CN109474928A - Realize that the true value of efficient secret protection finds method in mobile gunz sensory perceptual system - Google Patents
Realize that the true value of efficient secret protection finds method in mobile gunz sensory perceptual system Download PDFInfo
- Publication number
- CN109474928A CN109474928A CN201811322088.3A CN201811322088A CN109474928A CN 109474928 A CN109474928 A CN 109474928A CN 201811322088 A CN201811322088 A CN 201811322088A CN 109474928 A CN109474928 A CN 109474928A
- Authority
- CN
- China
- Prior art keywords
- user
- cloud server
- technology
- data
- secret
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/30—Services specially adapted for particular environments, situations or purposes
- H04W4/38—Services specially adapted for particular environments, situations or purposes for collecting sensor information
Abstract
The invention discloses a kind of to realize that the true value of efficient secret protection finds method in mobile gunz sensory perceptual system, belongs to field of information security technology.The method of the invention effectively supports extensive true value discovery operation under ciphertext environment; guarantee the accuracy that user data weight updates, true value updates while providing strong security for user's sensing data; and solve the problems, such as that all users must be always maintained at presence in true value discovery procedure; tolerate that user is intentional or unintentional in calculating process to exit; furthermore; the present invention can effectively resist internal system attack, further protect the confidentiality of user's sensing data.
Description
Technical field
The invention belongs to field of information security technology, and in particular to a kind of realization in mobile gunz sensory perceptual system is efficiently hidden
The true value of private protection finds method.
Background technique
With the depth integration of mobile communication and intelligent terminal technology, mobile gunz sensory perceptual system MCSS (Mobile
Crowd Sensing System) a kind of new method for alleviating traffic congestion is provided, sensing number is collected by numerous mobile devices
According to, and data are uploaded to Cloud Server and carry out detailed flow analysis.For example, what driver can obtain slave mobile device
Traffic data is transmitted to Cloud Server, and Cloud Server obtains current condition of road surface by analyzing traffic data, and analysis is tied
Fruit feeds back to driver or associated mechanisms.MCSS has been widely used in extensive vehicle sensory comprising traffic monitoring (example
Such as collect average speed or traffic density), real-time traffic prediction, this for our daily life bring it is huge society and
Economic benefit.
However, the data that mobile subscriber collects are not always reliably, because sensing frequent occurrence in data-gathering process
Device damage, quality of hardware the problems such as in addition different user to the observation of same target may also difference it is very big.A kind of solution party
Case is sensing data of all users of simple aggregation to the same observation object, but since the reliability of each user is equal
, it may cause the uncertainty of final result in this way, in order to cope with this challenge, true value discovery mechanism is suggested.True value hair
The value (referred to as estimated value) closest to true value is now estimated according to the reliability of user (referred to as weight) and input, is received
The extensive concern of industry and academia.The standard of most of true value discovery methods is, if the data weighting of user is (i.e. reliable
Property) higher, the data of the user are closer to true value, and influence of the data of the user to polymerization result is bigger.
True value discovery mechanism has been widely used for improving the accuracy polymerizeing in MCSS.However, privacy (such as the body of user
Part information, telephone number and personal health state etc.) it is possibly comprised in the data of collection, if user submits their sensing
Data then may be abused or be revealed by Cloud Server.In addition, some users may attempt to cheat cloud by providing false data
Server further hinders the smooth implementation of true value discovery.
Currently, the existing true value discovery research based on MCSS is had the disadvantage that and 1) is realized using homomorphic cryptography technology
Data aggregate operation under ciphertext environment, greatly increases the computing cost of server end;2) two server mechanism is used, net is reduced
Network communication overhead, but internal system attack can not be resisted;3) all users are required to and remain presence, otherwise true value is sent out
Existing process will fail, but in real life, the users such as unreliable, device powers down of generally existing network can not upload data in time
Situation, therefore actual true value discovery method must tolerate that each calculation stages user is intentional or unintentional in true value discovery procedure
It exits.
Summary of the invention
The purpose of the present invention is overcoming the defect of the above-mentioned prior art, one kind is provided and is realized in mobile gunz sensory perceptual system
The true value of efficient secret protection finds method.
