Computational data privacy in wireless networks

被引:4
作者
Wang, Jian [1 ,3 ,4 ,5 ]
Wu, Zhipeng [2 ]
Liu, Yanheng [1 ,3 ,4 ]
Deng, Weiwen [4 ]
Oh, Heekuck [5 ]
机构
[1] Jilin Univ, Coll Comp Sci & Technol, Changchun 130012, Peoples R China
[2] Jilin Univ, Coll Software, Changchun 130012, Peoples R China
[3] Jilin Univ, Minist Educ, Key Lab Symbol Commun & Knowledge Engn, Changchun 130012, Peoples R China
[4] Jilin Univ, State Key Lab Automot Simulat & Control, Changchun 130012, Peoples R China
[5] Hanyang Univ, Dept Comp Sci & Engn, Ansan 426791, South Korea
关键词
Wireless network; Data privacy; Privacy quantification; Privacy protection; Privacy entropy Privacy; joint entropy; PROTECTION; LEAKAGE;
D O I
10.1007/s12083-016-0435-6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless networks appeal to privacy eavesdroppers that secretly capture packets from the open medium and read the metadata and data content in search of any type of information through data mining and statistical analysis. Addressing the problems of personal privacy for wireless users will require flexible privacy protection mechanisms adaptively to the frequently varying context. Privacy quantification is prerequisite for enabling a context-aware privacy protection in wireless networks. This paper proposes to quantify the data privacy during wireless communication processes. We give a computational quantification method of data privacy through introducing the concepts of privacy entropy and privacy joint entropy, which permits users and applications to on-demand customize their preferential sensitivity extent of privacy leakage and protection strength. Accordingly, we put forward a data-privacy protection scheme in order to explain how to utilize the proposed computational quantification method of data privacy against the excessive disclosure of data privacy. The results show that the computational quantitation method can effectively characterize the real-time fluctuation of data privacy during communication processes and provide the reliable judgment to context-aware privacy protection, which enables to real-timely control the present data privacy to an anticipated target and to balance a tradeoff between the data privacy and communication efficiency.
引用
收藏
页码:865 / 873
页数:9
相关论文
共 24 条
[1]  
Agrawal D., 2001, Proceedings of the twentieth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems (PODS '01), P247, DOI [10.1145/375551.375602, DOI 10.1145/375551.375602]
[2]  
Alfalayleh M, 2014, ARXIV14092112
[3]  
[Anonymous], 1991, ELEMENTS INFORM THEO
[4]  
Bertino E, 2008, ADV DATABASE SYST, V34, P183
[5]   A privacy preserving authorisation system for the cloud [J].
Chadwick, David W. ;
Fatema, Kaniz .
JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2012, 78 (05) :1359-1373
[6]  
Chen YW, 2012, COMM COM INF SC, V307, P225
[7]  
Dwork C, 2006, LECT NOTES COMPUT SC, V4052, P1
[8]   Privacy-Preserving Data Publishing: A Survey of Recent Developments [J].
Fung, Benjamin C. M. ;
Wang, Ke ;
Chen, Rui ;
Yu, Philip S. .
ACM COMPUTING SURVEYS, 2010, 42 (04)
[9]   Privacy Protected Data Forwarding in Human associated Delay Tolerant Networks [J].
Gao, Longxiang ;
Li, Ming ;
Zhou, Wanlei ;
Shi, Wen .
2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, :586-593
[10]  
Huang X, 2012, INT CONF INTERNET, P597