CN109474928A - Realize that the true value of efficient secret protection finds method in mobile gunz sensory perceptual system - Google Patents

Realize that the true value of efficient secret protection finds method in mobile gunz sensory perceptual system Download PDF

Info

Publication number
CN109474928A
CN109474928A CN201811322088.3A CN201811322088A CN109474928A CN 109474928 A CN109474928 A CN 109474928A CN 201811322088 A CN201811322088 A CN 201811322088A CN 109474928 A CN109474928 A CN 109474928A
Authority
CN
China
Prior art keywords
user
cloud server
technology
data
secret
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811322088.3A
Other languages
Chinese (zh)
Other versions
CN109474928B (en
Inventor
李洪伟
刘森
徐国文
龚丽
任彦之
杨浩淼
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
University of Electronic Science and Technology of China
Original Assignee
University of Electronic Science and Technology of China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by University of Electronic Science and Technology of China filed Critical University of Electronic Science and Technology of China
Priority to CN201811322088.3A priority Critical patent/CN109474928B/en
Publication of CN109474928A publication Critical patent/CN109474928A/en
Application granted granted Critical
Publication of CN109474928B publication Critical patent/CN109474928B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/38Services specially adapted for particular environments, situations or purposes for collecting sensor information

Abstract

The invention discloses a kind of to realize that the true value of efficient secret protection finds method in mobile gunz sensory perceptual system, belongs to field of information security technology.The method of the invention effectively supports extensive true value discovery operation under ciphertext environment; guarantee the accuracy that user data weight updates, true value updates while providing strong security for user's sensing data; and solve the problems, such as that all users must be always maintained at presence in true value discovery procedure; tolerate that user is intentional or unintentional in calculating process to exit; furthermore; the present invention can effectively resist internal system attack, further protect the confidentiality of user's sensing data.

