Chinese Journal of Network and Information Security ›› 2021, Vol. 7 ›› Issue (1): 157-166.doi: 10.11959/j.issn.2096-109x.2021016
• Papers • Previous Articles
Mingfeng ZHAO1, Chen LEI2, Yang ZHONG1, Jinbo XIONG1,3
Revised:
2020-12-14
Online:
2021-02-15
Published:
2021-02-01
Supported by:
CLC Number:
Mingfeng ZHAO, Chen LEI, Yang ZHONG, Jinbo XIONG. Dynamic privacy measurement model and evaluation system for mobile edge crowdsensing[J]. Chinese Journal of Network and Information Security, 2021, 7(1): 157-166.
[1] | XIONG J B , ZHAO M F , BHUIYAN M Z A ,et al. An AI-enabled three-party game framework for guaranteed data privacy in mobile edge crowdsensing of IoT[J]. IEEE Transactions on Industrial Informatics, 2019: 1. |
[2] | XIONG J , CHEN L , BHUIYAN M Z A ,et al. A secure data deletion scheme for IoT devices through key derivation encryption and data analysis[J]. Future Generation Computer Systems, 2020,111: 741-753. |
[3] | YU S , WANG G , LIU X ,et al. Security and privacy in the age of the smart internet of things:an overview from a networking perspective[J]. IEEE Communications Magazine, 2018,56(9): 14-18. |
[4] | QI L , HU C , ZHANG X ,et al. Privacy-aware data fusion and prediction with spatial-temporal context for smart city industrial environment[J]. IEEE Transactions on Industrial Informatics, 2020: 1. |
[5] | 胡宇翔, 伊鹏, 孙鹏浩 ,等. 全维可定义的多模态智慧网络体系研究[J]. 通信学报, 2019,40(8): 1-12. |
HU Y X,YI P , SUN P H , e al . Research on the full-dimensional defined polymorphic smart network[J]. Journal on Communications, 2019,40(8): 1-12. | |
[6] | LUO C , JI J , WANG Q ,et al. Channel state information prediction for 5G wireless communications:a deep learning approach[J]. IEEE Transactions on Network Science and Engineering, 2020,7(1): 227-236. |
[7] | 乔康, 游伟, 王领伟 ,等. 基于区块链的 5G 物联网数据共享方案[J]. 网络与信息安全学报, 2020,6(4): 45-55. |
QIAO K , YOU W , WANG L W ,et al. Data sharing scheme for 5G IoT based on blockchain[J]. Chinese Journal of Network and Information Security, 2020,6(4): 45-55. | |
[8] | AL-GARADI M A , MOHAMED A , AL-ALI A ,et al. A survey of machine and deep learning methods for internet of things (IoT) security[J]. IEEE Communications Surveys & Tutorials, 2020,22(3): 1646-1685. |
[9] | 熊金波, 马蓉, 牛犇 ,等. 移动群智感知中基于用户联盟匹配的隐私保护激励机制[J]. 计算机研究与发展, 2018,55(7): 1359-1370. |
XIONG J B , MA R , NIU B ,et al. Privacy protection incentive mechanism based on user-Union matching in mobile crowdsensing[J]. Journal of Computer Research and Development, 2018,55(7): 1359-1370. | |
[10] | ZHANG Y , WANG P , HUANG H ,et al. Privacy-assured FogCS:chaotic compressive sensing for secure industrial big image data processing in fog computing[J]. IEEE Transactions on Industrial Informatics, 2020. |
[11] | LIU C , TIAN Y , XIONG J ,et al. Towards attack and defense views to k-Anonymous using information theory approach[J]. IEEE Access, 2019,7: 156025-156032. |
[12] | AL-ASMARI H A , SALEH M S . A conceptual framework for measuring personal privacy risks in facebook online social network[C]// International Conference on Computer and Information Sciences (ICCIS). 2019: 1-6. |
[13] | ZHAO Y , WAGNER I . On the strength of privacy metrics for vehicular communication[J]. IEEE Transactions on Mobile Computing, 2018,18(2): 390-403. |
[14] | WAGNER I , ECKHOFF D . Technical privacy metrics:a systematic survey[J]. ACM Computing Surveys (CSUR), 2018,51(3): 1-38. |
[15] | 熊金波, 王敏燊, 田有亮 ,等. 面向云数据的隐私度量研究进展[J]. 软件学报, 2018,29(7): 1963-1980. |
XIONG J B , WANG M S , TIAN Y L ,et al. Research progress on privacy measurement for cloud data[J]. Journal of Software, 2018,29(7): 1963-1980. | |
[16] | HUANG Z , YANG L , JIANG W . Uncertainty measurement with belief entropy on the interference effect in the quantum-like Bayesian networks[J]. Applied Mathematics and Computation, 2019,347: 417-428. |
[17] | SONG H , LUO T , LI J . Common criterion of privacy metrics and parameters analysis based on error probability for randomized response[J]. IEEE Access, 2019,7: 16964-16978. |
[18] | YAN F , XU K . A set pair analysis based layer of protection analysis and its application in quantitative risk assessment[J]. Journal of Loss Prevention in the Process Industries, 2018,55: 313-319. |
[19] | SHI W , HU J , YAN J ,et al. A privacy measurement method using network structure entropy[C]// Proceedings of the International Conference on Networking and Network Applications (NaNA). 2017: 147-151. |
[20] | SHAHAM S , DING M , LIU B ,et al. Transition-entropy:a novel metric for privacy preservation in location-based services[C]// IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS). 2019: 1-6. |
[21] | GAO F , HE J , PENG S ,et al. A quantifying metric for privacy protection based on Information theory[C]// Proceedings of the 2010 Third International Symposium on Intelligent Information Technology and Security Informatics. 2010: 216-220. |
[22] | 张宏磊, 史玉良, 张世栋 ,等. 一种基于分块混淆的动态数据隐私保护机制[J]. 计算机研究与发展, 2016,53(11): 2454-2464. |
ZHANG H L , SHI Y L , ZHANG S D ,et al. A privacy protection mechanism for dynamic data based on partition-confusion[J]. Journal of Computer Research and Development, 2016,53(11): 2454-2464. | |
[23] | 彭长根, 丁红发, 朱义杰 ,等. 隐私保护的信息熵模型及其度量方法[J]. 软件学报, 2016,27(8): 1891-1903. |
PENG C G , DING H F , ZHU Y J ,et al. Information entropy models and privacy metrics methods for privacy protection[J]. Journal of software, 2016,27(8): 1891-1903. | |
[24] | ZHANG T , ZHAO K , YANG M ,et al. Research on privacy security risk assessment method of mobile commerce based on information entropy and markov[J]. Wireless Communications and Mobile Computing, 2020,2: 1-11. |
[25] | 马蓉, 陈秀华, 刘慧 ,等. 移动群智感知中用户隐私度量与隐私保护研究[J]. 信息网络安全, 2018,18(8): 64-72. |
MA R , CHEN X H , LIU H ,et al. Research on user privacy measurement and privacy protection in mobile crowdsensing[J]. Netinfo Security, 2018,18(8): 64-72. | |
[26] | WANG Y , LIU J . An attribtue-based statistic model for privacy impact assessment[C]// Proceedings of the 2016 International Conference on Collaboration Technologies and Systems (CTS). 2016: 619-621. |
[27] | LIU R , CAO J , VANSYCKEL S ,et al. PriMe:human-centric privacy measurement based on user preferences towards data sharing in mobile participatory sensing systems[C]// Proceedings of the 2016 IEEE International Conference on Pervasive Computing and Communications (PerCom). 2016: 1-8. |
[28] | YAMAOKA Y , ITOH K . K-presence-secrecy:practical privacy model as extension of k-anonymity[J]. IEICE Transactions on Information and Systems, 2017,100(4): 730-740. |
[29] | GKOUNTOUNA O , TERROVITIS M . Anonymizing collections of tree-structured data[J]. IEEE Transactions on Knowledge and Data Engineering, 2015,27(8): 2034-2048. |
[30] | LI X Y , ZHANG C , JUNG T ,et al. Graph-based privacy-preserving data publication[C]// Proceedings of the 35th Annual IEEE International Conference on Computer Communications. 2016: 1-9. |
[31] | ZHANG X , GUI X , TIAN F ,et al. Privacy quantification model based on the Bayes conditional risk in location-based services[J]. Tsinghua Science and Technology, 2014,19(5): 452-462. |
[32] | HAN X , TIAN D , DUAN X ,et al. Optimized anonymity updating in VANET based on information and privacy joint metrics[C]// Proceedings of the 8th ACM Symposium on Design and Analysis of Intelligent Vehicular Networks and Applications. 2018: 63-69. |
[33] | TESFAY W B , SERNA-OLVERA J , . Towards user-centered privacy risk detection and quantification framework[C]// Proceedings of the International Conference on New Technologies,Mobility and Security (NTMS). 2016: 1-5. |
[34] | 晏燕, 郝晓弘, 王万军 . 一种隐私保护度量的集对分析方法[J]. 武汉大学学报(工学版), 2015,48(6): 883-890. |
YAO Y , HAO X H , WANG W J . A set pair analysis method for privacy metric[J]. Engineering Journal of Wuhan University, 2015,48(6): 883-890. | |
[35] | HUANG W Q , XIA J F , YU M ,et al. Personal privacy metric based on public social network data[J]. JPhCS, 2018,1087(3): 032007. |
[36] | HE W , ZENG Y , LI G . A novel structural reliability analysis method via improved maximum entropy method based on nonlinear mapping and sparse grid numerical integration[J]. Mechanical Systems and Signal Processing, 2019,133: 106247. |
[37] | HASSAN M U , REHMANI M H , CHEN J . Differential privacy techniques for cyber physical systems:a survey[J]. IEEE Communications Surveys & Tutorials, 2019,22(1): 746-789. |
[38] | HE J , CAI L , GUAN X . Differential private noise adding mechanism and its application on consensus algorithm[J]. IEEE Transactions on Signal Processing, 2020,68: 4069-4082. |
[1] | Feng YU, Qingxin LIN, Hui LIN, Xiaoding WANG. Privacy-enhanced federated learning scheme based on generative adversarial networks [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 113-122. |
[2] | Zuobin YING, Yichen FANG, Yiwen ZHANG. Privacy-preserving federated learning framework with dynamic weight aggregation [J]. Chinese Journal of Network and Information Security, 2022, 8(5): 56-65. |
[3] | Xinyu ZHANG, Bingsheng ZHANG, Quanrun MENG, Kui REN. Study on privacy preserving encrypted traffic detection [J]. Chinese Journal of Network and Information Security, 2021, 7(4): 101-113. |
[4] | Yu ZHANG,Xixiang LYU,Yucong ZOU,Yige LI. Differentially private sequence generative adversarial networks for data privacy masking [J]. Chinese Journal of Network and Information Security, 2020, 6(4): 109-119. |
[5] | Xianmang HE. Multi-party summation query method based on differential privacy [J]. Chinese Journal of Network and Information Security, 2020, 6(3): 14-18. |
[6] | Lei YANG,Xiao ZHENG,Wei ZHAO. Non-equal-width histogram publishing method based on differential privacy [J]. Chinese Journal of Network and Information Security, 2020, 6(3): 39-49. |
[7] | Hui LIU,Renwan BI,Jinbo XIONG,Mingfeng ZHAO,Biao JIN,Jie LIN. Fog-aided identity privacy protection scheme for sensing users in mobile crowd sensing [J]. Chinese Journal of Network and Information Security, 2019, 5(6): 75-84. |
[8] | Senyou LI,Xinsheng JI,Wei YOU. Research on differential privacy protection parameter configuration method based on confidence level [J]. Chinese Journal of Network and Information Security, 2019, 5(4): 29-39. |
[9] | Peng GUO, Shangping ZHONG, Kaizhi CHEN, Hang CHENG. Adaptive selection method of differential privacy GAN gradient clipping thresholds [J]. Chinese Journal of Network and Information Security, 2018, 4(5): 10-20. |
[10] | Jun REN,Jin-bo XIONG,Zhi-qiang YAO. Security control scheme for cloud data copy based on differential privacy model [J]. Chinese Journal of Network and Information Security, 2017, 3(5): 38-46. |
[11] | Wei TONG,AOYun-long M,Qing-jun CEHN,Bin-ru WANG,Bao-jia ZHANG,Sheng ZHONG. Survey of big-data-analysis-resistant privacy protection [J]. Chinese Journal of Network and Information Security, 2016, 2(4): 44-55. |
[12] | Zhi-qiang GAO,Qing-peng LI,Ren-yuan HU. Clustering algorithm preserving differential privacy in the framework of Spark [J]. Chinese Journal of Network and Information Security, 2016, 2(11): 47-51. |
[13] | Wen-jing ZHANG,Hui LI. A differentially-private mechanism for multi-level data publishing [J]. Chinese Journal of Network and Information Security, 2015, 1(1): 58-65. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|