Computational data privacy in wireless networks

被引:0
|
作者
Jian Wang
Zhipeng Wu
Yanheng Liu
Weiwen Deng
Heekuck Oh
机构
[1] Jilin University,College of Computer Science and Technology
[2] Jilin University,College of Software
[3] Jilin University,Key Laboratory of Symbolic Communication and Knowledge Engineering of Ministry of Education
[4] Jilin University,State Key Laboratory of Automotive Simulation and Control
[5] Hanyang University,Department of Computer Science and Engineering
关键词
Wireless network; Data privacy; Privacy quantification; Privacy protection; Privacy entropy; Privacy joint entropy;
D O I
暂无
中图分类号
学科分类号
摘要
Wireless networks appeal to privacy eavesdroppers that secretly capture packets from the open medium and read the metadata and data content in search of any type of information through data mining and statistical analysis. Addressing the problems of personal privacy for wireless users will require flexible privacy protection mechanisms adaptively to the frequently varying context. Privacy quantification is prerequisite for enabling a context-aware privacy protection in wireless networks. This paper proposes to quantify the data privacy during wireless communication processes. We give a computational quantification method of data privacy through introducing the concepts of privacy entropy and privacy joint entropy, which permits users and applications to on-demand customize their preferential sensitivity extent of privacy leakage and protection strength. Accordingly, we put forward a data-privacy protection scheme in order to explain how to utilize the proposed computational quantification method of data privacy against the excessive disclosure of data privacy. The results show that the computational quantitation method can effectively characterize the real-time fluctuation of data privacy during communication processes and provide the reliable judgment to context-aware privacy protection, which enables to real-timely control the present data privacy to an anticipated target and to balance a tradeoff between the data privacy and communication efficiency.
引用
收藏
页码:865 / 873
页数:8
相关论文
共 50 条
  • [41] Location Privacy in Unattended Wireless Sensor Networks upon the Requirement of Data Survivability
    Chen, Chung-Wei
    Tsai, Yuh-Ren
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2011, 29 (07) : 1480 - 1490
  • [42] Using data mules to preserve source location privacy in Wireless Sensor Networks
    Raj, Mayank
    Li, Na
    Liu, Donggang
    Wright, Matthew
    Das, Sajal K.
    PERVASIVE AND MOBILE COMPUTING, 2014, 11 : 244 - 260
  • [43] A Balance Privacy-Preserving Data Aggregation Model in Wireless Sensor Networks
    Zhang, Changlun
    Li, Chao
    Zhao, Yi
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2015,
  • [44] SECURITY AND PRIVACY IN EMERGING WIRELESS NETWORKS
    Cao, Guohong
    Hubaux, Jean-Pierre
    Kim, Yongdae
    Zhang, Yanchao
    IEEE WIRELESS COMMUNICATIONS, 2010, 17 (05) : 10 - 11
  • [45] Privacy Provisioning in Wireless Sensor Networks
    Manjusha Pandey
    Shekhar Verma
    Wireless Personal Communications, 2014, 75 : 1115 - 1140
  • [46] Ensure wireless data privacy on the road
    Anton, B
    COMMUNICATIONS NEWS, 2003, 40 (05): : 46 - 47
  • [47] Privacy-enhancing data aggregation and data analytics in wireless networks for a large class of distributed queries
    Yang, Xuechao
    Kelarev, Andrei
    Yi, Xun
    WIRELESS NETWORKS, 2024, 30 (06) : 4749 - 4759
  • [48] Data fusion privacy preserving algorithm based on failure nodes in wireless sensor networks
    Sun Z.
    Hou X.
    Li X.
    Hou, Xiaojing, 1600, UK Simulation Society, Clifton Lane, Nottingham, NG11 8NS, United Kingdom (17): : 38.1 - 38.7
  • [49] EPSDA: Energy Efficient Privacy preserving Secure Data Aggregation for Wireless Sensor Networks
    Jose, Joyce
    Princy, M.
    Jose, Josna
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (04): : 299 - 315
  • [50] Research on Location Privacy Protection Technology in Wireless Sensor Networks Based on Big Data
    Zhang H.
    Li P.
    Journal of Cyber Security and Mobility, 2023, 12 (06): : 845 - 868