Description

Realize that the true value of efficient secret protection finds method in mobile gunz sensory perceptual system
Technical field
The invention belongs to field of information security technology, and in particular to a kind of realization in mobile gunz sensory perceptual system is efficiently hidden The true value of private protection finds method.
Background technique
With the depth integration of mobile communication and intelligent terminal technology, mobile gunz sensory perceptual system MCSS (Mobile Crowd Sensing System) a kind of new method for alleviating traffic congestion is provided, sensing number is collected by numerous mobile devices According to, and data are uploaded to Cloud Server and carry out detailed flow analysis.For example, what driver can obtain slave mobile device Traffic data is transmitted to Cloud Server, and Cloud Server obtains current condition of road surface by analyzing traffic data, and analysis is tied Fruit feeds back to driver or associated mechanisms.MCSS has been widely used in extensive vehicle sensory comprising traffic monitoring (example Such as collect average speed or traffic density), real-time traffic prediction, this for our daily life bring it is huge society and Economic benefit.
However, the data that mobile subscriber collects are not always reliably, because sensing frequent occurrence in data-gathering process Device damage, quality of hardware the problems such as in addition different user to the observation of same target may also difference it is very big.A kind of solution party Case is sensing data of all users of simple aggregation to the same observation object, but since the reliability of each user is equal , it may cause the uncertainty of final result in this way, in order to cope with this challenge, true value discovery mechanism is suggested.True value hair The value (referred to as estimated value) closest to true value is now estimated according to the reliability of user (referred to as weight) and input, is received The extensive concern of industry and academia.The standard of most of true value discovery methods is, if the data weighting of user is (i.e. reliable Property) higher, the data of the user are closer to true value, and influence of the data of the user to polymerization result is bigger.
True value discovery mechanism has been widely used for improving the accuracy polymerizeing in MCSS.However, privacy (such as the body of user Part information, telephone number and personal health state etc.) it is possibly comprised in the data of collection, if user submits their sensing Data then may be abused or be revealed by Cloud Server.In addition, some users may attempt to cheat cloud by providing false data Server further hinders the smooth implementation of true value discovery.
Currently, the existing true value discovery research based on MCSS is had the disadvantage that and 1) is realized using homomorphic cryptography technology Data aggregate operation under ciphertext environment, greatly increases the computing cost of server end;2) two server mechanism is used, net is reduced Network communication overhead, but internal system attack can not be resisted;3) all users are required to and remain presence, otherwise true value is sent out Existing process will fail, but in real life, the users such as unreliable, device powers down of generally existing network can not upload data in time Situation, therefore actual true value discovery method must tolerate that each calculation stages user is intentional or unintentional in true value discovery procedure It exits.
Summary of the invention
The purpose of the present invention is overcoming the defect of the above-mentioned prior art, one kind is provided and is realized in mobile gunz sensory perceptual system The true value of efficient secret protection finds method.
Technical problem proposed by the invention solves in this way:
A kind of true value discovery method for realizing efficient secret protection in mobile gunz sensory perceptual system, comprising the following steps:
Step 1 system initialization: user is locally generated two public and private key pair using Diffie-Hellman technology, It is used separately as the key of authenticated encryption, the seed of pseudo-random generator, its public key information is sent to Cloud Server by user;Cloud Server detects online user's list, and active user's list and the public key information received are broadcasted;
Step 2 secret sharing: user detects broadcast data, selects random number, generates seed respectively using Shamir technology The sub-secret of private key and random number generates the exchange key of encryption key using Diffie-Hellman technology, and to all sons Secret carries out authenticated encryption, and encrypted result is sent to Cloud Server;Cloud Server detects online user's list, and initialization H is a Estimated value broadcasts active user's list, all sub-secrets received and H estimated value together;
Step 3 data encryption: user detects broadcast data, calculates separately its H sensor observation and H estimated value Distance and, adjust the distance and encrypted using double mask technology, and encrypted data are sent to Cloud Server;
The polymerization of step 4 ciphertext: Cloud Server detects online user's list, and selection meets the random number of particular requirement, will receive The encryption data arrived carries out aminated polyepichlorohydrin, denoise using Shamir technology to calculated ciphertext result and add at random number Reason, and active user's list and calculated result are broadcasted;
Step 5 weight updates: user reselects random number and carries out secret sharing in the way of step 2, by step 4 Calculated result with its observe data distance and logarithm carry out (H+1) wheel operation, update user data weight, utilize double masks Technology encrypts calculated result, and encrypted data are sent to Cloud Server;
Step 6 true value updates: Cloud Server detects online user's list, and the encryption data received is carried out aminated polyepichlorohydrin, Using Shamir technology to ciphertext result carry out denoising, decryption denoising after as a result, and update H estimated value, will update Estimated value afterwards is broadcasted;
User in step 7 set U, by interacting, executes step 1 to step 6, until meeting system with Cloud Server repeatedly The condition of convergence of system definition, obtains final H estimated valueI.e. closest to the value of true value.
The beneficial effects of the present invention are:
