Preference Preserved Privacy Protection Scheme for Smart Home Network System Based on Information Hiding

被引:4
|
作者
Yang, Lina [1 ]
Deng, Haiyu [1 ]
Dang, Xiaocui [1 ]
机构
[1] Guangxi Univ, Sch Comp Elect & Informat, Nanning 530004, Peoples R China
关键词
Smart homes; Privacy; Encryption; Data privacy; Monitoring; Data processing; Smart home; privacy protection; data encryption; information hiding;
D O I
10.1109/ACCESS.2020.2976782
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Smart home is an emerging form of the Internet of things (IoT), which provides a convenient and comfortable living environment for the smart home users. With the explosive growth of smart home information, people pay more attention to the privacy protection of smart home, including the choice of privacy and effective privacy protection scheme. This paper proposes a privacy protection scheme based on information hiding, the scheme guarantees the sensitive data transmitted securely. First, the smart home Real-time sensor data are classified into sensitive data and non-sensitive data through machine learning, the process can be controlled according to the user & x2019;s preferences. Second, the sensitive data can be transmitted securely by ordinary channels using method of combination encryption with information hiding. Experiment results show that this scheme can help users to express their preferences to the privacy protection, changing the previous practice that users can only accept the privacy settings provided by the supplier. What & x2019;s more, the scheme combines encryption with information hiding, providing a double guarantee for the sensitive data during they are transmitted on ordinary channels. Comparing to the previous practice of using encryption merely, this scheme greatly improves the security of data transmission and is more suitable for the real environment.
引用
收藏
页码:40767 / 40776
页数:10
相关论文
共 50 条
  • [41] Efficient privacy protection scheme with batch verification in smart grid
    Wang, Mingxiang
    Zhang, Lei
    FRONTIERS IN ENERGY RESEARCH, 2024, 11
  • [42] Privacy Protection Scheme in Smart Grid Using Rechargeable Battery
    Niu Yukun
    Tan Xiaobin
    Zhou Zifei
    Zheng Jiangyu
    Zhu Jin
    2013 32ND CHINESE CONTROL CONFERENCE (CCC), 2013, : 8825 - 8830
  • [43] A Privacy Protection System for HbbTV in Smart TVs
    Ghiglieri, Marco
    Tews, Erik
    2014 IEEE 11TH CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE (CCNC), 2014,
  • [44] A Network Information Data Protection Scheme Based on Superposition Encryption
    Zhe, Liu
    SIGNAL AND INFORMATION PROCESSING, NETWORKING AND COMPUTERS (ICSINC), 2019, 550 : 608 - 615
  • [45] Regional protection scheme for distribution network based on logical information
    Ma, Jing
    Xiang, Xiaoqiang
    Zhang, Runfeng
    Li, Pei
    Liu, Jing
    Thorp, James S.
    IET GENERATION TRANSMISSION & DISTRIBUTION, 2017, 11 (17) : 4314 - 4323
  • [46] A Tree Based Recursive Information Hiding Scheme
    Parakh, Abhishek
    Kak, Subhash
    2010 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS - ICC 2010, 2010,
  • [47] A novel information hiding scheme based on BTC
    Lin, NH
    Chang, CC
    FOURTH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY, PROCEEDINGS, 2004, : 66 - 71
  • [48] A scheme of reversible information hiding based on SMVQ
    Huang, C-T
    Wang, W-J
    Yang, C-H
    Wang, S-J
    IMAGING SCIENCE JOURNAL, 2013, 61 (02): : 195 - 203
  • [49] Semantics-Preserved Distortion for Personal Privacy Protection in Information Management
    Li, Jiajia
    Yang, Lu
    Peng, Letian
    Zhang, Shitou
    Wang, Ping
    Li, Zuchao
    Zhao, Hai
    ARTIFICIAL NEURAL NETWORKS AND MACHINE LEARNING-ICANN 2024, PT V, 2024, 15020 : 386 - 401
  • [50] Hiding digital information using a novel system scheme
    Yeh, WH
    Hwang, JJ
    COMPUTERS & SECURITY, 2001, 20 (06) : 533 - 538