Technical problem proposed by the invention solves in this way:
A kind of true value discovery method for realizing efficient secret protection in mobile gunz sensory perceptual system, comprising the following steps:
Step 1 system initialization: user is locally generated two public and private key pair using Diffie-Hellman technology,
It is used separately as the key of authenticated encryption, the seed of pseudo-random generator, its public key information is sent to Cloud Server by user;Cloud
Server detects online user's list, and active user's list and the public key information received are broadcasted;
Step 2 secret sharing: user detects broadcast data, selects random number, generates seed respectively using Shamir technology
The sub-secret of private key and random number generates the exchange key of encryption key using Diffie-Hellman technology, and to all sons
Secret carries out authenticated encryption, and encrypted result is sent to Cloud Server;Cloud Server detects online user's list, and initialization H is a
Estimated value broadcasts active user's list, all sub-secrets received and H estimated value together;
Step 3 data encryption: user detects broadcast data, calculates separately its H sensor observation and H estimated value
Distance and, adjust the distance and encrypted using double mask technology, and encrypted data are sent to Cloud Server;
The polymerization of step 4 ciphertext: Cloud Server detects online user's list, and selection meets the random number of particular requirement, will receive
The encryption data arrived carries out aminated polyepichlorohydrin, denoise using Shamir technology to calculated ciphertext result and add at random number
Reason, and active user's list and calculated result are broadcasted;
Step 5 weight updates: user reselects random number and carries out secret sharing in the way of step 2, by step 4
Calculated result with its observe data distance and logarithm carry out (H+1) wheel operation, update user data weight, utilize double masks
Technology encrypts calculated result, and encrypted data are sent to Cloud Server;
Step 6 true value updates: Cloud Server detects online user's list, and the encryption data received is carried out aminated polyepichlorohydrin,
Using Shamir technology to ciphertext result carry out denoising, decryption denoising after as a result, and update H estimated value, will update
Estimated value afterwards is broadcasted;
User in step 7 set U, by interacting, executes step 1 to step 6, until meeting system with Cloud Server repeatedly
The condition of convergence of system definition, obtains final H estimated valueI.e. closest to the value of true value.
The beneficial effects of the present invention are:
The true value of the present invention that efficient secret protection is realized in mobile gunz sensory perceptual system finds method, effectively
Support that extensive true value finds operation under ciphertext environment, guarantees user data while providing strong security for user's sensing data
The accuracy that weight updates, true value updates, and solve all users in true value discovery procedure and must be always maintained at presence
Problem is tolerated that user is intentional or unintentional in calculating process and is exited, in addition, the present invention can effectively resist internal system attack,
Further protect the confidentiality of user's sensing data.1) present invention, which has a characteristic that, realizes ciphertext ring using double mask technology
Efficient aminated polyepichlorohydrin under border;2) confidentiality of double mask technology protection user's sensing data privacies is utilized;3) Diffie- is utilized
Hellman and Shamir technology solves the problems, such as that all users must be always maintained at presence, tolerates user in calculating process
In intentional or unintentional exit;4) guarantee user data weight more using double masks, Diffie-Hellman and Shamir technology
Newly, the accuracy that true value updates;5) new random number is introduced in ciphertext polymerization stage, it is ensured that the confidentiality of intermediate result;6) sharp
With authenticated encryption technology, it is ensured that the confidentiality and integrity of user data;7) internal system is effectively resisted using Shamir technology
The confidentiality of user's sensing data is further protected in attack.
Detailed description of the invention
Fig. 1 is the system block diagram of the method for the invention;
Fig. 2 is the execution flow chart of the method for the invention.
Specific embodiment
The present invention is further detailed with reference to the accompanying drawings and examples.
The present embodiment provides a kind of to realize that the true value of efficient secret protection finds method in mobile gunz sensory perceptual system, this
For the system block diagram of invention as shown in Figure 1, each user possesses multiple mobile devices, each mobile device collects different sensing numbers
According to user and Cloud Server are safe and effective using true value provided by the invention discovery method realization user data weight, estimated value
Ground updates, and execution flow chart of the invention is as shown in Figure 2, comprising the following steps:
Step 1. system initialization: user is locally generated two public and private key pair using Diffie-Hellman technology,
Its public key information is sent to Cloud Server by the seed of its key for being used separately as authenticated encryption, pseudo-random generator, user;
Cloud Server detects online user's list, and active user's list and the public key information received are broadcasted.System initialization, tool
Body the following steps are included:
Step 1.1 user d (d ∈ U) is locally generated two public and private key pair using Diffie-Hellman technologyWherein DH.gen is code key generating function, and k is code key length, and U indicates packet
List containing all users,WithIndicate the public key information of user d,WithIndicate the private key information of user d,Key as authenticated encryption AE,Seed as pseudo-random generator PRG;
Step 1.2 user d (d ∈ U) is by its public key informationIt is sent to Cloud Server;
It is U that step 1.3 Cloud Server, which detects active user's list,1(|U1| >=t, U1∈ U), wherein t indicates online user number
Lowest threshold, | U1| indicate U1The quantity of middle user, Cloud Server is to U1In total user broadcast its public key information receivedWherein miIndicate U1In any user, 1≤i≤| U1|,WithFor user miPublic key letter
Breath;If Cloud Server detects active user's list | U1| < t then abandons its received data.