The true value of the present invention that efficient secret protection is realized in mobile gunz sensory perceptual system finds method, effectively Support that extensive true value finds operation under ciphertext environment, guarantees user data while providing strong security for user's sensing data The accuracy that weight updates, true value updates, and solve all users in true value discovery procedure and must be always maintained at presence Problem is tolerated that user is intentional or unintentional in calculating process and is exited, in addition, the present invention can effectively resist internal system attack, Further protect the confidentiality of user's sensing data.1) present invention, which has a characteristic that, realizes ciphertext ring using double mask technology Efficient aminated polyepichlorohydrin under border;2) confidentiality of double mask technology protection user's sensing data privacies is utilized;3) Diffie- is utilized Hellman and Shamir technology solves the problems, such as that all users must be always maintained at presence, tolerates user in calculating process In intentional or unintentional exit;4) guarantee user data weight more using double masks, Diffie-Hellman and Shamir technology Newly, the accuracy that true value updates;5) new random number is introduced in ciphertext polymerization stage, it is ensured that the confidentiality of intermediate result;6) sharp With authenticated encryption technology, it is ensured that the confidentiality and integrity of user data;7) internal system is effectively resisted using Shamir technology The confidentiality of user's sensing data is further protected in attack.
Detailed description of the invention
Fig. 1 is the system block diagram of the method for the invention;
Fig. 2 is the execution flow chart of the method for the invention.
Specific embodiment
The present invention is further detailed with reference to the accompanying drawings and examples.
The present embodiment provides a kind of to realize that the true value of efficient secret protection finds method in mobile gunz sensory perceptual system, this For the system block diagram of invention as shown in Figure 1, each user possesses multiple mobile devices, each mobile device collects different sensing numbers According to user and Cloud Server are safe and effective using true value provided by the invention discovery method realization user data weight, estimated value Ground updates, and execution flow chart of the invention is as shown in Figure 2, comprising the following steps:
Step 1. system initialization: user is locally generated two public and private key pair using Diffie-Hellman technology, Its public key information is sent to Cloud Server by the seed of its key for being used separately as authenticated encryption, pseudo-random generator, user; Cloud Server detects online user's list, and active user's list and the public key information received are broadcasted.System initialization, tool Body the following steps are included:
Step 1.1 user d (d ∈ U) is locally generated two public and private key pair using Diffie-Hellman technologyWherein DH.gen is code key generating function, and k is code key length, and U indicates packet List containing all users,WithIndicate the public key information of user d,WithIndicate the private key information of user d,Key as authenticated encryption AE,Seed as pseudo-random generator PRG;
Step 1.2 user d (d ∈ U) is by its public key informationIt is sent to Cloud Server;
It is U that step 1.3 Cloud Server, which detects active user's list,1(|U1| >=t, U1∈ U), wherein t indicates online user number Lowest threshold, | U1| indicate U1The quantity of middle user, Cloud Server is to U1In total user broadcast its public key information receivedWherein miIndicate U1In any user, 1≤i≤| U1|,WithFor user miPublic key letter Breath;If Cloud Server detects active user's list | U1| < t then abandons its received data.
Step 2. secret sharing: user detects broadcast data, selects random number, generates seed respectively using Shamir technology The sub-secret of private key and random number generates the exchange key of encryption key using Diffie-Hellman technology, and to all sons Secret carries out authenticated encryption, and encrypted result is sent to Cloud Server;Cloud Server detects online user's list, and initialization H is a Estimated value broadcasts active user's list, all sub-secrets received and H estimated value together.Secret sharing, specifically The following steps are included:
Step 2.1 user d (d ∈ U1) detection | U1| whether it is more than or equal to t, its received public key information whether all difference, if There is one to be unsatisfactory in two conditions, user d (d ∈ U1) abandon its received data;If two conditions are all satisfied, step is executed 2.2-2.6;
Step 2.2 user d (d ∈ U1) selection random number nd, and private key is generated using Shamir technologyWith random number nd Sub-secret:
Wherein,Indicate the private key of user dTo user mjThe sub-secret of generation,Indicate the random number of user d ndTo user mjThe sub-secret of generation, 1≤j≤| U1| and mj≠ d, Shamir.share are Secret Sharing Function;
Step 2.3 user d (d ∈ U1) calculateDH.agree is code key exchange Function,Indicate the private key of user dWith user mjPublic keyExchange after the calculating of Diffie-Hellman technology Key, willKey as authenticated encryption;
Step 2.4 user d (d ∈ U1) encrypted using all sub-secrets of the authenticated encryption technology to generation:
Wherein,Indicate user d to user mjThe sub-secret of generationAuthenticated encryption The ciphertext value exported afterwards, AE.enc are authenticated encryption function, | | it is connector;
Step 2.5 user d (d ∈ U1) will | U1| -1 ciphertext valueIt is sent to Cloud Server;
It is U that step 2.6 Cloud Server, which detects active user's list,2(|U2| >=t, U2∈U1), Cloud Server initializes H Estimated valueWhereinIndicate the estimated value of h-th of target in user sensor data, Cloud Server is to U2 In total user broadcast its ciphertext receivedWith H estimated value If Cloud Server detects active user's list | U2| < t then abandons its received data.
Step 3. data encryption: user detects broadcast data, calculates separately its H sensor observation and H estimated value Distance and, adjust the distance and encrypted using double mask technology, and encrypted data are sent to Cloud Server.Data add It is close, specifically includes the following steps:
Step 3.1 user d (d ∈ U2) detection | U2| whether it is more than or equal to t, if meeting | U2| >=t executes step 3.2- 3.5;Otherwise, user d (d ∈ U2) abandon its received data;
