To solve the privacy leakage problem of truck trajectories in intelligent logistics,this paper proposes a quadtreebased personalized joint location perturbation(QPJLP)algorithm using location generalization and local ...
详细信息
To solve the privacy leakage problem of truck trajectories in intelligent logistics,this paper proposes a quadtreebased personalized joint location perturbation(QPJLP)algorithm using location generalization and local differential privacy(LDP)***,a flexible position encoding mechanism based on the spatial quadtree indexing is designed,and the length of the encoding can be adjusted freely according to data ***,to meet the privacy needs of different locations of users,location categories are introduced to classify locations as sensitive and ordinary ***,the truck invokes the corresponding mechanism in the QPJLP algorithm to locally perturb the code according to the location category,allowing the protection of non-sensitive locations to be reduced without weakening the protection of sensitive locations,thereby improving data *** experiments demonstrate that the proposed algorithm effectively meets the personalized trajectory privacy requirements while also exhibiting good performance in trajectory proportion estimation and top-k classification.
This paper proposes a combined prediction model based on secondary decomposition and MSCSO-WLSSVM to enhance methane gas emission prediction accuracy. Firstly, the complete ensemble empirical mode decomposition with a...
详细信息
Existing Vehicular Ad-hoc Networks (VANETs), while enabling vehicles to communicate with each other, share data, and connect to external networks, also face a large number of data security challenges, such as data lea...
详细信息
To minimize the propagation of redundant data in wireless sensor networks, conserve energy, and extend network lifespan, we propose an algorithm (R-IEHOBP) that combines radial clustering and an elephant swarm neural ...
详细信息
Conditional proxy re-encryption(CPRE)is an effective cryptographic primitive language that enhances the access control mechanism and makes the delegation of decryption permissions more granular,but most of the attribu...
详细信息
Conditional proxy re-encryption(CPRE)is an effective cryptographic primitive language that enhances the access control mechanism and makes the delegation of decryption permissions more granular,but most of the attribute-based conditional proxy re-encryption(AB-CPRE)schemes proposed so far do not take into account the importance of user attributes.A weighted attribute-based conditional proxy re-encryption(WAB-CPRE)scheme is thus designed to provide more precise decryption rights *** introducing the concept of weight attributes,the quantity of system attributes managed by the server is reduced *** the same time,a weighted tree structure is constructed to simplify the expression of access structure *** conditional proxy re-encryption,large amounts of data and complex computations are outsourced to cloud servers,so the data owner(DO)can revoke the user’s decryption rights directly with minimal *** scheme proposed achieves security against chosen plaintext attacks(CPA).Experimental simulation results demonstrated that the decryption time is within 6–9 ms,and it has a significant reduction in communication and computation cost on the user side with better functionality compared to other related schemes,which enables users to access cloud data on devices with limited resources.
Trajectory privacy protection schemes based on suppression strategies rarely take geospatial constraints into account,which is made more likely for an attacker to determine the user’s true sensitive location and *** ...
详细信息
Trajectory privacy protection schemes based on suppression strategies rarely take geospatial constraints into account,which is made more likely for an attacker to determine the user’s true sensitive location and *** solve this problem,this paper presents a privacy budget allocation method based on privacy security level(PSL).Firstly,in a custom map,the idea of P-series is contributed to allocate a given total privacy budget reasonably to the initially sensitive ***,the size of privacy security level for sensitive locations is dynamically adjusted by comparing it with the customized initial level threshold parameterµ.Finally,the privacy budget of the initial sensitive location is allocated to its neighbors based on the relationship between distance and degree between *** comparing the PSL algorithm with the traditional allocation methods,the results show that it is more flexible to allocate a privacy budget without compromising location privacy under the same preset conditions.
Sharing of the electronic medical records among different hospitals raises serious concern of the leakage of individual privacy for the adoption of the semi trustworthiness of the medical cloud *** tracking and revoca...
详细信息
Sharing of the electronic medical records among different hospitals raises serious concern of the leakage of individual privacy for the adoption of the semi trustworthiness of the medical cloud *** tracking and revocation of malicious users have become urgent *** solve these problems,this paper proposed a traceable and directly revocable medical data sharing *** the scheme,a unique identity parameter(ID),which was generated and embedded in the private key generation phase by the medical service provider(MSP),is used to identify legal authorized user and trace malicious *** when attributes satisfy the access policy and user’s ID is not in the revocation list can the user calculate the decryption *** user can be tracked and directly revoked by using the revocation *** the assumption of decision bilinear Diffie-Hellman(DBDH),this paper has proved that the scheme is able to achieve security against chosen-plaintext attack(CPA).The performance analysis demonstrates that the sizes of the public key and private key are shorter,and the time overhead is less than other schemes in the public-private key generation,data encryption and data decryption stages.
A simple undirected regular graph is said to be semisymmetric if it is edge-transitive but not *** a semisymmetric graphΓof order 2p^(3),p a prime,it is well known thatΓis bipartite with two biparts having equal ***...
详细信息
A simple undirected regular graph is said to be semisymmetric if it is edge-transitive but not *** a semisymmetric graphΓof order 2p^(3),p a prime,it is well known thatΓis bipartite with two biparts having equal *** complete classification of such graphs has been given for the full automorphism group Aut(Γ)acting unfaithfully on at least one bipart ofΓ,which shows that there is only one infinite family of such graphs with valency p^(2).The graphs of this kind have been determined when Aut(Γ)acts faithfully and primitively on at least one bipart ofΓ,and thus there is only one remaining case for classifying such graphs of valency p^(2),Aut(Γ)acting faithfully and imprimitively on both biparts ofΓ,which is dealt with in this *** a result,there is only one infinite family of semisymmetric graphs of order 2p^(3)with valency p^(2).
The density peak clustering algorithm shows good clustering performance by rapidly determining each cluster division with a high-density region as the kernel. However, the cut-off distance (dc) as the only parameter o...
详细信息
Traditional methods of building secure anonymity sets using location privacy desensitization techniques commonly suffer from low dummy location differentiation and vulnerable to background knowledge attacks. To addres...
详细信息
暂无评论