Step 2. secret sharing: user detects broadcast data, selects random number, generates seed respectively using Shamir technology
The sub-secret of private key and random number generates the exchange key of encryption key using Diffie-Hellman technology, and to all sons
Secret carries out authenticated encryption, and encrypted result is sent to Cloud Server;Cloud Server detects online user's list, and initialization H is a
Estimated value broadcasts active user's list, all sub-secrets received and H estimated value together.Secret sharing, specifically
The following steps are included:
Step 2.1 user d (d ∈ U1) detection | U1| whether it is more than or equal to t, its received public key information whether all difference, if
There is one to be unsatisfactory in two conditions, user d (d ∈ U1) abandon its received data;If two conditions are all satisfied, step is executed
2.2-2.6;
Step 2.2 user d (d ∈ U1) selection random number nd, and private key is generated using Shamir technologyWith random number nd
Sub-secret:
Wherein,Indicate the private key of user dTo user mjThe sub-secret of generation,Indicate the random number of user d
ndTo user mjThe sub-secret of generation, 1≤j≤| U1| and mj≠ d, Shamir.share are Secret Sharing Function;
Step 2.3 user d (d ∈ U1) calculateDH.agree is code key exchange
Function,Indicate the private key of user dWith user mjPublic keyExchange after the calculating of Diffie-Hellman technology
Key, willKey as authenticated encryption;
Step 2.4 user d (d ∈ U1) encrypted using all sub-secrets of the authenticated encryption technology to generation:
Wherein,Indicate user d to user mjThe sub-secret of generationAuthenticated encryption
The ciphertext value exported afterwards, AE.enc are authenticated encryption function, | | it is connector;
Step 2.5 user d (d ∈ U1) will | U1| -1 ciphertext valueIt is sent to Cloud Server;
It is U that step 2.6 Cloud Server, which detects active user's list,2(|U2| >=t, U2∈U1), Cloud Server initializes H
Estimated valueWhereinIndicate the estimated value of h-th of target in user sensor data, Cloud Server is to U2
In total user broadcast its ciphertext receivedWith H estimated value
If Cloud Server detects active user's list | U2| < t then abandons its received data.
Step 3. data encryption: user detects broadcast data, calculates separately its H sensor observation and H estimated value
Distance and, adjust the distance and encrypted using double mask technology, and encrypted data are sent to Cloud Server.Data add
It is close, specifically includes the following steps:
Step 3.1 user d (d ∈ U2) detection | U2| whether it is more than or equal to t, if meeting | U2| >=t executes step 3.2-
3.5;Otherwise, user d (d ∈ U2) abandon its received data;
Step 3.2 user d (d ∈ U2) calculate Indicate the private key of user dWith user mjPublic keyExchange key after the calculating of Diffie-Hellman technology, willAs pseudo-random generation
The seed of device PRG;
Step 3.3 user d (d ∈ U2) calculateWhereinIndicate its H biography
Sensor observationWith H estimated valueDistance and;
Step 3.4 user d (d ∈ U2) encrypted using double mask technology
Wherein,It indicatesEncrypted ciphertext value, PRG are pseudo-random generation function, and R is k Big primes, and mod is
Modulus;
Step 3.5 user d (d ∈ U2) willIt is sent to Cloud Server.
The polymerization of step 4. ciphertext: Cloud Server detects online user's list, and selection meets the random number of particular requirement, will receive
The encryption data arrived carries out aminated polyepichlorohydrin, denoise using Shamir technology to calculated ciphertext result and add at random number
Reason, and active user's list and calculated result are broadcasted.Ciphertext polymerization, specifically includes the following steps:
It is U that step 4.1 Cloud Server, which detects active user's list,3(|U3| >=t, U3∈U2), if | U3| < t, Cloud Server
Abandon its received data;
Step 4.2 Cloud Server selects random number r, r to need to meetWherein, max expression is asked most
Big value,ωdIt is the data weighting of user d, codomain range is preset by system,
Cloud Server is from U3Middle selection user list U4(|U4| >=t, U4∈U3);
Step 4.3 Cloud Server is to U4In total user request U3In user its random number sub-secret
Step 4.4 user d (d ∈ U4) request that Cloud Server is sent is received, it decrypts
Wherein AE.dec is certification decryption function, user d (d ∈ U4) by sub-secretIt is sent to Cloud Server;
Step 4.5 Cloud Server receives the data that at least t user returns, and recovers U using Shamir technology3In use
The random number at familyShamir.recon is secret reconstruction function;
Step 4.6 Cloud Server is to U4In total user request U2\U3The private key information of middle user
Wherein U2\U3Indicate the data encryption stage user offline to ciphertext polymerization stage;
Step 4.7 user d (d ∈ U4) request that Cloud Server is sent is received, it willIt is sent to cloud service
Device;
Step 4.8 Cloud Server receives the data that at least t user returns, and recovers offline user using Shamir technology
Private keyAnd it is calculated using Diffie-Hellman technology
Step 4.9 Cloud Server is to received ciphertextAminated polyepichlorohydrin is carried out, while carrying out denoising:
Step 4.10 Cloud Server calculatesAnd to U3In total user it is wide
Broadcast ciphertext polymerization result Cresult, Log is logarithmic function.