Step 3.2 user d (d ∈ U2) calculate Indicate the private key of user dWith user mjPublic keyExchange key after the calculating of Diffie-Hellman technology, willAs pseudo-random generation The seed of device PRG;
Step 3.3 user d (d ∈ U2) calculateWhereinIndicate its H biography Sensor observationWith H estimated valueDistance and;
Step 3.4 user d (d ∈ U2) encrypted using double mask technology
Wherein,It indicatesEncrypted ciphertext value, PRG are pseudo-random generation function, and R is k Big primes, and mod is Modulus;
Step 3.5 user d (d ∈ U2) willIt is sent to Cloud Server.
The polymerization of step 4. ciphertext: Cloud Server detects online user's list, and selection meets the random number of particular requirement, will receive The encryption data arrived carries out aminated polyepichlorohydrin, denoise using Shamir technology to calculated ciphertext result and add at random number Reason, and active user's list and calculated result are broadcasted.Ciphertext polymerization, specifically includes the following steps:
It is U that step 4.1 Cloud Server, which detects active user's list,3(|U3| >=t, U3∈U2), if | U3| < t, Cloud Server Abandon its received data;
Step 4.2 Cloud Server selects random number r, r to need to meetWherein, max expression is asked most Big value,ωdIt is the data weighting of user d, codomain range is preset by system, Cloud Server is from U3Middle selection user list U4(|U4| >=t, U4∈U3);
Step 4.3 Cloud Server is to U4In total user request U3In user its random number sub-secret
Step 4.4 user d (d ∈ U4) request that Cloud Server is sent is received, it decrypts
Wherein AE.dec is certification decryption function, user d (d ∈ U4) by sub-secretIt is sent to Cloud Server;
Step 4.5 Cloud Server receives the data that at least t user returns, and recovers U using Shamir technology3In use The random number at familyShamir.recon is secret reconstruction function;
Step 4.6 Cloud Server is to U4In total user request U2\U3The private key information of middle user Wherein U2\U3Indicate the data encryption stage user offline to ciphertext polymerization stage;
Step 4.7 user d (d ∈ U4) request that Cloud Server is sent is received, it willIt is sent to cloud service Device;
Step 4.8 Cloud Server receives the data that at least t user returns, and recovers offline user using Shamir technology Private keyAnd it is calculated using Diffie-Hellman technology
Step 4.9 Cloud Server is to received ciphertextAminated polyepichlorohydrin is carried out, while carrying out denoising:
Step 4.10 Cloud Server calculatesAnd to U3In total user it is wide Broadcast ciphertext polymerization result Cresult, Log is logarithmic function.
Step 5. weight updates: user reselects random number and carries out secret sharing by step 2, by the calculating of step 4 As a result with its sensing data distance and logarithm carry out (H+1) take turns operation, update user data weight, utilize double mask technology Calculated result is encrypted, and encrypted data are sent to Cloud Server.Weight updates, specifically includes the following steps:
Step 5.1 user d (d ∈ U3) reselect random number n 'd, n ' is generated using Shamir technologydSub-secret:
WhereinIndicate the random number n ' of user ddTo user mjThe sub-secret of generation;
Step 5.2 user d (d ∈ U3) encrypted using all sub-secrets of the authenticated encryption technology to generation:
Wherein,Indicate user d to user mjThe sub-secret of generationIt is defeated after authenticated encryption Ciphertext value out;
Step 5.3 user d (d ∈ U3) will | U3| -1 ciphertext valueIt is sent to Cloud Server;
Step 5.4 Cloud Server is to U3In total user broadcast its ciphertext received
Step 5.5 user d (d ∈ U3) update weight:
Wherein, ω 'dIndicate user d (d ∈ U3) updated plus weighted value of making an uproar;
Step 5.6 user d (d ∈ U3) calculated using double mask technology:
Wherein y 'dIndicate user d (d ∈ U3) data weighting ω 'dUtilize the encrypted ciphertext value of double mask technology;
Step 5.7 user d (d ∈ U3) utilize double mask technology to each of which sensor observationMeter It calculates:
WhereinIndicate the sensor observation of user dWith weights omega after update 'dProduct utilize Double encrypted ciphertext values of mask technology;
Step 5.8 user is by ciphertextIt is sent to Cloud Server.
Step 6. true value updates: Cloud Server detects online user's list, and the encryption data received is carried out aminated polyepichlorohydrin, Using Shamir technology to ciphertext result carry out denoising, decryption denoising after as a result, and update H estimated value, will update Estimated value afterwards is broadcasted.True value updates, specifically includes the following steps:
It is U that step 6.1 Cloud Server, which detects active user's list,5(|U5| >=t, U5∈U3), and from U5Middle random selection is used Family list U6(|U6| >=t, U6∈U5);If Cloud Server detects active user's list | U5| < t, Cloud Server abandon its reception Data;
Step 6.2 Cloud Server is to U6In total user request U5In user its random number sub-secret
Step 6.3 user d (d ∈ U6) request that Cloud Server is sent is received, it decrypts
User d (d ∈ U6) by sub-secretIt is sent to Cloud Server;
Step 6.4 Cloud Server receives the data that at least t user returns, and recovers U using Shamir technology5In use The random number at family
Step 6.5 Cloud Server is to U6In total user request U3\U5The private key information of middle user Wherein U3\U5Indicate the weight more new stage user offline to the true value more new stage;
Step 6.6 user d (d ∈ U6) request that Cloud Server is sent is received, it willIt is sent to cloud service Device;
Step 6.7 Cloud Server receives the data that at least t user returns, and recovers offline user using Shamir technology Private keyAnd it is calculated using Diffie-Hellman technology
Step 6.8 Cloud Server is to received ciphertextInAminated polyepichlorohydrin is carried out, Carry out denoising simultaneously:
Step 6.9 Cloud Server is to received ciphertextInGathered It closes operation and carries out denoising simultaneously, to eachHave:
The result of step 6.10 Cloud Server decryption step 6.8-6.9:
It is rightHave:
It is rightHave:
Step 6.11 Cloud Server updates H estimated value
All users of step 6.12 Cloud Server into system broadcast H updated estimated values
User in step 7 set U, by interacting, executes step 1 to step 6, until meeting system with Cloud Server repeatedly The condition of convergence of system definition, obtains final H estimated valueI.e. closest to the value of true value.

Claims (7)

1. a kind of true value for realizing efficient secret protection in mobile gunz sensory perceptual system finds method, which is characterized in that including Following steps:
Step 1 system initialization: user is locally generated two public and private key pair using Diffie-Hellman technology, difference Its public key information is sent to Cloud Server by the seed of key, pseudo-random generator as authenticated encryption, user;Cloud service Device detects online user's list, and active user's list and the public key information received are broadcasted;
Step 2 secret sharing: user detects broadcast data, selects random number, generates seed private key respectively using Shamir technology With the sub-secret of random number, the exchange key of encryption key is generated using Diffie-Hellman technology, and to all sub-secrets Authenticated encryption is carried out, encrypted result is sent to Cloud Server;Cloud Server detects online user's list, initializes H estimation Value, active user's list, all sub-secrets received and H estimated value are broadcasted together;
Step 3 data encryption: user detects broadcast data, calculates separately its H sensor observation at a distance from H estimated value With adjust the distance and encrypted using double mask technology, and encrypted data are sent to Cloud Server;
The polymerization of step 4 ciphertext: Cloud Server detects online user's list, and selection meets the random number of particular requirement, by what is received Encryption data carries out aminated polyepichlorohydrin, carries out denoising and adding random number process using Shamir technology to calculated ciphertext result, And active user's list and calculated result are broadcasted;
Step 5 weight updates: user reselects random number and carries out secret sharing in the way of step 2, by the calculating of step 4 As a result with its observe data distance and logarithm carry out (H+1) wheel operation, update user data weight, utilize double mask technology Calculated result is encrypted, and encrypted data are sent to Cloud Server;
Step 6 true value updates: Cloud Server detects online user's list, and the encryption data received is carried out aminated polyepichlorohydrin, is utilized Shamir technology to ciphertext result carry out denoising, decryption denoising after as a result, and update H estimated value, will be updated Estimated value is broadcasted;
User in step 7 set U, by interacting, executes step 1 to step 6, until it is fixed to meet system with Cloud Server repeatedly The condition of convergence of justice, obtains final H estimated valueI.e. closest to the value of true value.
2. the true value according to claim 1 that efficient secret protection is realized in mobile gunz sensory perceptual system finds method, It is characterized in that, the detailed process of step 1 are as follows:
Step 1.1 user d (d ∈ U) is locally generated two public and private key pair using Diffie-Hellman technology
Wherein DH.gen is code key generating function, and k is code key length, and U is indicated List comprising all users,WithIndicate the public key information of user d,WithIndicate the private key information of user d,Key as authenticated encryption AE,Seed as pseudo-random generator PRG;
Step 1.2 user d (d ∈ U) is by its public key informationIt is sent to Cloud Server;
It is U that step 1.3 Cloud Server, which detects active user's list,1(|U1| >=t, U1∈ U), wherein t indicates online user number most Low threshold, | U1| indicate U1The quantity of middle user, Cloud Server is to U1In total user broadcast its public key information receivedWherein miIndicate U1In any user, 1≤i≤| U1|,WithFor user miPublic key Information;If Cloud Server detects active user's list | U1| < t then abandons its received data.
3. the true value according to claim 2 that efficient secret protection is realized in mobile gunz sensory perceptual system finds method, It is characterized in that, the detailed process of step 2 are as follows:
Step 2.1 user d (d ∈ U1) detection | U1| whether it is more than or equal to t, its received public key information whether all difference, if two There is one to be unsatisfactory in condition, user d (d ∈ U1) abandon its received data;If two conditions are all satisfied, step 2.2- is executed 2.6;
Step 2.2 user d (d ∈ U1) selection random number nd, and private key is generated using Shamir technologyWith random number ndSon It is secret:
Wherein,Indicate the private key of user dTo user mjThe sub-secret of generation,Indicate the random number n of user ddIt is right User mjThe sub-secret of generation, 1≤j≤| U1| and mj≠ d, Shamir.share are Secret Sharing Function;
Step 2.3 user d (d ∈ U1) calculateDH.agree is that code key exchanges letter Number,Indicate the private key of user dWith user mjPublic keyExchange after the calculating of Diffie-Hellman technology Key, willKey as authenticated encryption;
Step 2.4 user d (d ∈ U1) encrypted using all sub-secrets of the authenticated encryption technology to generation:
Wherein,Indicate user d to user mjThe sub-secret of generationIt is defeated after authenticated encryption Ciphertext value out, AE.enc are authenticated encryption function, | | it is connector;
Step 2.5 user d (d ∈ U1) will | U1| -1 ciphertext valueIt is sent to Cloud Server;
It is U that step 2.6 Cloud Server, which detects active user's list,2(|U2| >=t, U2∈U1), Cloud Server initializes H estimated valueWhereinIndicate the estimated value of h-th of target in user sensor data, Cloud Server is to U2In it is complete Body user broadcasts its ciphertext receivedWith H estimated valueIf cloud takes Business device detects active user's list | U2| < t then abandons its received data.
4. the true value according to claim 3 that efficient secret protection is realized in mobile gunz sensory perceptual system finds method, It is characterized in that, the detailed process of step 3 are as follows:
Step 3.1 user d (d ∈ U2) detection | U2| whether it is more than or equal to t, if meeting | U2| >=t executes step 3.2-3.5;It is no Then, user d (d ∈ U2) abandon its received data;
Step 3.2 user d (d ∈ U2) calculate Indicate the private key of user d With user mjPublic keyExchange key after the calculating of Diffie-Hellman technology, willAs pseudo-random generator The seed of PRG;
Step 3.3 user d (d ∈ U2) calculateWhereinIndicate its H sensor ObservationWith H estimated valueDistance and;
Step 3.4 user d (d ∈ U2) encrypted using double mask technology
Wherein,It indicatesEncrypted ciphertext value, PRG are pseudo-random generation function, and R is k Big primes, and mod is modulus;
Step 3.5 user d (d ∈ U2) willIt is sent to Cloud Server.
5. the true value according to claim 4 that efficient secret protection is realized in mobile gunz sensory perceptual system finds method, It is characterized in that, the detailed process of step 4 are as follows:
It is U that step 4.1 Cloud Server, which detects active user's list,3(|U3| >=t, U3∈U2), if | U3| < t, Cloud Server abandon Its received data;
Step 4.2 Cloud Server selects random number r, r to need to meetWherein, max indicates maximizing,ωdIt is the data weighting of user d, codomain range is preset by system, cloud service Device is from U3Middle selection user list U4(|U4| >=t, U4∈U3);
Step 4.3 Cloud Server is to U4In total user request U3In user its random number sub-secret
Step 4.4 user d (d ∈ U4) request that Cloud Server is sent is received, it decrypts
Wherein AE.dec is certification decryption function, user d (d ∈ U4) by sub-secretIt is sent to Cloud Server;
Step 4.5 Cloud Server receives the data that at least t user returns, and recovers U using Shamir technology3In user Random numberShamir.recon is secret reconstruction function;
Step 4.6 Cloud Server is to U4In total user request U2\U3The private key information of middle user Wherein U2\U3Indicate the data encryption stage user offline to ciphertext polymerization stage;
Step 4.7 user d (d ∈ U4) request that Cloud Server is sent is received, it willIt is sent to Cloud Server;
Step 4.8 Cloud Server receives the data that at least t user returns, and recovers offline user private key using Shamir technology
And it is calculated using Diffie-Hellman technology
Step 4.9 Cloud Server is to received ciphertextAminated polyepichlorohydrin is carried out, while carrying out denoising:
Step 4.10 Cloud Server calculatesAnd to U3In total user broadcast it is close Literary polymerization result Cresult, Log is logarithmic function.
6. the true value according to claim 5 that efficient secret protection is realized in mobile gunz sensory perceptual system finds method, It is characterized in that, the detailed process of step 5 are as follows:
Step 5.1 user d (d ∈ U3) reselect random number n 'd, n ' is generated using Shamir technologydSub-secret:
WhereinIndicate the random number n ' of user ddTo user mjThe sub-secret of generation;
Step 5.2 user d (d ∈ U3) encrypted using all sub-secrets of the authenticated encryption technology to generation:
Wherein,Indicate user d to user mjThe sub-secret of generationIt is exported after authenticated encryption Ciphertext value;
Step 5.3 user d (d ∈ U3) will | U3| -1 ciphertext valueIt is sent to Cloud Server;
Step 5.4 Cloud Server is to U3In total user broadcast its ciphertext received
Step 5.5 user d (d ∈ U3) update weight:
Wherein, ω 'dIndicate user d (d ∈ U3) updated plus weighted value of making an uproar;
Step 5.6 user d (d ∈ U3) calculated using double mask technology:
Wherein y 'dIndicate user d (d ∈ U3) data weighting ω 'dUtilize the encrypted ciphertext value of double mask technology;
Step 5.7 user d (d ∈ U3) utilize double mask technology to each of which sensor observationIt calculates:
WhereinIndicate the sensor observation of user dWith weights omega after update 'dProduct covered using double Ciphertext value after code technology secrecy;
Step 5.8 user is by ciphertextIt is sent to Cloud Server.
7. the true value according to claim 6 that efficient secret protection is realized in mobile gunz sensory perceptual system finds method, It is characterized in that, the detailed process of step 6 are as follows:
It is U that step 6.1 Cloud Server, which detects active user's list,5(|U5| >=t, U5∈U3), and from U5Middle random selection user column Table U6(|U6| >=t, U6∈U5);If Cloud Server detects active user's list | U5| < t, Cloud Server abandon its received number According to;
Step 6.2 Cloud Server is to U6In total user request U5In user its random number sub-secret
Step 6.3 user d (d ∈ U6) request that Cloud Server is sent is received, it decrypts
User d (d ∈ U6) by sub-secretIt is sent to Cloud Server;
Step 6.4 Cloud Server receives the data that at least t user returns, and recovers U using Shamir technology5In user Random number
Step 6.5 Cloud Server is to U6In total user request U3\U5The private key information of middle user Wherein U3\U5Indicate the weight more new stage user offline to the true value more new stage;
Step 6.6 user d (d ∈ U6) request that Cloud Server is sent is received, it willIt is sent to Cloud Server;
Step 6.7 Cloud Server receives the data that at least t user returns, and recovers offline user private key using Shamir technology
And it is calculated using Diffie-Hellman technology
Step 6.8 Cloud Server is to received ciphertextInAminated polyepichlorohydrin is carried out, simultaneously Carry out denoising:
Step 6.9 Cloud Server is to received ciphertextInCarry out polymerization fortune It calculates while carrying out denoising, to eachHave:
The result of step 6.10 Cloud Server decryption step 6.8-6.9:
It is rightHave:
It is rightHave:
Step 6.11 Cloud Server updates H estimated value
All users of step 6.12 Cloud Server into system broadcast H updated estimated values
CN201811322088.3A 2018-11-07 2018-11-07 Truth value discovery method for realizing efficient privacy protection in mobile crowd sensing system Active CN109474928B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811322088.3A CN109474928B (en) 2018-11-07 2018-11-07 Truth value discovery method for realizing efficient privacy protection in mobile crowd sensing system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811322088.3A CN109474928B (en) 2018-11-07 2018-11-07 Truth value discovery method for realizing efficient privacy protection in mobile crowd sensing system

