A differential privacy protection scheme for sensitive big data in body sensor networks

被引:38
|
作者
Lin, Chi [1 ,2 ]
Wang, Pengyu [1 ,2 ]
Song, Houbing [3 ]
Zhou, Yanhong [1 ,2 ]
Liu, Qing [1 ,2 ]
Wu, Guowei [1 ,2 ]
机构
[1] Dalian Univ Technol, Sch Software, Dalian, Peoples R China
[2] Key Lab Ubiquitous Network & Serv Software Liaoni, Dalian, Peoples R China
[3] West Virginia Univ, Dept Elect & Comp Engn, Montgomery, WV 25136 USA
基金
中国国家自然科学基金;
关键词
Sensitive information; Body sensor networks; Differential privacy protection; OF-THE-ART; ASSOCIATION RULES; HEALTH-CARE; WIRELESS; SECURITY;
D O I
10.1007/s12243-016-0498-7
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
As a special kind of application of wireless sensor networks, body sensor networks (BSNs) have broad application perspectives in health caring. Big data acquired from BSNs usually contain sensitive information, such as physical condition, location information, and so on, which is compulsory to be appropriately protected. However, previous methods overlooked the privacy protection issue, leading to privacy violation. In this paper, a differential privacy protection scheme for sensitive big data in BSNs is proposed. A tree structure is constructed to reduce errors and provide long range queries. Haar Wavelet transformation method is applied to convert histogram into a complete binary tree. At last, to verify the advantages of our scheme, several experiments are conducted to show the outperformed results. Experimental results demonstrate that the tree structure greatly reduces the calculation overheads which preserves differential privacy for users.
引用
收藏
页码:465 / 475
页数:11
相关论文
共 50 条
  • [31] Differential privacy trajectory data protection scheme based on R-tree
    Yuan, Shuilian
    Pi, Dechang
    Zhao, Xiaodong
    Xu, Meng
    EXPERT SYSTEMS WITH APPLICATIONS, 2021, 182
  • [32] Differential privacy protection scheme supporting high data utility and fault tolerance
    Zhang L.
    Zhang J.
    Zhejiang Daxue Xuebao (Gongxue Ban)/Journal of Zhejiang University (Engineering Science), 2019, 53 (08): : 1496 - 1505
  • [33] Differential privacy trajectory data protection scheme based on R-tree
    Yuan, Shuilian
    Pi, Dechang
    Zhao, Xiaodong
    Xu, Meng
    Pi, Dechang (pinuaa@nuaa.edu.cn), 1600, Elsevier Ltd (182):
  • [34] An Efficient and Certificateless Conditional Privacy-Preserving Authentication Scheme for Wireless Body Area Networks Big Data Services
    Ji, Sai
    Gui, Ziyuan
    Zhou, Tianqi
    Yan, Hongyang
    Shen, Jian
    IEEE ACCESS, 2018, 6 : 69603 - 69611
  • [35] Privacy Cost Analysis and Privacy Protection Based on Big Data
    周蔷
    岳开旭
    段垚
    Journal of Donghua University(English Edition), 2019, 36 (01) : 96 - 105
  • [36] A key management scheme realising location privacy protection for heterogeneous wireless sensor networks
    Yuan, Erdong
    Wang, Liejun
    INTERNATIONAL JOURNAL OF SENSOR NETWORKS, 2020, 32 (01) : 34 - 41
  • [37] Challenges of Privacy Protection in Big Data Analytics
    Jensen, Meiko
    2013 IEEE INTERNATIONAL CONGRESS ON BIG DATA, 2013, : 235 - 238
  • [38] A Journey on Privacy protection strategies in big data
    Viji, D.
    Saravanan, K.
    Hemavathi, D.
    2017 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICICCS), 2017, : 1344 - 1347
  • [39] Personal privacy protection in the era of big data
    Liu, Yahui
    Zhang, Tieying
    Jin, Xiaolong
    Cheng, Xueqi
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2015, 52 (01): : 229 - 247
  • [40] Comprehensive Survey on Big Data Privacy Protection
    Binjubeir, Mohammed
    Ahmed, Abdulghani Ali
    Bin Ismail, Mohd Arfian
    Sadiq, Ali Safaa
    Khan, Muhammad Khurram
    IEEE ACCESS, 2020, 8 : 20067 - 20079