Step 5. weight updates: user reselects random number and carries out secret sharing by step 2, by the calculating of step 4
As a result with its sensing data distance and logarithm carry out (H+1) take turns operation, update user data weight, utilize double mask technology
Calculated result is encrypted, and encrypted data are sent to Cloud Server.Weight updates, specifically includes the following steps:
Step 5.1 user d (d ∈ U3) reselect random number n 'd, n ' is generated using Shamir technologydSub-secret:
WhereinIndicate the random number n ' of user ddTo user mjThe sub-secret of generation;
Step 5.2 user d (d ∈ U3) encrypted using all sub-secrets of the authenticated encryption technology to generation:
Wherein,Indicate user d to user mjThe sub-secret of generationIt is defeated after authenticated encryption
Ciphertext value out;
Step 5.3 user d (d ∈ U3) will | U3| -1 ciphertext valueIt is sent to Cloud Server;
Step 5.4 Cloud Server is to U3In total user broadcast its ciphertext received
Step 5.5 user d (d ∈ U3) update weight:
Wherein, ω 'dIndicate user d (d ∈ U3) updated plus weighted value of making an uproar;
Step 5.6 user d (d ∈ U3) calculated using double mask technology:
Wherein y 'dIndicate user d (d ∈ U3) data weighting ω 'dUtilize the encrypted ciphertext value of double mask technology;
Step 5.7 user d (d ∈ U3) utilize double mask technology to each of which sensor observationMeter
It calculates:
WhereinIndicate the sensor observation of user dWith weights omega after update 'dProduct utilize
Double encrypted ciphertext values of mask technology;
Step 5.8 user is by ciphertextIt is sent to Cloud Server.
Step 6. true value updates: Cloud Server detects online user's list, and the encryption data received is carried out aminated polyepichlorohydrin,
Using Shamir technology to ciphertext result carry out denoising, decryption denoising after as a result, and update H estimated value, will update
Estimated value afterwards is broadcasted.True value updates, specifically includes the following steps:
It is U that step 6.1 Cloud Server, which detects active user's list,5(|U5| >=t, U5∈U3), and from U5Middle random selection is used
Family list U6(|U6| >=t, U6∈U5);If Cloud Server detects active user's list | U5| < t, Cloud Server abandon its reception
Data;
Step 6.2 Cloud Server is to U6In total user request U5In user its random number sub-secret
Step 6.3 user d (d ∈ U6) request that Cloud Server is sent is received, it decrypts
User d (d ∈ U6) by sub-secretIt is sent to Cloud Server;
Step 6.4 Cloud Server receives the data that at least t user returns, and recovers U using Shamir technology5In use
The random number at family
Step 6.5 Cloud Server is to U6In total user request U3\U5The private key information of middle user
Wherein U3\U5Indicate the weight more new stage user offline to the true value more new stage;
Step 6.6 user d (d ∈ U6) request that Cloud Server is sent is received, it willIt is sent to cloud service
Device;
Step 6.7 Cloud Server receives the data that at least t user returns, and recovers offline user using Shamir technology
Private keyAnd it is calculated using Diffie-Hellman technology
Step 6.8 Cloud Server is to received ciphertextInAminated polyepichlorohydrin is carried out,
Carry out denoising simultaneously:
Step 6.9 Cloud Server is to received ciphertextInGathered
It closes operation and carries out denoising simultaneously, to eachHave:
The result of step 6.10 Cloud Server decryption step 6.8-6.9:
It is rightHave:
It is rightHave:
Step 6.11 Cloud Server updates H estimated value
All users of step 6.12 Cloud Server into system broadcast H updated estimated values
User in step 7 set U, by interacting, executes step 1 to step 6, until meeting system with Cloud Server repeatedly
The condition of convergence of system definition, obtains final H estimated valueI.e. closest to the value of true value.
Claims (7)
1. a kind of true value for realizing efficient secret protection in mobile gunz sensory perceptual system finds method, which is characterized in that including
Following steps:
Step 1 system initialization: user is locally generated two public and private key pair using Diffie-Hellman technology, difference
Its public key information is sent to Cloud Server by the seed of key, pseudo-random generator as authenticated encryption, user;Cloud service
Device detects online user's list, and active user's list and the public key information received are broadcasted;
Step 2 secret sharing: user detects broadcast data, selects random number, generates seed private key respectively using Shamir technology
With the sub-secret of random number, the exchange key of encryption key is generated using Diffie-Hellman technology, and to all sub-secrets
Authenticated encryption is carried out, encrypted result is sent to Cloud Server;Cloud Server detects online user's list, initializes H estimation
Value, active user's list, all sub-secrets received and H estimated value are broadcasted together;
Step 3 data encryption: user detects broadcast data, calculates separately its H sensor observation at a distance from H estimated value
With adjust the distance and encrypted using double mask technology, and encrypted data are sent to Cloud Server;
The polymerization of step 4 ciphertext: Cloud Server detects online user's list, and selection meets the random number of particular requirement, by what is received
Encryption data carries out aminated polyepichlorohydrin, carries out denoising and adding random number process using Shamir technology to calculated ciphertext result,
And active user's list and calculated result are broadcasted;
Step 5 weight updates: user reselects random number and carries out secret sharing in the way of step 2, by the calculating of step 4
As a result with its observe data distance and logarithm carry out (H+1) wheel operation, update user data weight, utilize double mask technology
Calculated result is encrypted, and encrypted data are sent to Cloud Server;
Step 6 true value updates: Cloud Server detects online user's list, and the encryption data received is carried out aminated polyepichlorohydrin, is utilized
Shamir technology to ciphertext result carry out denoising, decryption denoising after as a result, and update H estimated value, will be updated
Estimated value is broadcasted;
User in step 7 set U, by interacting, executes step 1 to step 6, until it is fixed to meet system with Cloud Server repeatedly
The condition of convergence of justice, obtains final H estimated valueI.e. closest to the value of true value.
