Abstract
Aim: To study the key technology of privacy protection and data security in the Internet of Things group intelligence perception, a cryptographic-based technology was proposed.
Background: First, the background of group intelligence perception and three existing problems were briefly introduced, and the inherent contradictions among the three problems, which led to some challenges in this study, were reported.
Objective: A network model, a security model, and design goals were constructed, and a solution based on cryptography-related technology was proposed.
Methods: The security and cost complexity of the proposed solution was theoretically analysed. The calculation cost of mobile phone measurement verified the practical feasibility of the scheme.
Results: When ɛ was considerably small, both false positive (FP) and false negative (FN) were small (close to 0). With an increase in ɛ, the FP rate increased, and the FN rate became 0. When ɛ = 0.5, the FP rate was only 0.1, and the equivalent FN rate was 0 after the user completed 50 tasks. The trust model used was highly accurate.
Conclusion: This study has great significance in promoting safe and reliable application development to ensure the genuineness and trustworthiness of data in the aggregation of intermediate data and back-end data services.
Keywords: Internet of Things, group intelligence perception, cloud computing, privacy protection, data reliability
[http://dx.doi.org/10.1088/1755-1315/714/4/042067]
[http://dx.doi.org/10.1088/1742-6596/1915/4/042020]
[http://dx.doi.org/10.1049/cje.2018.10.007]
[http://dx.doi.org/10.1007/s00170-019-04289-7]
[http://dx.doi.org/10.1109/MNET.001.1800478]
[http://dx.doi.org/10.1504/IJAACS.2021.10034573]
vol. 1883, no. 1, p. 012087, 2021. [http://dx.doi.org/10.1088/1742-6596/1883/1/012087]
vol. 1883, no. 1, pp. 012063, 2021. [http://dx.doi.org/10.1088/1742-6596/1883/1/012063]
[http://dx.doi.org/10.1088/1742-6596/1865/4/042062]
[http://dx.doi.org/10.21272/bel.5(1).22-30.2021]
[http://dx.doi.org/10.3390/ijerph16203847] [PMID: 31614632]
[http://dx.doi.org/10.1109/MNET.2019.8675165]
vol. 1927, no. 1, pp. 012026, 2021. [http://dx.doi.org/10.1088/1742-6596/1927/1/012026]
[http://dx.doi.org/10.1109/MNET.011.2000009]
[http://dx.doi.org/10.22381/JSME8120204]
vol. 1684, no. 1, pp. 012020, 2020. [http://dx.doi.org/10.1088/1742-6596/1684/1/012020]
[http://dx.doi.org/10.20965/jaciii.2019.p0124]
[http://dx.doi.org/10.1109/MITP.2019.2912729]
[http://dx.doi.org/10.3390/electronics10080880]
[http://dx.doi.org/10.1109/TETCI.2020.3020197]
[http://dx.doi.org/10.17654/EC020010009]
[http://dx.doi.org/10.3991/ijim.v15i02.19869]
[http://dx.doi.org/10.1007/s11277-021-08780-x] [PMID: 34456513]