[1]刘欢,吴桂兴.众包环境下的隐私保护研究[J].计算机技术与发展,2018,28(12):111-115.[doi:10.3969/j. issn.1673-629X.2018.12.024]
 LIU Huan,WU Guixing.Research on Privacy Protection in Crowdsourcing[J].,2018,28(12):111-115.[doi:10.3969/j. issn.1673-629X.2018.12.024]
点击复制

众包环境下的隐私保护研究()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
28
期数:
2018年12期
页码:
111-115
栏目:
安全与防范
出版日期:
2018-12-10

文章信息/Info

Title:
Research on Privacy Protection in Crowdsourcing
文章编号:
1673-629X(2018)12-0111-05
作者:
刘欢吴桂兴
中国科学技术大学 软件学院,江苏 苏州 215123
Author(s):
LIU HuanWU Gui-xing
School of Software Engineering,University of Science and Technology of China,Suzhou 215123,China
关键词:
众包计算隐私保护差分隐私机制设计
Keywords:
crowdsourcing calculationprivacy protectiondifferential privacymechanism design
分类号:
TP391
DOI:
10.3969/j. issn.1673-629X.2018.12.024
摘要:
自从众包的概念被提出以来,就日益受到学术界和工业界的广泛关注,而且随着移动互联网和智能设备的蓬勃发展,众包任务的执行也变得更加便利和高效。可以说,众包已经成为一个热门的研究方向。与此同时,人们也越来越重视个人的信息隐私,尤其是在执行众包任务时,人们不希望透露过多的个人信息,以免造成不必要的安全隐患。因此,需要在设计众包机制的时候,考虑到隐私保护,做到既能保证众包任务的顺利执行,又能保护参与者的隐私数据。为此,不仅介绍了众包的概念和工作流程,还详细介绍了差分隐私的数学定义以及实现机制。同时,也对差分隐私在不同众包场景下的应用做了分析,分别是:保护用户提供的数据、保护用户的位置信息以及保护用户的出价信息。通过总结现有的研究,最后对未来的研究方向进行展望。
Abstract:
:Since the concept of crowdsourcing has been raised,it has drawn increasing attention from academia and industry,and with thebooming development of mobile internet and smart devices,the execution of crowdsourcing tasks has become more convenient and effi-cient. It can be said that crowdsourcing has become a very promising area of development. At the same time,people pay more and moreattention to individual information privacy. Especially in the process of crowdsourcing,people do not want to disclose excessive personalinformation in order to avoid unnecessary security risks. Therefore,it is necessary to consider the privacy protection when designing thecrowdsourcing mechanism so as to ensure the smooth execution of crowdsourcing tasks and protect the privacy data of participants. Wenot only introduce the concept and workflow of Crowdsourcing,but also introduce in detail the mathematical definition of differential pri-vacy and implementation mechanisms. At the same time,we analyze the application of differential privacy in different crowdsourcing sce-narios including protection of data provided by users,location information of users and bid information of users. By summarizing the ex-isting research,we prospect the future research direction.

相似文献/References:

[1]耿波 仲红 徐杰 闫娜娜.隐私保护的关联规则挖掘研究[J].计算机技术与发展,2009,(02):81.
 GENG Bo,ZHONG Hong,XU Jie,et al.Study on Privacy- Preserving Association Rule Mining[J].,2009,(12):81.
[2]张瑞 郑诚 陈娟娟.关联规则挖掘中的隐私保护研究[J].计算机技术与发展,2008,(10):13.
 ZHANG Rui,ZHENG Cheng,CFIEN Juan-juan.Research on Privacy Preserving in Association Rules Mining[J].,2008,(12):13.
[3]李玲娟 郑少飞.基于数据处理的数据挖掘隐私保护技术分析[J].计算机技术与发展,2011,(03):94.
 LI Ling-juan,ZHENG Shao-fei.Analysis of Data Mining Privacy Preserving Technology Based on Data Processing[J].,2011,(12):94.
[4]杜定宇 王茜.一种基于中间代理的个性化推荐系统[J].计算机技术与发展,2011,(09):66.
 DU Ding-yu,WANG Qian.An Agent-Based Personalized Recommendation System[J].,2011,(12):66.
[5]杨宸 薛丹 周健.带空间特性的访问控制在汽车终端上的应用[J].计算机技术与发展,2012,(01):225.
 YANG Chen,XUE Dan,ZHOU Jian.Application of Role-Based Access Control with Spatial Character in Automobile Terminal[J].,2012,(12):225.
[6]韦琳 许峰.医疗网格隐私保护技术研究[J].计算机技术与发展,2012,(05):254.
 WEI Lin,XU Feng.Privacy Preservation in Heaithgrid:A Survey[J].,2012,(12):254.
[7]赵丹 杨庚.一种基于复数域的数据融合完整性保护算法[J].计算机技术与发展,2012,(08):150.
 ZHAO Dan,YANG Geng.A Complex Field-based Integrity-protecting Data Aggregation Algorithm[J].,2012,(12):150.
[8]吴婷婷,李玲娟.面向 RFID 的位置隐私保护算法研究[J].计算机技术与发展,2013,(01):157.
 WU Ting-ting,LI Ling-juan.Study on RFID-oriented Location Privacy Protection Algorithm[J].,2013,(12):157.
[9]梁庆庆,杨庚.一种低通信量的数据融合隐私保护算法[J].计算机技术与发展,2013,(08):133.
 LIANG Qing-qing,YANG Geng.A Low_traffic Privacy-preserving Aggregation Algorithm[J].,2013,(12):133.
[10]张燕,曹晓梅.基于隐私保护的非线性安全数据融合方案[J].计算机技术与发展,2013,(09):114.
 ZHANG Yan,CAO Xiao-mei.Nonlinear Secure Data Aggregation Scheme Based on Privacy Protection[J].,2013,(12):114.

更新日期/Last Update: 2018-12-10