2. the true value according to claim 1 that efficient secret protection is realized in mobile gunz sensory perceptual system finds method,
It is characterized in that, the detailed process of step 1 are as follows:
Step 1.1 user d (d ∈ U) is locally generated two public and private key pair using Diffie-Hellman technology
Wherein DH.gen is code key generating function, and k is code key length, and U is indicated
List comprising all users,WithIndicate the public key information of user d,WithIndicate the private key information of user d,Key as authenticated encryption AE,Seed as pseudo-random generator PRG;
Step 1.2 user d (d ∈ U) is by its public key informationIt is sent to Cloud Server;
It is U that step 1.3 Cloud Server, which detects active user's list,1(|U1| >=t, U1∈ U), wherein t indicates online user number most
Low threshold, | U1| indicate U1The quantity of middle user, Cloud Server is to U1In total user broadcast its public key information receivedWherein miIndicate U1In any user, 1≤i≤| U1|,WithFor user miPublic key
Information;If Cloud Server detects active user's list | U1| < t then abandons its received data.
3. the true value according to claim 2 that efficient secret protection is realized in mobile gunz sensory perceptual system finds method,
It is characterized in that, the detailed process of step 2 are as follows:
Step 2.1 user d (d ∈ U1) detection | U1| whether it is more than or equal to t, its received public key information whether all difference, if two
There is one to be unsatisfactory in condition, user d (d ∈ U1) abandon its received data;If two conditions are all satisfied, step 2.2- is executed
2.6;
Step 2.2 user d (d ∈ U1) selection random number nd, and private key is generated using Shamir technologyWith random number ndSon
It is secret:
Wherein,Indicate the private key of user dTo user mjThe sub-secret of generation,Indicate the random number n of user ddIt is right
User mjThe sub-secret of generation, 1≤j≤| U1| and mj≠ d, Shamir.share are Secret Sharing Function;
Step 2.3 user d (d ∈ U1) calculateDH.agree is that code key exchanges letter
Number,Indicate the private key of user dWith user mjPublic keyExchange after the calculating of Diffie-Hellman technology
Key, willKey as authenticated encryption;
Step 2.4 user d (d ∈ U1) encrypted using all sub-secrets of the authenticated encryption technology to generation:
Wherein,Indicate user d to user mjThe sub-secret of generationIt is defeated after authenticated encryption
Ciphertext value out, AE.enc are authenticated encryption function, | | it is connector;
Step 2.5 user d (d ∈ U1) will | U1| -1 ciphertext valueIt is sent to Cloud Server;
It is U that step 2.6 Cloud Server, which detects active user's list,2(|U2| >=t, U2∈U1), Cloud Server initializes H estimated valueWhereinIndicate the estimated value of h-th of target in user sensor data, Cloud Server is to U2In it is complete
Body user broadcasts its ciphertext receivedWith H estimated valueIf cloud takes
Business device detects active user's list | U2| < t then abandons its received data.
4. the true value according to claim 3 that efficient secret protection is realized in mobile gunz sensory perceptual system finds method,
It is characterized in that, the detailed process of step 3 are as follows:
Step 3.1 user d (d ∈ U2) detection | U2| whether it is more than or equal to t, if meeting | U2| >=t executes step 3.2-3.5;It is no
Then, user d (d ∈ U2) abandon its received data;
Step 3.2 user d (d ∈ U2) calculate Indicate the private key of user d
With user mjPublic keyExchange key after the calculating of Diffie-Hellman technology, willAs pseudo-random generator
The seed of PRG;
Step 3.3 user d (d ∈ U2) calculateWhereinIndicate its H sensor
ObservationWith H estimated valueDistance and;
Step 3.4 user d (d ∈ U2) encrypted using double mask technology
Wherein,It indicatesEncrypted ciphertext value, PRG are pseudo-random generation function, and R is k Big primes, and mod is modulus;
Step 3.5 user d (d ∈ U2) willIt is sent to Cloud Server.
