IoT as a Service. 5th EAI International Conference, IoTaaS 2019, Xi’an, China, November 16-17, 2019, Proceedings

Research Article

Towards Efficient Privacy-Preserving Personal Information in User Daily Life

Download
98 downloads
  • @INPROCEEDINGS{10.1007/978-3-030-44751-9_42,
        author={Hai Wang and Tong Feng and Zhe Ren and Ling Gao and Jie Zheng},
        title={Towards Efficient Privacy-Preserving Personal Information in User Daily Life},
        proceedings={IoT as a Service. 5th EAI International Conference, IoTaaS 2019, Xi’an, China, November 16-17, 2019, Proceedings},
        proceedings_a={IOTAAS},
        year={2020},
        month={6},
        keywords={Multi-privacy data Key information chain Localized differential privacy Noise adding Privacy-preserving},
        doi={10.1007/978-3-030-44751-9_42}
    }
    
  • Hai Wang
    Tong Feng
    Zhe Ren
    Ling Gao
    Jie Zheng
    Year: 2020
    Towards Efficient Privacy-Preserving Personal Information in User Daily Life
    IOTAAS
    Springer
    DOI: 10.1007/978-3-030-44751-9_42
Hai Wang1,*, Tong Feng1, Zhe Ren1, Ling Gao2, Jie Zheng1
  • 1: Northwest University
  • 2: Xi’an Polytechnic University
*Contact email: hwang@nwu.edu.cn

Abstract

The popularity of smart home has added a lot of convenience to people’s lives. However, while users use these smart products, users’ privacy data has also been leaked and it may cause some risks. Besides, because of untrusted third-party servers, we simply use traditional privacy-preserving methods could no longer protect users’ private information effectively. In order to solve these problems, this paper proposes a privacy-preserving method for multi-private data: We first determine the privacy data format that needs to be protected, such as audio or text. Secondly, if the data format is text, we will use the local differential privacy method. We first obtain the key attributes of the user from the key information chain, and then select the appropriate localized differential privacy method according to the text characteristics of the key attributes. The user realizes the local disturbance of the data and then uploads it to the data collection center– the cloud platform. Finally, when an attacker attempts to obtain user information from the cloud platform, it uses the central differential privacy method to add noise and the noise-added data is transmitted to the attacker. If the data format is voice frequency, we first convert the voice information into binary code, then chaotically encrypt the binary code, and upload the encrypted binary code to the cloud platform. We verify the effectiveness of our methods by experiments, and it can protect users’ privacy information better.