Computational data privacy in wireless networks

被引:0
|
作者
Jian Wang
Zhipeng Wu
Yanheng Liu
Weiwen Deng
Heekuck Oh
机构
[1] Jilin University,College of Computer Science and Technology
[2] Jilin University,College of Software
[3] Jilin University,Key Laboratory of Symbolic Communication and Knowledge Engineering of Ministry of Education
[4] Jilin University,State Key Laboratory of Automotive Simulation and Control
[5] Hanyang University,Department of Computer Science and Engineering
关键词
Wireless network; Data privacy; Privacy quantification; Privacy protection; Privacy entropy; Privacy joint entropy;
D O I
暂无
中图分类号
学科分类号
摘要
Wireless networks appeal to privacy eavesdroppers that secretly capture packets from the open medium and read the metadata and data content in search of any type of information through data mining and statistical analysis. Addressing the problems of personal privacy for wireless users will require flexible privacy protection mechanisms adaptively to the frequently varying context. Privacy quantification is prerequisite for enabling a context-aware privacy protection in wireless networks. This paper proposes to quantify the data privacy during wireless communication processes. We give a computational quantification method of data privacy through introducing the concepts of privacy entropy and privacy joint entropy, which permits users and applications to on-demand customize their preferential sensitivity extent of privacy leakage and protection strength. Accordingly, we put forward a data-privacy protection scheme in order to explain how to utilize the proposed computational quantification method of data privacy against the excessive disclosure of data privacy. The results show that the computational quantitation method can effectively characterize the real-time fluctuation of data privacy during communication processes and provide the reliable judgment to context-aware privacy protection, which enables to real-timely control the present data privacy to an anticipated target and to balance a tradeoff between the data privacy and communication efficiency.
引用
收藏
页码:865 / 873
页数:8
相关论文
共 50 条
  • [31] Privacy-Aware Probabilistic Sampling for Data Collection in Wireless Sensor Networks
    Guerreiro, Joao
    Ngai, Edith C. -H.
    Rohner, Christian
    2011 7TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2011, : 314 - 319
  • [32] Security and Privacy in Wireless and Mobile Networks
    Kambourakis, Georgios
    Gomez Marmol, Felix
    Wang, Guojun
    FUTURE INTERNET, 2018, 10 (02)
  • [33] Privacy Provisioning in Wireless Sensor Networks
    Pandey, Manjusha
    Verma, Shekhar
    WIRELESS PERSONAL COMMUNICATIONS, 2014, 75 (02) : 1115 - 1140
  • [34] A Security Framework for Privacy-Preserving Data Aggregation in Wireless Sensor Networks
    Chan, Aldar C-F.
    Castelluccia, Claude
    ACM TRANSACTIONS ON SENSOR NETWORKS, 2011, 7 (04)
  • [35] Query privacy in wireless sensor networks
    Carbunar, Bogdan
    Yu, Yang
    Shi, Larry
    Pearce, Michael
    Vasudevan, Venu
    2007 4TH ANNUAL IEEE COMMUNICATIONS SOCIETY CONFERENCE ON SENSOR, MESH AND AD-HOC COMMUNICATIONS AND NETWORKS, VOLS 1 AND 2, 2007, : 203 - 212
  • [36] DyDAP: A dynamic data aggregation scheme for privacy aware wireless sensor networks
    Sicari, Sabrina
    Grieco, Luigi Alfredo
    Boggia, Gennaro
    Coen-Porisini, Alberto
    JOURNAL OF SYSTEMS AND SOFTWARE, 2012, 85 (01) : 152 - 166
  • [37] Privacy-Preserving Data Aggregation Protocols for Wireless Sensor Networks: A Survey
    Bista, Rabindra
    Chang, Jae-Woo
    SENSORS, 2010, 10 (05) : 4577 - 4601
  • [38] Security and Privacy in Emerging Wireless Networks
    Yang, Qing
    Lu, Rongxing
    Challal, Yacine
    Laurent, Maryline
    SECURITY AND COMMUNICATION NETWORKS, 2017,
  • [39] A General Purpose Data and Query Privacy Preserving Protocol for Wireless Sensor Networks
    Hrovatin, Niki
    Tosic, Aleksandar
    Mrissa, Michael
    Vicic, Jernej
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 4883 - 4898
  • [40] Data processing based on the privacy-preserving vector for wireless sensor networks
    Zeng, Wei-Ni
    Lin, Ya-Ping
    Yi, Ye-Qing
    He, Shi-Ming
    Chen, Peng
    Tongxin Xuebao/Journal on Communications, 2015, 36 (09): : 34 - 46