• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Wang Taochun, Jin Xin, Lü Chengmei, Chen Fulong, Zhao Chuanxin. Privacy Preservation Method of Data Aggregation in Mobile Crowd Sensing[J]. Journal of Computer Research and Development, 2020, 57(11): 2337-2347. DOI: 10.7544/issn1000-1239.2020.20190579
Citation: Wang Taochun, Jin Xin, Lü Chengmei, Chen Fulong, Zhao Chuanxin. Privacy Preservation Method of Data Aggregation in Mobile Crowd Sensing[J]. Journal of Computer Research and Development, 2020, 57(11): 2337-2347. DOI: 10.7544/issn1000-1239.2020.20190579

Privacy Preservation Method of Data Aggregation in Mobile Crowd Sensing

Funds: This work was supported by the National Natural Science Foundation of China (61402014, 61972439, 61972438, 61871412), the CERNET Next Generation Internet Creative Project of China (NGII20170312), the Key Program of Universities Natural Science Research of the Anhui Provincial Department of Education (KJ2019A1164), the Anhui Normal University PhD Startup Fund (2018XJJ66), and the Anhui Normal University Innovation Fund (2018XJJ114).
More Information
  • Published Date: October 31, 2020
  • Serious privacy leakage problems are on the rise with the wide application of mobile crowd sensing owing to the popularity of mobile smart devices. In general, the existing privacy protection schemes assume that the third-party service platform is credible, which therefore sets a high requirement on the application context. Based on this, the paper proposes a new privacy preservation data aggregation algorithm based on elliptic curve cryptography (ECPPDA) in mobile crowd sensing. The server randomly divides the participants into g clusters and forms respective cluster public key for each cluster. The nodes in the cluster encrypt the data through their own cluster public keys and merge the data aggregation results. The server obtains the aggregation result by cooperating with the members in the cluster. Since what the server receives is the ciphertext of aggregation and the ciphertext decryption requires all the nodes in the cluster to cooperate together, the server cannot obtain the data of a single participant. In addition, the updating of the cluster public key by the server can facilitate the participants to dynamically join or leave. The experimental result shows that ECPPDA has the characteristics of high security, low consumption, low communication and high precision.
  • Related Articles

    [1]Li Zhetao, Zang Lang, Tian Shujuan, Li Renfa. Data Collection Method in Clustering Network Based on Hybrid Compressive Sensing[J]. Journal of Computer Research and Development, 2017, 54(3): 493-501. DOI: 10.7544/issn1000-1239.2017.20150885
    [2]Zhang Ce, Zhang Xia, Li Ou, Wang Chong, Zhang Dalong. Data Gathering Using Dynamic Clustering Based on WSNs Compressive Sensing Algorithm[J]. Journal of Computer Research and Development, 2016, 53(9): 2000-2008. DOI: 10.7544/issn1000-1239.2016.20150459
    [3]Wu Yingjie, Tang Qingming, Ni Weiwei, Sun Zhihui, Liao Shangbin. A Clustering Hybrid Based Algorithm for Privacy Preserving Trajectory Data Publishing[J]. Journal of Computer Research and Development, 2013, 50(3): 578-593.
    [4]Zhang Chong, Tang Jiuyang, Xiao Weidong, and Tang Daquan. XML Structural Clustering Based on Cluster-Core[J]. Journal of Computer Research and Development, 2011, 48(11): 2161-2176.
    [5]Zhou Xinlian, Wu Min, Xu Jianbo. BPEC:An Energy-Aware Distributed Clustering Algorithm in WSNs[J]. Journal of Computer Research and Development, 2009, 46(5): 723-730.
    [6]Li Fangmin, Xu Wenjun, Liu Xinhua, Hu Siquan. A Real-Time Energy-Aware Cluster-Based Routing Protocol for Wireless Sensor and Actor Networks[J]. Journal of Computer Research and Development, 2008, 45(1): 26-33.
    [7]An Huiyao, Lu Xicheng, Peng Wei, Gong Zhenghu. A Cluster-Based Multipath Dynamic Source Routing in MANET[J]. Journal of Computer Research and Development, 2006, 43(3): 381-388.
    [8]Zhang Xiaoning and Feng Dengguo. A Cluster Based Security Scheme in Wireless Ad Hoc Networks[J]. Journal of Computer Research and Development, 2006, 43(2): 238-243.
    [9]Jiang Yanhuang, Yang Xuejun, and Yi Huizhan. PIWA-LOC—A Parallel Resampling Algorithm for Large Images on Cluster Systems[J]. Journal of Computer Research and Development, 2005, 42(5): 835-843.
    [10]Zhao Chunxiao, Wang Guangxing. A δ-Degree-Based Clustering Algorithm in MANET[J]. Journal of Computer Research and Development, 2005, 42(5): 818-822.
  • Cited by

    Periodical cited type(9)

    1. 杨海龙,靳新华. 基于ECC复合加密的医院网络隐私信息安全保护方法. 自动化技术与应用. 2024(08): 140-143+166 .
    2. 贾卉楠,王斌. 基于移动群智感知的隐私保护研究. 佳木斯大学学报(自然科学版). 2024(09): 16-18+69 .
    3. 杨小琴,朱玉全. 网络加密数据跨平台迁移自适应决策模型构建. 计算机仿真. 2023(01): 437-440+516 .
    4. 蒋沥泉,秦志光. 基于属性隐藏的高效去中心化的移动群智数据共享方案. 电子科技大学学报. 2023(06): 915-924 .
    5. 蔡波. 马尔可夫预测的移动群智感知网络日志信息收集. 西安工程大学学报. 2022(01): 115-120 .
    6. 佘晓萌 ,杜洋 ,马文静 ,殷赵霞 . 基于像素预测和块标记的图像密文可逆信息隐藏. 计算机研究与发展. 2022(09): 2089-2100 . 本站查看
    7. 王磊,陈磊,张明儒,魏敏,李晋先. 面向数据库查询的非结构化数据融合存储系统. 电子设计工程. 2022(24): 148-152 .
    8. 李卓,宋子晖,沈鑫,陈昕. 边缘计算支持下的移动群智感知本地差分隐私保护机制. 计算机应用. 2021(09): 2678-2686 .
    9. 熊金波,毕仁万,田有亮,刘西蒙,马建峰. 移动群智感知安全与隐私:模型、进展与趋势. 计算机学报. 2021(09): 1949-1966 .

    Other cited types(12)

Catalog

    Article views (966) PDF downloads (414) Cited by(21)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return