Font Size: a A A

Origin Of Sensor Data Privacy Protection Technology Research And Application

Posted on:2013-02-11Degree:MasterType:Thesis
Country:ChinaCandidate:Y H ChengFull Text:PDF
GTID:2218330371459825Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Privacy and Security is an eternal theme of the information field. The application based on Internet of Things (IOT) will improve the requirements of privacy protection and security to a new level. There are a large number of privacy-sensitive devices in IOT, such as Location Tracking equipments, Medical Sensors. These devices gather sensor data, process it and submit it to users ultimately. The process results in a number of information links in data provenance. However, because there are a lot of nodes containing privacy in the sensor network environment, the data gathered also contains private data. It is easy to expose location, time and personal identity through querying and tracking. Even worse, these sensitive data may be used by malicious person.Firstly, this paper introduces an open provenance model, analyzes the reason of privacy disclosure of provenance in IOT and indicates the specificity of provenance privacy in this environment. Based on the idea of using an attribute-based access control method to protect the privacy of data provenance in IOT, it establishes an attribute-based access control model for sensor data provenance. Meanwhile, in order to solve the problem of strategy conflict, this paper designs an access policy authorization algorithm. In order to solve the problem that unauthorized visitors may infer the provenance of some data through the relation edge, it designs a relation edge access control algorithm. At last, this paper focuses on K-anonymity techniques and studies its application in the privacy protection for sensor data provenance, and then improves a K-anonymity clustering algorithm for these data. Experiments prove that the Attribute-based access control model and K-anonymity clustering algorithm can effectively solve the problem of provenance privacy disclosure in the IOT environment.
Keywords/Search Tags:Data Provenance, Privacy Protection, IOT, Access Control, K-anonymity
PDF Full Text Request
Related items