Research on Privacy Protection Technology for Data Publishing

被引:1
作者
Qu, Lianwei [1 ]
Yang, Jing [1 ]
Yan, Xueyun [1 ]
Ma, Lixin [1 ]
Yang, Qixuan [1 ]
Han, Yaxin [1 ]
机构
[1] Harbin Engn Univ, Harbin, Peoples R China
来源
2021 21ST INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY COMPANION (QRS-C 2021) | 2021年
基金
中国国家自然科学基金; 中国博士后科学基金;
关键词
component; Internet of Things; data publishing; attack models; privacy protection; LOCATION PRIVACY; DIFFERENTIAL PRIVACY; K-ANONYMITY;
D O I
10.1109/QRS-C55045.2021.00151
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
With the Internet of Things (IoT) technology development, the agent terminals are able to collect and publish richer and more valuable privacy data. If it is short of the necessary privacy protection measures, the published private data will be leaked. The core of privacy protection technology in the field of data publishing is anonymity technology, encryption technology, and distortion technology. Current privacy protection methods cannot effectively keep the balance between data privacy and availability. This paper will conduct a systematic comparative analysis of the data publishing model, attack models, data publishing privacy protection technologies as well as applications in other fields. Finally, we will summarize the current research progress and problems.
引用
收藏
页码:999 / 1005
页数:7
相关论文
共 39 条
[1]  
Abul O, 2008, PROC INT CONF DATA, P376, DOI 10.1109/ICDE.2008.4497446
[2]   Internet of Things: A survey on the security of IoT frameworks [J].
Ammar, Mahmoud ;
Russello, Giovanni ;
Crispo, Bruno .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 38 :8-27
[3]   Location privacy in pervasive computing [J].
Beresford, AR ;
Stajano, F .
IEEE PERVASIVE COMPUTING, 2003, 2 (01) :46-55
[4]   Differential privacy: A survey of results [J].
Dwork, Cynthia .
THEORY AND APPLICATIONS OF MODELS OF COMPUTATION, PROCEEDINGS, 2008, 4978 :1-19
[5]  
Dwork C, 2006, LECT NOTES COMPUT SC, V4052, P1
[6]   Calibrating noise to sensitivity in private data analysis [J].
Dwork, Cynthia ;
McSherry, Frank ;
Nissim, Kobbi ;
Smith, Adam .
THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2006, 3876 :265-284
[7]  
FANG Binxing, 2016, BIG DATA-US, V2, P1
[8]   Edge-centric Computing: Vision and Challenges [J].
Garcia Lopez, Pedro ;
Montresor, Alberto ;
Epema, Dick ;
Datta, Anwitaman ;
Higashino, Teruo ;
Iamnitchi, Adriana ;
Barcellos, Marinho ;
Felber, Pascal ;
Riviere, Etienne .
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2015, 45 (05) :37-42
[9]   Protecting location privacy with personalized k-anonymity:: Architecture and algorithms [J].
Gedik, Bugra ;
Liu, Ling .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2008, 7 (01) :1-18
[10]   Anonymous usage of location-based services through spatial and temporal cloaking [J].
Gruteser, M ;
Grunwald, D .
PROCEEDINGS OF MOBISYS 2003, 2003, :31-42