5. the true value according to claim 4 that efficient secret protection is realized in mobile gunz sensory perceptual system finds method,
It is characterized in that, the detailed process of step 4 are as follows:
It is U that step 4.1 Cloud Server, which detects active user's list,3(|U3| >=t, U3∈U2), if | U3| < t, Cloud Server abandon
Its received data;
Step 4.2 Cloud Server selects random number r, r to need to meetWherein, max indicates maximizing,ωdIt is the data weighting of user d, codomain range is preset by system, cloud service
Device is from U3Middle selection user list U4(|U4| >=t, U4∈U3);
Step 4.3 Cloud Server is to U4In total user request U3In user its random number sub-secret
Step 4.4 user d (d ∈ U4) request that Cloud Server is sent is received, it decrypts
Wherein AE.dec is certification decryption function, user d (d ∈ U4) by sub-secretIt is sent to Cloud Server;
Step 4.5 Cloud Server receives the data that at least t user returns, and recovers U using Shamir technology3In user
Random numberShamir.recon is secret reconstruction function;
Step 4.6 Cloud Server is to U4In total user request U2\U3The private key information of middle user
Wherein U2\U3Indicate the data encryption stage user offline to ciphertext polymerization stage;
Step 4.7 user d (d ∈ U4) request that Cloud Server is sent is received, it willIt is sent to Cloud Server;
Step 4.8 Cloud Server receives the data that at least t user returns, and recovers offline user private key using Shamir technology
And it is calculated using Diffie-Hellman technology
Step 4.9 Cloud Server is to received ciphertextAminated polyepichlorohydrin is carried out, while carrying out denoising:
Step 4.10 Cloud Server calculatesAnd to U3In total user broadcast it is close
Literary polymerization result Cresult, Log is logarithmic function.
6. the true value according to claim 5 that efficient secret protection is realized in mobile gunz sensory perceptual system finds method,
It is characterized in that, the detailed process of step 5 are as follows:
Step 5.1 user d (d ∈ U3) reselect random number n 'd, n ' is generated using Shamir technologydSub-secret:
WhereinIndicate the random number n ' of user ddTo user mjThe sub-secret of generation;
Step 5.2 user d (d ∈ U3) encrypted using all sub-secrets of the authenticated encryption technology to generation:
Wherein,Indicate user d to user mjThe sub-secret of generationIt is exported after authenticated encryption
Ciphertext value;
Step 5.3 user d (d ∈ U3) will | U3| -1 ciphertext valueIt is sent to Cloud Server;
Step 5.4 Cloud Server is to U3In total user broadcast its ciphertext received
Step 5.5 user d (d ∈ U3) update weight:
Wherein, ω 'dIndicate user d (d ∈ U3) updated plus weighted value of making an uproar;
Step 5.6 user d (d ∈ U3) calculated using double mask technology:
Wherein y 'dIndicate user d (d ∈ U3) data weighting ω 'dUtilize the encrypted ciphertext value of double mask technology;
Step 5.7 user d (d ∈ U3) utilize double mask technology to each of which sensor observationIt calculates:
WhereinIndicate the sensor observation of user dWith weights omega after update 'dProduct covered using double
Ciphertext value after code technology secrecy;
Step 5.8 user is by ciphertextIt is sent to Cloud Server.
7. the true value according to claim 6 that efficient secret protection is realized in mobile gunz sensory perceptual system finds method,
It is characterized in that, the detailed process of step 6 are as follows:
It is U that step 6.1 Cloud Server, which detects active user's list,5(|U5| >=t, U5∈U3), and from U5Middle random selection user column
Table U6(|U6| >=t, U6∈U5);If Cloud Server detects active user's list | U5| < t, Cloud Server abandon its received number
According to;
Step 6.2 Cloud Server is to U6In total user request U5In user its random number sub-secret
Step 6.3 user d (d ∈ U6) request that Cloud Server is sent is received, it decrypts
User d (d ∈ U6) by sub-secretIt is sent to Cloud Server;
Step 6.4 Cloud Server receives the data that at least t user returns, and recovers U using Shamir technology5In user
Random number
Step 6.5 Cloud Server is to U6In total user request U3\U5The private key information of middle user
Wherein U3\U5Indicate the weight more new stage user offline to the true value more new stage;
Step 6.6 user d (d ∈ U6) request that Cloud Server is sent is received, it willIt is sent to Cloud Server;
Step 6.7 Cloud Server receives the data that at least t user returns, and recovers offline user private key using Shamir technology
And it is calculated using Diffie-Hellman technology
Step 6.8 Cloud Server is to received ciphertextInAminated polyepichlorohydrin is carried out, simultaneously
Carry out denoising:
Step 6.9 Cloud Server is to received ciphertextInCarry out polymerization fortune
It calculates while carrying out denoising, to eachHave:
The result of step 6.10 Cloud Server decryption step 6.8-6.9:
It is rightHave:
It is rightHave:
Step 6.11 Cloud Server updates H estimated value
All users of step 6.12 Cloud Server into system broadcast H updated estimated values