Publications (2)

Publication Number Publication Date
CN109474928A true CN109474928A (en) 2019-03-15
CN109474928B CN109474928B (en) 2020-06-16

Family

ID=65671743

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811322088.3A Active CN109474928B (en) 2018-11-07 2018-11-07 Truth value discovery method for realizing efficient privacy protection in mobile crowd sensing system

Country Status (1)

Country Link
CN (1) CN109474928B (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110198216A (en) * 2019-07-10 2019-09-03 安徽大学 A kind of increment true value discovery method, apparatus, computer equipment and storage medium for protecting privacy
CN110300183A (en) * 2019-07-09 2019-10-01 佳源科技有限公司 A kind of intelligence edge Internet of Things agent apparatus
CN110730064A (en) * 2019-09-24 2020-01-24 徐州工业职业技术学院 Data fusion method based on privacy protection in crowd sensing network
CN111585990A (en) * 2020-04-26 2020-08-25 安徽师范大学 Mobile crowd sensing privacy protection truth value discovery method based on safety summation
CN111740959A (en) * 2020-05-25 2020-10-02 电子科技大学 Verifiable privacy protection method in mobile crowd sensing system
CN112104609A (en) * 2020-08-20 2020-12-18 电子科技大学 Method for verifiable privacy-aware true phase discovery in a mobile crowd-sourcing awareness system
CN112651505A (en) * 2020-12-18 2021-04-13 广州大学 Truth value discovery method and system for knowledge verification
CN113407991A (en) * 2021-06-10 2021-09-17 交通银行股份有限公司 Private data two-party security comparison method based on trusted third party
CN113783683A (en) * 2021-11-12 2021-12-10 晨越建设项目管理集团股份有限公司 Cloud platform privacy protection verifiable data aggregation method based on sensor network
CN114915458A (en) * 2022-04-27 2022-08-16 安徽超清科技股份有限公司 Comprehensive monitoring protector for urban rail transit

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103297503A (en) * 2013-05-08 2013-09-11 南京邮电大学 Mobile terminal swarm intelligent perception structure based on layered information extraction server
CN105245345A (en) * 2015-09-28 2016-01-13 浙江工商大学 High reliability perception data collection algorithm based on mobile perception user anonymity reputation in crowd sensing
CN105407482A (en) * 2015-11-04 2016-03-16 上海交通大学 Protection method for user location privacy in mobile crowd sensing network
US20160219053A1 (en) * 2015-01-27 2016-07-28 Danzhi Cai Intelligent terminal and interactive control system and interactive control method using same
CN106131139A (en) * 2016-06-23 2016-11-16 暨南大学 The encryption of the floating data of a kind of cloud relational database and querying method
US20170215034A1 (en) * 2016-01-22 2017-07-27 Government Of The United States As Represetned By The Secretary Of The Air Force Object detection and tracking system
CN107437990A (en) * 2017-09-14 2017-12-05 山东浪潮通软信息科技有限公司 Encryption method, decryption method, encryption device and decryption device
CN108494760A (en) * 2018-03-14 2018-09-04 安徽大学 A kind of intelligent perception true value discovery method of protection privacy

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103297503A (en) * 2013-05-08 2013-09-11 南京邮电大学 Mobile terminal swarm intelligent perception structure based on layered information extraction server
US20160219053A1 (en) * 2015-01-27 2016-07-28 Danzhi Cai Intelligent terminal and interactive control system and interactive control method using same
CN105245345A (en) * 2015-09-28 2016-01-13 浙江工商大学 High reliability perception data collection algorithm based on mobile perception user anonymity reputation in crowd sensing
CN105407482A (en) * 2015-11-04 2016-03-16 上海交通大学 Protection method for user location privacy in mobile crowd sensing network
US20170215034A1 (en) * 2016-01-22 2017-07-27 Government Of The United States As Represetned By The Secretary Of The Air Force Object detection and tracking system
CN106131139A (en) * 2016-06-23 2016-11-16 暨南大学 The encryption of the floating data of a kind of cloud relational database and querying method
CN107437990A (en) * 2017-09-14 2017-12-05 山东浪潮通软信息科技有限公司 Encryption method, decryption method, encryption device and decryption device
CN108494760A (en) * 2018-03-14 2018-09-04 安徽大学 A kind of intelligent perception true value discovery method of protection privacy

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110300183A (en) * 2019-07-09 2019-10-01 佳源科技有限公司 A kind of intelligence edge Internet of Things agent apparatus
CN110300183B (en) * 2019-07-09 2020-07-17 佳源科技有限公司 Intelligent edge Internet of things agent device
CN110198216B (en) * 2019-07-10 2022-03-04 安徽大学 Incremental truth value discovery method and device for protecting privacy, computer equipment and storage medium
CN110198216A (en) * 2019-07-10 2019-09-03 安徽大学 A kind of increment true value discovery method, apparatus, computer equipment and storage medium for protecting privacy
CN110730064A (en) * 2019-09-24 2020-01-24 徐州工业职业技术学院 Data fusion method based on privacy protection in crowd sensing network
CN110730064B (en) * 2019-09-24 2023-02-07 徐州工业职业技术学院 Data fusion method based on privacy protection in crowd sensing network
CN111585990A (en) * 2020-04-26 2020-08-25 安徽师范大学 Mobile crowd sensing privacy protection truth value discovery method based on safety summation
CN111585990B (en) * 2020-04-26 2022-04-15 安徽师范大学 Mobile crowd sensing privacy protection truth value discovery method based on safety summation
CN111740959A (en) * 2020-05-25 2020-10-02 电子科技大学 Verifiable privacy protection method in mobile crowd sensing system
CN112104609B (en) * 2020-08-20 2021-12-03 电子科技大学 Method for verifiable privacy-aware truth discovery in mobile crowd-sourcing awareness systems
CN112104609A (en) * 2020-08-20 2020-12-18 电子科技大学 Method for verifiable privacy-aware true phase discovery in a mobile crowd-sourcing awareness system
CN112651505A (en) * 2020-12-18 2021-04-13 广州大学 Truth value discovery method and system for knowledge verification
CN112651505B (en) * 2020-12-18 2022-01-14 广州大学 Truth value discovery method and system for knowledge verification
CN113407991A (en) * 2021-06-10 2021-09-17 交通银行股份有限公司 Private data two-party security comparison method based on trusted third party
CN113783683A (en) * 2021-11-12 2021-12-10 晨越建设项目管理集团股份有限公司 Cloud platform privacy protection verifiable data aggregation method based on sensor network
CN114915458A (en) * 2022-04-27 2022-08-16 安徽超清科技股份有限公司 Comprehensive monitoring protector for urban rail transit
CN114915458B (en) * 2022-04-27 2023-08-29 安徽超清科技股份有限公司 Urban rail transit is with synthesizing monitoring protector

Also Published As

Publication number Publication date
CN109474928B (en) 2020-06-16

Similar Documents

Publication Publication Date Title
CN109474928A (en) Realize that the true value of efficient secret protection finds method in mobile gunz sensory perceptual system
Fereidooni et al. Safelearn: Secure aggregation for private federated learning
CN108717514B (en) Data privacy protection method and system in machine learning
CN107257381B (en) Task allocation system model for privacy protection space crowdsourcing and implementation method
CN105812128B (en) A kind of anti-malicious data of intelligent grid excavates the data aggregation method of attack
CN111563265A (en) Distributed deep learning method based on privacy protection
CN111275202A (en) Machine learning prediction method and system for data privacy protection
CN105187425B (en) Facing cloud calculus communication system safety without certificate thresholding decryption method
CN114866222B (en) Ciphertext data statistical analysis system and method supporting privacy protection
CN108632261A (en) Multi-party quantum summation method and system
CN111585990B (en) Mobile crowd sensing privacy protection truth value discovery method based on safety summation
CN109347829A (en) A kind of intelligent perception network true value discovery method based on secret protection
CN109858269A (en) A kind of secret protection density peak clustering method based on homomorphic cryptography
CN112597542B (en) Aggregation method and device of target asset data, storage medium and electronic device
CN111581648B (en) Method of federal learning to preserve privacy in irregular users
Tang et al. Achieve privacy-preserving truth discovery in crowdsensing systems
CN116011014A (en) Privacy computing method and privacy computing system
CN117034338A (en) Distributed travel data calculation method based on privacy protection
CN110598427B (en) Data processing method, system and storage medium
Li et al. Perturbation-based private profile matching in social networks
CN116865938A (en) Multi-server federation learning method based on secret sharing and homomorphic encryption
Wang et al. Secure content sharing protocol for D2D users based on profile matching in social networks
Neupane et al. A novel Modified Chaotic Simplified Advanced Encryption System (MCS-AES): mixed reality for a secure surgical tele-presence
CN102355375B (en) Distributed abnormal flow detection method with privacy protection function and system
CN116681141A (en) Federal learning method, terminal and storage medium for privacy protection

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant