Chinese Journal of Network and Information Security ›› 2016, Vol. 2 ›› Issue (4): 44-55.doi: 10.11959/j.issn.2096-109x.2016.00042
• Comprehensive Reviews • Previous Articles Next Articles
Wei TONG1,2,AOYun-long M1,2,Qing-jun CEHN1,2,Bin-ru WANG1,2,Bao-jia ZHANG1,2,Sheng ZHONG1,2
Revised:
2016-04-03
Online:
2016-04-01
Published:
2016-05-25
Supported by:
CLC Number:
Wei TONG,AOYun-long M,Qing-jun CEHN,Bin-ru WANG,Bao-jia ZHANG,Sheng ZHONG. Survey of big-data-analysis-resistant privacy protection[J]. Chinese Journal of Network and Information Security, 2016, 2(4): 44-55.
[1] | The white house.Consumer data privacy:in a networked world[EB/OL]. . |
[2] | European Commission.Proposal on general data protection regula-tion[R/OL]. . |
[3] | LI N , ZHANG N , DAS S K , et al . Privacy preservation in wireless sensor networks:a state-of-the-art survey[J]. Ad Hoc Networks, 2009,7(8): 1501-1514. |
[4] | DING X , ZHANG L , WAN Z , et al . A brief survey on de-anonymization attacks in online social networks[C]// 2010 In-ternational Conference on Computational Aspects of Social Net-works (CASoN),IEEE.c 2010:611-615. |
[5] | BACKSTROM L , DWORK C , KLEINBERG J . Wherefore art thou r3579x? anonymized social networks,hidden patterns,and struc-tural steganography[C]// International Conference on World Wide Web.c 2007:181-190. |
[6] | NARAYANAN A , SHMATIKOV V . De-anonymizing social net-works[C]// 2009 30th IEEE Symposium on Security and Privacy,IEEE.c 2009:173-187. |
[7] | WONDRACEK G , HOLZ T , KIRDA E , et al . A practical attack to de-anonymize social network users[C]// 2010 IEEE Symposium on Security and Privacy (SP).c 2010:223-238. |
[8] | HAY M , MIKLAU G , JENSEN D , et al . Resisting structural re-identification in anonymized social networks[J]. The VLDB En-dowment, 2008,1(1):102-114. |
[9] | NARAYANAN A , SHMATIKOV V . Robust de-anonymization of large sparse datasets[C]// 2008 IEEE Symposium on Security and Privacy(SP).c 2008:111-125. |
[10] | NAVEED M , AYDAY E , CLAYTON E W , et al . Privacy in the genomic era[J]. ACM Computing Surveys (CSUR), 2015,48(1): 6. |
[11] | TRAMèR F , HUANG Z , HUBAUX J P , et al . Differential privacy with bounded priors:reconciling utility and privacy in genome-wide association studies[C]// The 22nd ACM Sigsac Conference on Com-puter and Communications Security.c 2015:1286-1297. |
[12] | JOHNSON A , SHMATIKOV V . Privacy-preserving data explora-tion in genome-wide association studies[C]// The 19th ACM Sigkdd International Conference on Knowledge Discovery and Data Min-ing.c 2013:1079-1087. |
[13] | LI N , QARDAJI W , SU D , et al . Membership privacy:a unifying framework for privacy definitions[C]// The 2013 ACM Sigsac Con-ference on Computer & communications security.c 2013:889-900. |
[14] | 刘华玲, 郑建国, 孙辞海 . 基于贪心扰动的社交网络隐私保护研究[J]. 电子学报 2013(8):1586-1591. |
LIU H L , ZHENG J G , SUN C H . Privacy preserving in social net-works based on greedy perturbation[J]. Journal of Electron-ics, 2013,08:1586-1591. | |
[15] | 刘华玲, 郑建国, 孙辞海 . 社交网络隐私保护中的随机算法[J]. 信息与控制 2012(4):197-201. |
LIU H L , ZHENG J G , SUN C H . Randomized algorithm for pri-vacy preservation in social networks[J]. Information and Control, 2012(4):197-201. | |
[16] | 吕志泉, 洪澄, 张敏 , 等. 面向社交网络的隐私保护方案[J]. 通信学报 2014(8):23-32. |
LV Z Q , HONG C , ZHANG M , et al . Privacy-preserving scheme for social networks[J]. Journal of Communications, 2014(8):23-32. | |
[17] | KIDO H , YANAGISAWA Y , SATOH T . An anonymous communi-cation technique using dummies for location-based services[C]// 2005 International Conference on Pervasive Services(ICPS'05).c 2005:88-97. |
[18] | MOKBEL M F . Privacy in location-based services:state-of-the-art and research directions[C]// 2007 International Conference on Mo-bile Data Management.c 2007:228-228. |
[19] | DOMINGO-FERRER J , SRAMKA M , TRUJILLO-RASúA R . Privacy-preserving publication of trajectories using microaggrega-tion[C]// The 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS.c 2010:26-33. |
[20] | GRUTESER M , LIU X . Protecting privacy in continuous loca-tion-tracking applications[J]. IEEE Security & Privacy, 2004(2):28-34. |
[21] | DWORK C . Differential privacy[M]// Automata,languages and programming . Berlin Heidelberg: Springer, 2006:1-12. |
[22] | LEE B , OH J , YU H , et al . Protecting location privacy using loca-tion semantics[C]// The 17th ACM Sigkdd International Conference on Knowledge Discovery and Data Mining.c 2011:1289-1297. |
[23] | ANDRéS M E , BORDENABE N E . CHATZIKOKOL-AKIS K,et al.Geo-indistinguishability:differential privacy for location-based systems[C]// 2013 ACM Sigsac Conference on Computer & Com-munications Security.c 2013:901-914. |
[24] | CHATZIKOKOLAKIS K , ANDRéS M E , BORDENABE N E , et al . Broadening the scope of differential privacy using met-rics[C]// Privacy Enhancing Technologies.c 2013:82-102. |
[25] | CHATZIKOKOLAKIS K , PALAMIDESSI C , STRONATI M . A predictive differentially-private mechanism for mobility traces[C]// Privacy Enhancing Technologies.c 2014:21-41. |
[26] | XIAO Y , XIONG L . Protecting locations with differential privacy under temporal correlations[C]// The 22nd ACM Sigsac Conference on Computer and Communications Security.c 2015:1298-1309. |
[27] | BORDENABE N E , CHATZIKOKOLAKIS K , PALAMIDESSI C . Optimal geo-indistinguishable mechanisms for location pri-vacy[C]// 2014 ACM Sigsac Conference on Computer and Com-munications Security.c 2014:251-262. |
[28] | 霍峥, 孟小峰, 黄毅 . PrivateCheckIn:一种移动社交网络中的轨迹隐私保护方法[J]. 计算机学报 2013(4):716-726. |
HUO Z , MENG X F , HUANG Y . PrivateCheckIn:trajectory pri-vacy-preserving for check-in services in MSNS[J]. Chinese Journal of Computers, 2013(4):716-726. | |
[29] | 赵婧, 张渊, 李兴华 , 等. 基于轨迹频率抑制的轨迹隐私保护方法[J]. 通信学报 2014(10):2096-2106. |
ZHAO J , ZHANG Y , LI X H , et al . A trajectory privacy protection approach via trajectory frequency suppression[J]. Chinese Journal of Computers, 2014(10):2096-2106. | |
[30] | 吴英杰, 唐庆明, 倪巍伟 , 等. 基于聚类杂交的隐私保护轨迹数据发布算法[J]. 计算机研究与发展 2011(5)::578-593. |
WU Y J , TANG Q M , NI W W , et al . A clustering hybrid based al-gorithm for privacy preserving trajectory data publishing[J]. Jour-nal of Computer Research and Development, 2011(5)::578-593. | |
[31] | AGRAWAL R , SRIKANT R . Privacy-preserving data mining[J]. ACM Sigmod Record, 2000,29(2):439-450. |
[32] | OLIVEIRA S R M , ZAIANE O R . Privacy preserving frequent itemset mining[C]// The IEEE international Conference on Privacy,Security and Data Mining.c c2002:43-54. |
[33] | SAYGIN Y , VERYKIOS V S , ELMAGARMID A K . Privacy pre-serving association rule mining[C]// International Workshop on Research Issues in Data Engineering:Engineering E-commerce/E-business Systems (RIDE-2EC).c 2002,41(2): 151-158. |
[34] | SAMARATI P , SWEENEY L . Generalizing data to provide ano-nymity when disclosing information[C]// The 17th ACM Sigact-sigmod-sigart Symposium on Principles of Database Systems.c 1998,188. |
[35] | SWEENEY L . K-anonymity:A model for protecting privacy[J]. International Journal of Uncertainty,Fuzziness and Knowl-edge-Based Systems, 2002,10(05):557-570. |
[36] | MACHANAVAJJHALA A , KIFER D , GEHRKE J , et al . L-diversity:privacy beyond k-anonymity[J]. ACM Transactions on Knowledge Discovery from Data (TKDD), 2007,1(1):3. |
[37] | LI N , LI T , VENKATASUBRAMANIAN S . T-closeness:privacy beyond k-anonymity and l-diversity[C]// IEEE 23rd International Con-ference on Data Engineering(ICDE).c 2007:106-115. |
[38] | ZHANG Y , MAO D , ZHANG H , et al . Privacy preserving market schemes for mobile sensing[C]// 2015 44th International Conference on Parallel Processing (ICPP).c 2015:909-918. |
[39] | HUA J , TANG A , ZHONG S . Advertiser and publisher-centric privacy aware online behavioral advertising[C]// IEEE 35th Interna-tional Conference on Distributed Computing Systems (ICDCS).c 2015:298-307. |
[40] | HUA Y , MAO D , ZHANG H , et al . Privacy-preserving utility verifi-cation of the data published by non-interactive differentially private mechanisms[J]. IEEE Transactions on Information Forensics &Security, 2016. |
[41] | CANNY J . Collaborative filtering with privacy[C]// 2002 IEEE Symposium on Security and Privacy.c 2002:45-57. |
[42] | KOREN Y , BELL R , VOLINSKY C , et al . Matrix factorization tech-niques for recommender systems[J]. Computer, 2009(8):30-37. |
[43] | HUA J , XIA C , ZHONG S . Differentially private matrix factoriza-tion[C]// The 24th International Conference on Artificial Intelli-gence(IJCAI).c 2015:1763-1770. |
[44] | CAO J , CONG G , JENSEN C S . Differentially private matrix factoriza-tion[J]. The VLDB Endowment, 2010,3(1/2):1009-1020. |
[45] | ZHENG Y , ZHANG L , XIE X , et al . Mining interesting locations and travel sequences from GPS trajectories[C]// The 18th Interna-tional Conference on World Wide Web.c 2009:791-800. |
[46] | CLARKE R . Person location and person tracking-technologies,risks and policy implications[J]. Information Technology & People, 2001,14(2):206-231. |
[47] | PELLETIER M P , TREPANIER M , MORENCY C . Smart card data use in public transit:a literature review[J]. Transportation Research Part C:Emerging Technologies, 2011,19(4): 557-568. |
[48] | HUA J , GAO Y , ZHONG S . Differentially private publication of general time-serial trajectory data[C]// 2015 IEEE Conference on Computer Communications (INFOCOM).c 2015:549-557. |
[49] | MAO Y , CHEN T , ZHANG Y , et al . Protecting location information in collaborative sensing of cognitive radio networks[C]// The 18th ACM International Conference on Modeling,Analysis and Simula-tion of Wireless and Mobile Systems.c 2015:219-226. |
[50] | ZHONG S , YAO H . Towards cheat-proof cooperative relayfor cognitive radio networks[J]. IEEE Transactions on Parallel and Dis-tributed Systems, 2014,25(9):2442-2451. |
[51] | CHEN T , ZHONG S . Truthful auctions for continuous spectrum with variable bandwidths[J]. IEEE Transactions on Wireless Com-munications, 2014,13(2):1116-1128. |
[52] | HUA D , DU T , ZHONG S . Towards attack-resistant peer-assisted indoor localization[M]// Computer Security—ESORICS 2015.. Springer International Publishing, 2015:417-437. |
[53] | HERRING R , HOFLEITNER A , WORK D , et al . Mobile millen-nium-participatory traffic estimation using mobile phones[C]// CPS Forum,Cyber-Physical Systems Week.c 2009. |
[54] | THIAGARAJAN A , RAVINDRANATH L , LACURTS K , et al . VTrack:accurate,energy-aware road traffic delay estimation using mobile phones[C]// CPS Forum,Cyber-Physical Systems Week.c 2009. |
[55] | DAS T , MOHAN P , PADMANABHAN V N , et al . PRISM:plat-form for remote sensing using smartphones[C]// The 8th Interna-tional Conference on Mobile Systems,Applications,and Services,ACM.c 2010:63-76. |
[56] | RANA R K , CHOU C T , KANHERE S S , et al . Ear-phone:an end-to-end participatory urban noise mapping system[C]// The 9th ACM International Conference on Information Processing in Sen-sor Networks.c 2010:105-116. |
[57] | BAO X , CHOUDHURY R R . Movi:mobile phone based video highlights via collaborative sensing[C]// The 8th International Con-ference on Mobile Systems,Applications,and Services,ACM.c 2010:357-370. |
[58] | ZHANG Y , CHEN Q , ZHONG S . Efficient and privacy-preserving min and k-th min computations in mobile sensing systems[J]. IEEE Transactions on Dependable and Secure Computing, 2015. |
[59] | LI Q , CAO G . Efficient and privacy-preserving data aggregation in mobile sensing[C]// 2012 20th IEEE International Conference on Network Protocols (ICNP).c 2012:1-10. |
[60] | ZHANG Y , CHEN Q , ZHONG S . Privacy-preserving data aggrega-tion in mobile phone sensing[J]. IEEE Transactions on Information Forensics and Security, 2016. |
[61] | ZHANG Y , ZHANG H , TANG S , et al . Designing secure and de-pendable mobile sensing mechanisms with revenue guarantees[J]. IEEE Transactions on Information Forensics and Security, 2016,11(1): 100-113. |
[62] | HAO Z , MAO Y , ZHONG S , et al . Toward wireless security with-out computational assumptions—oblivious transfer based on wire-less channel characteristics[J]. IEEE Transactions on Computers, 2014,63(6): 1580-1593. |
[63] | DU S , HUA J , GAO Y , et al . EV-linker:mapping eavesdropped Wi-Fi packets to individuals via electronic and visual signal matching[J]. Journal of Computer and System Sciences, 2016,82(1): 156-172. |
[64] | ZHONG S , ZHANG Y . How to select optimal gateway in multi-domain wireless networks:alternative solutions without learning[J]. IEEE Transactions on Wireless Communications, 2013,12(11):5620-5630. |
[65] | KATTA N P , REXFORD J , WALKER D . Incremental consistent updates[C]// ACM Sigcomm Workshop on Hot Topics in Software Defined Networking.c 2013:49-54. |
[66] | MAHAJAN R , WATTENHOFER R . On consistent updates in soft-ware defined networks[C]// ACM Sigcomm Workshop on Hot Top-ics in Software Defined Networking.c 2013:20. |
[67] | MCGEER R . A safe,efficient update protocol for OpenFlow net-works[C]// ACM Sigcomm Workshop on Hot Topics in Software Defined Networking.c 2012:61-66. |
[68] | REITBLATT M , FOSTER N , REXFORD J , et al . Abstractions for network update[J]. ACM Sigcomm Computer Communication Re-view, 2012,42(4): 323-334. |
[69] | HUA J , GE X , ZHONG S . Foum:a flow-ordered consistent update mechanism for software-defined networking in adversarial set-tings[C]// IEEE International Conference on Computer Communi-cations (INFOCOM).c 2016. |
[70] | JAIN S , KUMAR A , MANDAL S , et al . B4:experience with a globally-deployed software defined WAN[J]. ACM Sigcomm Computer Communication Review, 2013,43(4): 3-14. |
[71] | CHEN Q , QIAN C , ZHONG S . Privacy-preserving cross-domain routing optimization--a cryptographic approach[C]// IEEE Interna-tional Conference on Network Protocols(ICNP).c 2015:356-365. |
[1] | Saite CHEN, Weihai LI, Yuanzhi YAO, Nenghai YU. Location privacy protection method based on lightweight K-anonymity incremental nearest neighbor algorithm [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 60-72. |
[2] | Feng YU, Qingxin LIN, Hui LIN, Xiaoding WANG. Privacy-enhanced federated learning scheme based on generative adversarial networks [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 113-122. |
[3] | Jianlong XU, Jian LIN, Yusen LI, Zhi XIONG. Distributed user privacy preserving adjustable personalized QoS prediction model for cloud services [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 70-80. |
[4] | Zhe SUN, Hong NING, Lihua YIN, Binxing FANG. Preliminary study on the construction of a data privacy protection course based on a teaching-in-practice range [J]. Chinese Journal of Network and Information Security, 2023, 9(1): 178-188. |
[5] | Xue BAI, Baodong QIN, Rui GUO, Dong ZHENG. Two-party cooperative blind signature based on SM2 [J]. Chinese Journal of Network and Information Security, 2022, 8(6): 39-51. |
[6] | Min XIAO, Tao YAO, Yuanni LIU, Yonghong HUANG. Dynamic and efficient vehicular cloud management scheme with privacy protection [J]. Chinese Journal of Network and Information Security, 2022, 8(6): 70-83. |
[7] | Dong LI, Yanni HAO, Shenghui PENG, Ruijie ZI, Ximeng LIU. Network security of the National Natural Science Foundation of China: today and prospects [J]. Chinese Journal of Network and Information Security, 2022, 8(6): 92-101. |
[8] | Chenxin LU, Bing CHEN, Ning DING, Liquan CHEN, Ge WU. Identity-based anonymous cloud auditing scheme with compact tags [J]. Chinese Journal of Network and Information Security, 2022, 8(6): 156-168. |
[9] | Shengzhi MING, Jianming ZHU, Zhiyuan SUI, Xian ZHANG. Online medical privacy protection strategy under information value-added mechanism [J]. Chinese Journal of Network and Information Security, 2022, 8(6): 169-177. |
[10] | Dibin SHAN, Xuehui DU, Wenjuan WANG, Aodi LIU, Na WANG. Access control relationship prediction method based on GNN dual source learning [J]. Chinese Journal of Network and Information Security, 2022, 8(5): 40-55. |
[11] | Zuobin YING, Yichen FANG, Yiwen ZHANG. Privacy-preserving federated learning framework with dynamic weight aggregation [J]. Chinese Journal of Network and Information Security, 2022, 8(5): 56-65. |
[12] | Chao MU, Xin WANG, Ming YANG, Heng ZHANG, Zhenya CHEN, Xiaoming WU. Hardcoded vulnerability detection approach for IoT device firmware [J]. Chinese Journal of Network and Information Security, 2022, 8(5): 98-110. |
[13] | Xian ZHANG, Jianming ZHU, Zhiyuan SUI, Shengzhi MING. Analysis on anonymity and regulation of digital currency transactions based on game theory [J]. Chinese Journal of Network and Information Security, 2022, 8(5): 150-157. |
[14] | Feng LIU, Jie YANG, Jiayin QI. Survey on blockchain privacy protection techniques in cryptography [J]. Chinese Journal of Network and Information Security, 2022, 8(4): 29-44. |
[15] | Lin JIN, Youliang TIAN. Multi-authority attribute hidden for electronic medical record sharing scheme based on blockchain [J]. Chinese Journal of Network and Information Security, 2022, 8(4): 66-76. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|