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811322088.3A CN109474928B (en) | 2018-11-07 | 2018-11-07 | Truth value discovery method for realizing efficient privacy protection in mobile crowd sensing system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811322088.3A CN109474928B (en) | 2018-11-07 | 2018-11-07 | Truth value discovery method for realizing efficient privacy protection in mobile crowd sensing system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109474928A true CN109474928A (en) | 2019-03-15 |
CN109474928B CN109474928B (en) | 2020-06-16 |
Family
ID=65671743
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811322088.3A Active CN109474928B (en) | 2018-11-07 | 2018-11-07 | Truth value discovery method for realizing efficient privacy protection in mobile crowd sensing system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109474928B (en) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110198216A (en) * | 2019-07-10 | 2019-09-03 | 安徽大学 | A kind of increment true value discovery method, apparatus, computer equipment and storage medium for protecting privacy |
CN110300183A (en) * | 2019-07-09 | 2019-10-01 | 佳源科技有限公司 | A kind of intelligence edge Internet of Things agent apparatus |
CN110730064A (en) * | 2019-09-24 | 2020-01-24 | 徐州工业职业技术学院 | Data fusion method based on privacy protection in crowd sensing network |
CN111585990A (en) * | 2020-04-26 | 2020-08-25 | 安徽师范大学 | Mobile crowd sensing privacy protection truth value discovery method based on safety summation |
CN111740959A (en) * | 2020-05-25 | 2020-10-02 | 电子科技大学 | Verifiable privacy protection method in mobile crowd sensing system |
CN112104609A (en) * | 2020-08-20 | 2020-12-18 | 电子科技大学 | Method for verifiable privacy-aware true phase discovery in a mobile crowd-sourcing awareness system |
CN112651505A (en) * | 2020-12-18 | 2021-04-13 | 广州大学 | Truth value discovery method and system for knowledge verification |
CN113407991A (en) * | 2021-06-10 | 2021-09-17 | 交通银行股份有限公司 | Private data two-party security comparison method based on trusted third party |
CN113783683A (en) * | 2021-11-12 | 2021-12-10 | 晨越建设项目管理集团股份有限公司 | Cloud platform privacy protection verifiable data aggregation method based on sensor network |
CN114915458A (en) * | 2022-04-27 | 2022-08-16 | 安徽超清科技股份有限公司 | Comprehensive monitoring protector for urban rail transit |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103297503A (en) * | 2013-05-08 | 2013-09-11 | 南京邮电大学 | Mobile terminal swarm intelligent perception structure based on layered information extraction server |
CN105245345A (en) * | 2015-09-28 | 2016-01-13 | 浙江工商大学 | High reliability perception data collection algorithm based on mobile perception user anonymity reputation in crowd sensing |
CN105407482A (en) * | 2015-11-04 | 2016-03-16 | 上海交通大学 | Protection method for user location privacy in mobile crowd sensing network |
US20160219053A1 (en) * | 2015-01-27 | 2016-07-28 | Danzhi Cai | Intelligent terminal and interactive control system and interactive control method using same |
CN106131139A (en) * | 2016-06-23 | 2016-11-16 | 暨南大学 | The encryption of the floating data of a kind of cloud relational database and querying method |
US20170215034A1 (en) * | 2016-01-22 | 2017-07-27 | Government Of The United States As Represetned By The Secretary Of The Air Force | Object detection and tracking system |
CN107437990A (en) * | 2017-09-14 | 2017-12-05 | 山东浪潮通软信息科技有限公司 | Encryption method, decryption method, encryption device and decryption device |
CN108494760A (en) * | 2018-03-14 | 2018-09-04 | 安徽大学 | A kind of intelligent perception true value discovery method of protection privacy |
-
2018
- 2018-11-07 CN CN201811322088.3A patent/CN109474928B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103297503A (en) * | 2013-05-08 | 2013-09-11 | 南京邮电大学 | Mobile terminal swarm intelligent perception structure based on layered information extraction server |
US20160219053A1 (en) * | 2015-01-27 | 2016-07-28 | Danzhi Cai | Intelligent terminal and interactive control system and interactive control method using same |
CN105245345A (en) * | 2015-09-28 | 2016-01-13 | 浙江工商大学 | High reliability perception data collection algorithm based on mobile perception user anonymity reputation in crowd sensing |
CN105407482A (en) * | 2015-11-04 | 2016-03-16 | 上海交通大学 | Protection method for user location privacy in mobile crowd sensing network |
US20170215034A1 (en) * | 2016-01-22 | 2017-07-27 | Government Of The United States As Represetned By The Secretary Of The Air Force | Object detection and tracking system |
CN106131139A (en) * | 2016-06-23 | 2016-11-16 | 暨南大学 | The encryption of the floating data of a kind of cloud relational database and querying method |
CN107437990A (en) * | 2017-09-14 | 2017-12-05 | 山东浪潮通软信息科技有限公司 | Encryption method, decryption method, encryption device and decryption device |
CN108494760A (en) * | 2018-03-14 | 2018-09-04 | 安徽大学 | A kind of intelligent perception true value discovery method of protection privacy |
Cited By (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110300183A (en) * | 2019-07-09 | 2019-10-01 | 佳源科技有限公司 | A kind of intelligence edge Internet of Things agent apparatus |
