the ciphertext of the requester’s identity information to the worker’s terminal; receives the requester’s terminal’s task position grid code set and radius trapdoor , and the worker grid encoding set and radius ciphertext of the worker terminal, and after verification and intersection calculation, the final task information is obtained and sent to the wor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a space crowdsourcing task distribution privacy protection method and system, and the method comprises the steps that: an inner product of a task position conversion ciphertext and a worker position conversion ciphertext, and an inner product of a task demand conversion ciphertext and a worker interest conversion ciphertext are calculated through a crowdsourcing server, a task message meeting conditions is screened based on the inner products, and the task message is encrypted, signed and forwarded to a worker terminal; the worker terminal obtains a worker position grid code set; a requester terminal obtains a task position grid code set; and a crowdsourcing server performs intersection calculation on the worker position grid code set and the task position grid code set to obtain a distance, the task with the closest distance is allocated to the worker terminal, a worker can obtain the closest task which is within a specified circular range and meets the interest of the worker, and task allocation can be realized on the premise of protecting user positions and interest data privacy.

Description

technical field [0001] The invention relates to the technical field of space crowdsourcing privacy protection, in particular to a privacy protection method and system for space crowdsourcing task allocation. Background technique [0002] The statements in this section merely mention the background technology related to the present invention and do not necessarily constitute the prior art. [0003] With the development of mobile devices and 5G technology, the Internet of Things and the Internet of Vehicles are more and more widely used and provide users with convenient services, such as road congestion detection, online car-hailing and interest search, etc. These applications facilitate people's lives but also bring about privacy issues, such as exposing users' real-time location, hobbies and other sensitive information. In spatial crowdsourcing applications, in order to improve communication efficiency and reduce computing burden while providing good service quality, the se...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L67/1001H04L67/52H04L9/40H04W12/02H04W12/03H04W12/0431H04W12/63
CPCH04L63/10H04W12/03H04W12/02H04W12/63H04W12/0431
Inventor 吴磊徐子慧李素
Owner SHANDONG NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products