4.8 Article

Location Privacy Protection Based on Differential Privacy Strategy for Big Data in Industrial Internet of Things

期刊

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
卷 14, 期 8, 页码 3628-3636

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TII.2017.2773646

关键词

Differential privacy; Internet of Things (IoT); location privacy protection; location privacy tree (LPT)

资金

  1. National Natural Science Foundation of China [61772282, 61373134, 61772454, 61402234]
  2. Priority Academic Program Development of Jiangsu Higher Education Institutions
  3. Postgraduate Research & Practice Innovation Program of Jiangsu Province [KYCX17_0901]
  4. Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology

向作者/读者索取更多资源

In the research of location privacy protection, the existing methods are mostly based on the traditional anonymization, fuzzy and cryptography technology, and little success in the big data environment, for example, the sensor networks contain sensitive information, which is compulsory to be appropriately protected. Current trends, such as Industrie 4.0 and Internet of Things (loT), generate, process, and exchange vast amounts of security-critical and privacy-sensitive data, which makes them attractive targets of attacks. However, previous methods overlooked the privacy protection issue, leading to privacy violation. In this paper, we propose a location privacy protection method that satisfies differential privacy constraint to protect location data privacy and maximizes the utility of data and algorithm in Industrial loT. In view of the high value and low density of location data, we combine the utility with the privacy and build a multilevel location information tree model. Furthermore, the index mechanism of differential privacy is used to select data according to the tree node accessing frequency. Finally, the Laplace scheme is used to add noises to accessing frequency of the selecting data. As is shown in the theoretical analysis and the experimental results, the proposed strategy can achieve significant improvements in terms of security, privacy, and applicability.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.8
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据