Range Proof-Based Noise Filtering Mechanism for IoT Differential Privacy

被引:0
作者
Wei, Jianqi [1 ]
Chen, Yuling [1 ]
Luo, Yun [1 ]
Li, Zaidong [1 ]
机构
[1] Guizhou Univ, Coll Comp Sci & Technol, State Key Lab Publ Big Data, Guiyang, Peoples R China
来源
2024 IEEE CYBER SCIENCE AND TECHNOLOGY CONGRESS, CYBERSCITECH 2024 | 2024年
基金
中国国家自然科学基金;
关键词
Internet of Things; Differential Privacy; Range Proof; Verifiable; CHALLENGES; INTERNET;
D O I
10.1109/CyberSciTech64112.2024.00025
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the rapid development of Internet of Things (IoT) technology, the vast amount of data generated by its devices has raised widespread concern for user privacy protection. Differential Privacy, as a stringent privacy protection measure, plays a significant role in safeguarding individual data. However, implementing Differential Privacy in the IoT environment faces challenges in ensuring data utility. This paper focuses on proposing a Verifiable Differential Privacy (VDP) scheme based on zero-knowledge proofs, under the premise of ensuring data utility. The scheme requires data publishing entities to provide publicly verifiable proofs to confirm the reliability of the dataset and the effectiveness of privacy protection. By introducing a commitment mechanism and range proofs, our model not only protects the interests of data users but also enhances trust in the enforcement of privacy protection measures. The experimental results show that the scheme can effectively filter out unreasonable Differential Privacy noise, ensuring the privacy and reliability of data, offering a new approach to data privacy protection in the IoT field.
引用
收藏
页码:94 / 99
页数:6
相关论文
共 15 条
[1]   Interactive Proofs For Differentially Private Counting [J].
Biswas, Ari ;
Cormode, Graham .
PROCEEDINGS OF THE 2023 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2023, 2023, :1919-1933
[2]   Bulletproofs: Short Proofs for Confidential Transactions and More [J].
Bunz, Benedikt ;
Bootle, Jonathan ;
Boneh, Dan ;
Poelstra, Andrew ;
Wuille, Pieter ;
Maxwell, Greg .
2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2018, :315-334
[3]   Differential privacy: A survey of results [J].
Dwork, Cynthia .
THEORY AND APPLICATIONS OF MODELS OF COMPUTATION, PROCEEDINGS, 2008, 4978 :1-19
[4]   Blockchain-Enhanced Fair and Efficient Energy Trading in Industrial Internet of Things [J].
Hu, Jianwen ;
Chen, Yuling ;
Ren, Xiaojun ;
Yang, Yixian ;
Qian, Xiaobin ;
Yu, Xiaomei .
MOBILE INFORMATION SYSTEMS, 2021, 2021
[5]   IoT security: Review, blockchain solutions, and open challenges [J].
Khan, Minhaj Ahmad ;
Salah, Khaled .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 82 :395-411
[6]   The Internet of Things (IoT): Applications, investments, and challenges for enterprises [J].
Lee, In ;
Lee, Kyoochun .
BUSINESS HORIZONS, 2015, 58 (04) :431-440
[7]   A Regulatable Data Privacy Protection Scheme for Energy Transactions Based on Consortium Blockchain [J].
Li, Yufeng ;
Chen, Yuling ;
Li, Tao ;
Ren, Xiaojun .
SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
[8]  
Narayan A., 2015, EUROSYS 15
[9]  
Sklavos N, 2016, 8 IFIP INT C NEW TEC, P1
[10]   Synthesizing Realistic Trajectory Data With Differential Privacy [J].
Sun, Xinyue ;
Ye, Qingqing ;
Hu, Haibo ;
Wang, Yuandong ;
Huang, Kai ;
Wo, Tianyu ;
Xu, Jie .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2023, 24 (05) :5502-5515