CN110300183B (en) * | 2019-07-09 | 2020-07-17 | 佳源科技有限公司 | Intelligent edge Internet of things agent device |
CN110198216B (en) * | 2019-07-10 | 2022-03-04 | 安徽大学 | Incremental truth value discovery method and device for protecting privacy, computer equipment and storage medium |
CN110198216A (en) * | 2019-07-10 | 2019-09-03 | 安徽大学 | A kind of increment true value discovery method, apparatus, computer equipment and storage medium for protecting privacy |
CN110730064A (en) * | 2019-09-24 | 2020-01-24 | 徐州工业职业技术学院 | Data fusion method based on privacy protection in crowd sensing network |
CN110730064B (en) * | 2019-09-24 | 2023-02-07 | 徐州工业职业技术学院 | Data fusion method based on privacy protection in crowd sensing network |
CN111585990A (en) * | 2020-04-26 | 2020-08-25 | 安徽师范大学 | Mobile crowd sensing privacy protection truth value discovery method based on safety summation |
CN111585990B (en) * | 2020-04-26 | 2022-04-15 | 安徽师范大学 | Mobile crowd sensing privacy protection truth value discovery method based on safety summation |
CN111740959A (en) * | 2020-05-25 | 2020-10-02 | 电子科技大学 | Verifiable privacy protection method in mobile crowd sensing system |
CN112104609B (en) * | 2020-08-20 | 2021-12-03 | 电子科技大学 | Method for verifiable privacy-aware truth discovery in mobile crowd-sourcing awareness systems |
CN112104609A (en) * | 2020-08-20 | 2020-12-18 | 电子科技大学 | Method for verifiable privacy-aware true phase discovery in a mobile crowd-sourcing awareness system |
CN112651505A (en) * | 2020-12-18 | 2021-04-13 | 广州大学 | Truth value discovery method and system for knowledge verification |
CN112651505B (en) * | 2020-12-18 | 2022-01-14 | 广州大学 | Truth value discovery method and system for knowledge verification |
CN113407991A (en) * | 2021-06-10 | 2021-09-17 | 交通银行股份有限公司 | Private data two-party security comparison method based on trusted third party |
CN113783683A (en) * | 2021-11-12 | 2021-12-10 | 晨越建设项目管理集团股份有限公司 | Cloud platform privacy protection verifiable data aggregation method based on sensor network |
CN114915458A (en) * | 2022-04-27 | 2022-08-16 | 安徽超清科技股份有限公司 | Comprehensive monitoring protector for urban rail transit |
CN114915458B (en) * | 2022-04-27 | 2023-08-29 | 安徽超清科技股份有限公司 | Urban rail transit is with synthesizing monitoring protector |
Also Published As
Publication number | Publication date |
---|---|
CN109474928B (en) | 2020-06-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109474928A (en) | Realize that the true value of efficient secret protection finds method in mobile gunz sensory perceptual system | |
Fereidooni et al. | Safelearn: Secure aggregation for private federated learning | |
CN108717514B (en) | Data privacy protection method and system in machine learning | |
CN107257381B (en) | Task allocation system model for privacy protection space crowdsourcing and implementation method | |
CN105812128B (en) | A kind of anti-malicious data of intelligent grid excavates the data aggregation method of attack | |
CN111563265A (en) | Distributed deep learning method based on privacy protection | |
CN111275202A (en) | Machine learning prediction method and system for data privacy protection | |
CN105187425B (en) | Facing cloud calculus communication system safety without certificate thresholding decryption method | |
CN114866222B (en) | Ciphertext data statistical analysis system and method supporting privacy protection | |
CN108632261A (en) | Multi-party quantum summation method and system | |
CN111585990B (en) | Mobile crowd sensing privacy protection truth value discovery method based on safety summation | |
CN109347829A (en) | A kind of intelligent perception network true value discovery method based on secret protection | |
CN109858269A (en) | A kind of secret protection density peak clustering method based on homomorphic cryptography | |
CN112597542B (en) | Aggregation method and device of target asset data, storage medium and electronic device | |
CN111581648B (en) | Method of federal learning to preserve privacy in irregular users | |
Tang et al. | Achieve privacy-preserving truth discovery in crowdsensing systems | |
CN116011014A (en) | Privacy computing method and privacy computing system | |
CN117034338A (en) | Distributed travel data calculation method based on privacy protection | |
CN110598427B (en) | Data processing method, system and storage medium | |
Li et al. | Perturbation-based private profile matching in social networks | |
CN116865938A (en) | Multi-server federation learning method based on secret sharing and homomorphic encryption | |
Wang et al. | Secure content sharing protocol for D2D users based on profile matching in social networks | |
Neupane et al. | A novel Modified Chaotic Simplified Advanced Encryption System (MCS-AES): mixed reality for a secure surgical tele-presence | |
CN102355375B (en) | Distributed abnormal flow detection method with privacy protection function and system | |
CN116681141A (en) | Federal learning method, terminal and storage medium for privacy protection |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |