Skip to main content
Log in

A privacy-preserving data collection model for digital community

一种数字社区的隐私保护数据收集模型

  • Research Paper
  • Published:
Science China Information Sciences Aims and scope Submit manuscript

Abstract

The widespread use of mobile devices in digital community has promoted the variety of data collecting methods. However, the privacy of individuals plays an important role in data processing or data transmission, and such information should be protected. In this paper, (α, k)-anonymity model, a widely used privacy-preserving model, is adopted as a security frame. Then, a privacy-preserving data collection model ((α, k))-CM based on (α, k)-anonymity is proposed and the threat model is analyzed. To resist the possible attack, we propose a generalization-encryption method to achieve a desired privacy level in (α, k)-CM. Generalization can decrease the data size and save the resource might induce information loss in data process; while encryption can decrease information loss, however, it can cause the waste of resource. Generalization-encryption method dynamically encrypts a portion of the data with maximum information loss and adjusts the portion to balance the trade-off metric in the process of generalization. Experimental results and theoretical analysis show that this method is effective in terms of privacy levels and data quality with low resource consumption.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  1. Lakshmi S, Ramesh P S. Secure encrypted-data routing protocol for wireless sensor networks. J Comput Appl, 2012, 5: 167–173

    Google Scholar 

  2. Kumar S, Dohare D, Kumar M. An efficient key distribution scheme for wireless sensor networks using polynomial based schemes. In: Proceeding of the 2012 International Conference on Information and Network Technology, Singapore, 2012. 21–27

    Google Scholar 

  3. Chen C, He D J, Chan S, et al. Lightweight and provably secure user authentication with anonymity for the global mobility network. Int J Commun Syst, 2011, 24: 347–362

    Article  Google Scholar 

  4. Tseng Y M, Huang Y H, Chang H J. Privacy-preserving multireceiver ID-based encryption with provable security. Int J Commun Syst, 2014, 27: 1034–1050

    Article  Google Scholar 

  5. Zhang T, Ma J F, Li Q, et al. Trust-based service composition in multi-domain environments under time constraint. Sci China Inf Sci, 2014, 57: 092109

    Google Scholar 

  6. Fung B C M, Wang K, Chen R, et al. Privacy-preserving data publishing: a survey on recent developments. ACM Comput Surv, 2010, 42: 1–14

    Article  Google Scholar 

  7. Sridhar V, Raghavendar V. Key predistribution scheme for grid based wireless sensor networks using quadruplex polynomial shares per node. Procedia Comput Sci, 2011, 5: 132–140

    Article  Google Scholar 

  8. Lee E, Park S, Lee J, et al. Novel service protocol for supporting remote and mobile users in wireless sensor networks with multiple static sinks. Wirel Netw, 2011, 17: 861–875

    Article  Google Scholar 

  9. Boulfekhar S, Bouallouche L, Benmohammed M. S-TDMA: a new MAC protocol for wireless sensor networks. In: Proceeding of 2012 IEEE/ACM 16th International Symposium on Distributed Simulation and Real Time Applications, Dublin, 2012. 29–35

    Chapter  Google Scholar 

  10. Sweeney L. Achieving k-anonymity privacy protection using generalization and suppression. Int J Uncertainty Fuzziness Knowl-Based Syst, 2002, 10: 571–588

    Article  MATH  MathSciNet  Google Scholar 

  11. Xiao X K, Tao Y F. Personalized privacy preservation. In: Proceeding of the ACM International Conference on Management of Data (SIGMOD), Chicago, 2006. 229–240

    Google Scholar 

  12. Iyengar V S. Transforming data to satisfy privacy constraints. In: Proceeding of the 8th ACM International Conference on Knowledge Discovery and Data Mining, Edmonton, 2002. 279–288

    Google Scholar 

  13. Meyerson A, Williams R. On the complexity of optimal k-anonymity. In: Proceeding of the 23rd ACM SIGMODSIGACTSIGART Symposium on the Principles of Database Systems. New York: ACM, 2004. 223–228

    Google Scholar 

  14. Lind J C, Wiens D P, Yohai V J. Robust minimum information loss estimation. Comput Stat Data Anal, 2013, 65: 98–112

    Article  MathSciNet  Google Scholar 

  15. Gionis A, Tassa T. k-anonymization with minimal loss of information. IEEE Trans Knowl Data Eng, 2007, 21: 206–219

    Article  Google Scholar 

  16. Tar P D, Thacker N A, Jones M A, et al. A quantitative approach to the analysis of planetary terrains. In: Proceeding of the Remote Sensing and Photogrammetry Society Conference, London, 2012. 1–4

    Google Scholar 

  17. Fung B C M, Wang K, Yu P S. Top-down specialization for information and privacy preservation. In: Proceeding of the 21st IEEE International Conference on Data Engineering, Tokyo, 2005. 205–216

    Google Scholar 

  18. Fung B C M, Wang K, Yu P S. Anonymizing classification data for privacy preservation. IEEE Trans Knowl Data Eng, 2007, 19: 711–725

    Article  Google Scholar 

  19. Jin X, Zhang N, Das G. Algorithm-safe privacy preserving data publishing. In: Proceeding of the 13th International Conference on Extending Database Technology. New York: ACM, 2010. 633–644

    Chapter  Google Scholar 

  20. Jin X, Zhang N, Das G. ASAP: eliminating algorithm-based disclosure in privacy-preserving data publishing. Inf Syst, 2011, 36: 859–880

    Article  Google Scholar 

  21. Cox L H. Suppression methodology and statistical disclosure control. J Am Stat Assoc, 1980, 75: 377–385

    Article  MATH  Google Scholar 

  22. Chaum D. The dining cryptographers problem: unconditional sender and recipient untraceability. J Cryptology, 1988, 1: 65–75

    Article  MATH  MathSciNet  Google Scholar 

  23. Chaum D. Untraceable electronic mail, return addresses, and digital pseudonyms. Secur Electron Voting Adv Inf Secur, 2003, 7: 211–219

    Article  Google Scholar 

  24. Edith C H, Rodhe N I. On providing location privacy for mobile sinks in wireless sensor networks. Wirel Netw, 2013, 19: 115–130

    Article  Google Scholar 

  25. Nacher M, Calafate C T, Cano J C, et al. An overview of anonymous communication in mobile ad hoc networks. Wirel Commun Mob Comput, 2012, 12: 661–675

    Article  Google Scholar 

  26. Gedik B, Liu L. Protecting location privacy with personalized k-Anonymity: architecture and algorithms. IEEE Trans Mob Comput, 2008, 7: 1–18

    Article  Google Scholar 

  27. Gurjar A, Patial A R B. Evaluating the privacy measure of the source location privacy scheme in a wireless sensor network. Int J Comput Eng Res, 2013, 3: 10–13

    Google Scholar 

  28. Xie H, Kulik L, Tanin E. Privacy-aware collection of aggregate spatial data. Data Knowl Eng, 2011, 70: 576–595

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to HongTao Li.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Li, H., Ma, J. & Fu, S. A privacy-preserving data collection model for digital community. Sci. China Inf. Sci. 58, 1–16 (2015). https://doi.org/10.1007/s11432-014-5197-2

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11432-014-5197-2

Keywords

关键词

Navigation