A Hybrid Privacy Protection Scheme in Cyber-Physical Social Networks

被引:48
|
作者
Qu, Youyang [1 ]
Yu, Shui [2 ]
Gao, Longxiang [1 ]
Zhou, Wanlei [2 ]
Peng, Sancheng [3 ]
机构
[1] Deakin Univ, Sch Informat Technol, Geelong, Vic 3125, Australia
[2] Univ Technol Sydney, Sch Software, Ultimo, NSW 2007, Australia
[3] Guangdong Univ Foreign Studies, Sch Informat, Guangzhou 510000, Guangdong, Peoples R China
来源
关键词
Cyber physical social network (CPSN); game theory; Markov decision process; privacy preservation; LOCATION PRIVACY; WIRELESS;
D O I
10.1109/TCSS.2018.2861775
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The rapid proliferation of smart mobile devices has significantly enhanced the popularization of the cyber-physical social network, where users actively publish data with sensitive information. Adversaries can easily obtain these data and launch continuous attacks to breach privacy. However, existing works only focus on either location privacy or identity privacy with a static adversary. This results in privacy leakage and possible further damage. Motivated by this, we propose a hybrid privacy-preserving scheme, which considers both location and identity privacy against a dynamic adversary. We study the privacy protection problem as the tradeoff between the users aiming at maximizing data utility with high-level privacy protection while adversaries possessing the opposite goal. We first establish a game-based Markov decision process model, in which the user and the adversary are regarded as two players in a dynamic multistage zero-sum game. To acquire the best strategy for users, we employ a modified state-action-reward-state-action reinforcement learning algorithm. Iteration times decrease because of cardinality reduction from n to 2, which accelerates the convergence process. Our extensive experiments on real-world data sets demonstrate the efficiency and feasibility of the propose method.
引用
收藏
页码:773 / 784
页数:12
相关论文
共 50 条
  • [1] Cyber-Physical Social Networks
    Von der Weth, Christian
    Abdul, Ashraf M.
    Kankanhalli, Mohan
    [J]. ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2017, 17 (02)
  • [2] Customizable Reliable Privacy-Preserving Data Sharing in Cyber-Physical Social Networks
    Qu, Youyang
    Yu, Shui
    Zhou, Wanlei
    Chen, Shiping
    Wu, Jun
    [J]. IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2021, 8 (01): : 269 - 281
  • [3] SenseWorld: Towards cyber-physical social networks
    Ganti, Raghu K.
    Tsai, Yu-En
    Abdelzaher, Tarek F.
    [J]. 2008 INTERNATIONAL CONFERENCE ON INFORMATION PROCESSING IN SENSOR NETWORKS, PROCEEDINGS, 2008, : 563 - 564
  • [4] Privacy Reserved Influence Maximization in GPS-enabled Cyber-physical and Online Social Networks
    Han, Meng
    Li, Ji
    Cai, Zhipeng
    Han, Qilong
    [J]. PROCEEDINGS OF 2016 IEEE INTERNATIONAL CONFERENCES ON BIG DATA AND CLOUD COMPUTING (BDCLOUD 2016) SOCIAL COMPUTING AND NETWORKING (SOCIALCOM 2016) SUSTAINABLE COMPUTING AND COMMUNICATIONS (SUSTAINCOM 2016) (BDCLOUD-SOCIALCOM-SUSTAINCOM 2016), 2016, : 284 - 292
  • [5] Cyber-Physical Security and Privacy Introduction
    Cardenas, Alvaro
    Crispo, Bruno
    [J]. IEEE INTERNET COMPUTING, 2016, 20 (05) : 6 - 8
  • [6] Cyber-Physical Systems Security and Privacy
    Henkel, Jorg
    [J]. IEEE DESIGN & TEST, 2017, 34 (04) : 4 - 4
  • [7] Programming Model Perspective on Security and Privacy of Social Cyber-Physical Systems
    Kannisto, Joona
    Makitalo, Niko
    Aaltonen, Timo
    Mikkonen, Tommi
    [J]. 2016 5TH IEEE INTERNATIONAL CONFERENCE ON MOBILE SERVICES (MS 2016), 2016, : 87 - 94
  • [8] Cyber-Physical Risk Assessment for Smart Grid System Protection Scheme
    Wang, Pengyuan
    Ashok, Aditya
    Govindarasu, Manimaran
    [J]. 2015 IEEE POWER & ENERGY SOCIETY GENERAL MEETING, 2015,
  • [9] Robust protection scheme against cyber-physical attacks in power systems
    Di Giorgio, Alessandro
    Pietrabissa, Antonio
    Delli Priscoli, Francesco
    Isidori, Alberto
    [J]. IET CONTROL THEORY AND APPLICATIONS, 2018, 12 (13): : 1792 - 1801
  • [10] Cyber-Physical Networks and Software
    Xia, Feng
    Ivanovic, Mirjana
    [J]. COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2011, 8 (04)