Preference Preserved Privacy Protection Scheme for Smart Home Network System Based on Information Hiding

被引:4
|
作者
Yang, Lina [1 ]
Deng, Haiyu [1 ]
Dang, Xiaocui [1 ]
机构
[1] Guangxi Univ, Sch Comp Elect & Informat, Nanning 530004, Peoples R China
关键词
Smart homes; Privacy; Encryption; Data privacy; Monitoring; Data processing; Smart home; privacy protection; data encryption; information hiding;
D O I
10.1109/ACCESS.2020.2976782
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Smart home is an emerging form of the Internet of things (IoT), which provides a convenient and comfortable living environment for the smart home users. With the explosive growth of smart home information, people pay more attention to the privacy protection of smart home, including the choice of privacy and effective privacy protection scheme. This paper proposes a privacy protection scheme based on information hiding, the scheme guarantees the sensitive data transmitted securely. First, the smart home Real-time sensor data are classified into sensitive data and non-sensitive data through machine learning, the process can be controlled according to the user & x2019;s preferences. Second, the sensitive data can be transmitted securely by ordinary channels using method of combination encryption with information hiding. Experiment results show that this scheme can help users to express their preferences to the privacy protection, changing the previous practice that users can only accept the privacy settings provided by the supplier. What & x2019;s more, the scheme combines encryption with information hiding, providing a double guarantee for the sensitive data during they are transmitted on ordinary channels. Comparing to the previous practice of using encryption merely, this scheme greatly improves the security of data transmission and is more suitable for the real environment.
引用
收藏
页码:40767 / 40776
页数:10
相关论文
共 50 条
  • [21] A user collaboration privacy protection scheme with threshold scheme and smart contract
    Zhang, Lei
    Liu, Desheng
    Chen, Meina
    Li, Hongyan
    Wang, Chao
    Zhang, Yunxiang
    Du, Yunming
    INFORMATION SCIENCES, 2021, 560 : 183 - 201
  • [22] Research on Smart Home Security System Based on BP Neural Network Information Fusion
    Wang, Yongliang
    Lv, Huimin
    Zhang, Qi
    Wang, Pengfei
    Yan, Daliang
    Lu, Dengcheng
    2018 CHINESE AUTOMATION CONGRESS (CAC), 2018, : 1381 - 1384
  • [23] Privacy protection scheme for mobile social network
    Safi, Seyyed Mohammad
    Movaghar, Ali
    Ghorbani, Mohammad
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (07) : 4062 - 4074
  • [24] A Network based Protection Scheme of Distribution System
    Luo, Chao
    Yang, Jun
    Sun, Yuanzhang
    Cai, Mao
    Wu, Jing
    Xu, Liangzhu
    2012 IEEE INTERNATIONAL CONFERENCE ON POWER SYSTEM TECHNOLOGY (POWERCON), 2012,
  • [25] Patient Information, Consents and Privacy Protection Scheme for an Information System Dedicated to Pervasive Developmental Disorders
    Ben Said, Mohamed
    Robel, Laurence
    Messiaen, Claude
    Craus, Yann
    Jais, Jean Philippe
    Golse, Bernard
    Landais, Paul
    E-HEALTH - FOR CONTINUITY OF CARE, 2014, 205 : 755 - 759
  • [26] Network Information Security Privacy Protection System in Big Data Era
    Ma, Lei
    Kang, Ying-jian
    Liu, Jian-ping
    ADVANCED HYBRID INFORMATION PROCESSING, ADHIP 2019, PT I, 2019, 301 : 65 - 73
  • [27] Dynamic feedback bit-level image privacy protection based on chaos and information hiding
    Zhang, Jinlong
    Wen, Heping
    SCIENTIFIC REPORTS, 2024, 14 (01)
  • [28] High capacity information hiding for privacy protection in digital video files
    Elhadad, Ahmed
    Hamad, Safwat
    Khalifa, Amal
    Ghareeb, A.
    NEURAL COMPUTING & APPLICATIONS, 2017, 28 : S91 - S95
  • [29] Image data privacy protection technology based on reversible information hiding and robust secret sharing
    Si, Wenjun
    INTELLIGENT SYSTEMS WITH APPLICATIONS, 2024, 23
  • [30] High capacity information hiding for privacy protection in digital video files
    Ahmed Elhadad
    Safwat Hamad
    Amal Khalifa
    A. Ghareeb
    Neural Computing and Applications, 2017, 28 : 91 - 95