期刊文献+

面向可穿戴设备的数据安全隐私保护技术综述 被引量:39

Data Security and Privacy Preserving Techniques for Wearable Devices:A Survey
在线阅读 下载PDF
导出
摘要 基于可穿戴设备的移动计算被视为支撑泛在感知型应用的重要技术,它使用大范围部署的传感器持续不断地感知环境信息,利用短距通信和数据挖掘/机器学习技术传递和处理感知数据.现有的可穿戴设备相关工作主要关注新型移动应用、信息采集、产品形态和人性化用户接口等方面的设计与实现.然而,面向可穿戴设备的数据安全隐私保护技术研究尚处于起步阶段.从数据分析者的视角来看,研究者分析可穿戴设备的数据源特点与隐私安全隐患,重点研究基于多源感知数据的个体活动识别方法和数据挖掘机制;从隐私安全保护者的视角来看,面向可穿戴设备的隐私保护技术亟需解决云辅助的隐私保护机制、隐私感知的个人信息发布和基于策略的访问控制等方面的问题.以可穿戴健康跟踪设备Fitbit为对象展开了可穿戴设备安全与隐私实例分析.最后,总结了面向可穿戴设备的隐私保护的8条技术途径,并展望了需要进一步研究的热点问题. Mobile computing based on wearable devices is considered as the important technology forsupporting ubiquitous perceptual applications. It uses widespread sensors to continuously sense the environment information. Moreover, it also adopts short-range communication and data mining/ machine learning to transmit and process the sensed data,respectively. Current work mainly focuses on designing and implementing new mobile applications, information gathering,product modality and friendly user interfaces. However, research on data security and privacy technologydevices is still in its fancy. In the perspective of data analysts,researchers analyze theof diverse data in wearable devices and privacy threats targeting wearable devices. Moreover,they are particularly interested in human activity recognition techniques and data mining mechani中央人民政府lti-source sensing data. On the other hand,it is vital for privacy protectors of wearable devices tostudy on privacy preservation techniques in the following three aspects : cloud-assisted privacy preserving mechanisms, privacy-aware personal data publishing and policy-based access control. A case study regarding security and privacy for Fitbit,a kind of wearable devices forpresented. At last, the technological approaches to preserve data security and privacy for wearable devices are summarized,and some open issues to be further studied are also raised.
作者 刘强 李桐 于洋 蔡志平 周桐庆 Liu Qiang;Li Tong;Yu Yang;Cai Zhiping;Zhou Tongqing(College of Computer, National University of Defense Technology,Changsha 410073)
出处 《计算机研究与发展》 EI CSCD 北大核心 2018年第1期14-29,共16页 Journal of Computer Research and Development
基金 国家自然科学基金项目(61379145 61363071 61702539)~~
关键词 移动计算 可穿戴设备 数据安全与隐私 安全威胁 隐私保护 mobile computing wearable devices data security and privacy security threat privacy preservation
  • 相关文献

参考文献6

二级参考文献53

  • 1Kantarcioglu M,Jin Jiasun,Clifton C.When do data mining results violate privacy?[C]//Proc of the 10th ACM SIGKDD Int Conf on Knowledge Discovery and Data Mining.New York:ACM,2004:599-604.
  • 2Agrawal R,Srikant R.Privacy-preserving data mining[C]//Proc of the 2000 ACM SIGMOD Conf on Management of Data.New York:ACM,2000:439-450.
  • 3Oliveira S R M,Zaane O R.Privacy preservation when sharing data for clustering[C]//Proc of the Int Workshop on Secure Data Management in a Connected World.Berlin:Springer,2004:67-82.
  • 4Parameswaran R,Blough D M.Privacy preserving data obfuscation for inherently clustered data[J].International Journal of Information and Computer Security,2008,2(1):1744-1765.
  • 5Mukherjee S,Chen Zhiyuan,Gangopadhyay A.A privacy-preserving technique for Euclidean distance-based mining algorithms using Fourier-related transforms[J].The International Journal on Very Large Data Bases,2006,15(4):293-315.
  • 6Aggarwal G,Feder T,Kenthapadi K,et al.Approximation algorithms for k-anonymity[C]//Proc of ACM SIGMOD Int Conf on Management of Data.New York:ACM,2007.
  • 7Du Yang,Xia Tian,Tao Yufei,et al.On multidimensional k-anonymity with local recoding generalization[C]//Proc of IEEE the 23rd Int Conf on Data Engineering.Los Alamitos,CA:IEEE Computer Society,2007.
  • 8Rijsbergen C J van.Information Retrieval (2nd edition)[M].London:Butterworths,1979.
  • 9Ester M,Kriegel H P,Sander J,et al.A density based algorithm of discovering clusters in large spatial databases with noise[C]//Proc of the 2nd Int Conf on Knowledge Discovery and Data Mining.Menlo Park,CA:AAAI,1996:226-231.
  • 10Bista R,Yoo H K,Chang J W.A new sensitive data aggregation scheme for protecting integrity in wireless sensor networks//Proceedings of the 10th IEEE International Conference on Computer and Information Technology.Bradford,UK,2010.2463-2470.

共引文献129

同被引文献402

引证文献39

二级引证文献133

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部