Skip to main content
Log in

Computational data privacy in wireless networks

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

Wireless networks appeal to privacy eavesdroppers that secretly capture packets from the open medium and read the metadata and data content in search of any type of information through data mining and statistical analysis. Addressing the problems of personal privacy for wireless users will require flexible privacy protection mechanisms adaptively to the frequently varying context. Privacy quantification is prerequisite for enabling a context-aware privacy protection in wireless networks. This paper proposes to quantify the data privacy during wireless communication processes. We give a computational quantification method of data privacy through introducing the concepts of privacy entropy and privacy joint entropy, which permits users and applications to on-demand customize their preferential sensitivity extent of privacy leakage and protection strength. Accordingly, we put forward a data-privacy protection scheme in order to explain how to utilize the proposed computational quantification method of data privacy against the excessive disclosure of data privacy. The results show that the computational quantitation method can effectively characterize the real-time fluctuation of data privacy during communication processes and provide the reliable judgment to context-aware privacy protection, which enables to real-timely control the present data privacy to an anticipated target and to balance a tradeoff between the data privacy and communication efficiency.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Robert MG (2013) Entropy and information theory. Springer, New York

    Google Scholar 

  2. Samarati P, Sweeney L (1998) Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. Technical Report SRI-CSL-98-04. SRI Computer Science Laboratory, Palo Alto

    Google Scholar 

  3. Alfalayleh M, Brankovic L (2014) Quantifying privacy: a novel entropy-based measure of disclosure risk. arXiv preprint arXiv:1409.2112

  4. Machanavajjhala A, Kifer D, Gehrke J, Venkitasubramaniam M (2007) l-diversity: privacy beyond k-anonymity. ACM Trans Knowl Discov Data 1(1):3

    Article  Google Scholar 

  5. Li N, Li T, Venkatasubramanian S (2007) t-closeness: privacy beyond k-anonymity and l-diversity. In Proceedings of the 23rd International Conference on Data Engineering, IEEE, pp 106–115

  6. Dwork C (2006) Differential privacy. In Proceedings of the 33rd International Colloquium on Automata, Languages and Programming, 10–14 July, Venice, pp 1–12

  7. Fung B, Wang K, Chen R, Yu PS (2010) Privacy-preserving data publishing: a survey of recent developments. ACM Comput Surv 42(4):14

    Article  Google Scholar 

  8. Sramka M, Safavi-Naini R, Denzinger J, Askari M (2010) A practice-oriented framework for measuring privacy and utility in data sanitization systems. In Proceedings of EDBT/ICDT Workshops, March 22–26, Lausanne, pp. 315–333

  9. Jiang, T Wang HJ, Hu YC (2007) Preserving location privacy in wireless LANs. In Proceedings of the 5th International Conference on Mobile Systems, Applications and Services, ACM, pp. 246–257

  10. Bertino E, Jiang LW (2008) A survey of quantification of privacy preserving data mining algorithms. In: Aggarwal C, Yu P (eds) Privacy-preserving data mining: advances in database systems, vol. 34. Springer, US, pp 183–205

    Chapter  Google Scholar 

  11. Agrawal D, Aggarwal CC (2001) On the design and quantification of privacy preserving data mining algorithms. ACM Sigactsigmod-sigart Symposium on Principles of Database Systems, pp. 247–255.

  12. Zhan J (2007) Quantifying privacy for privacy preserving data mining. IEEE Symposium on Computational Intelligence and Data Mining, IEEE, pp. 630–636.

  13. Huang X, Fu R, Chen B et al (2012) User interactive internet of things privacy preserved access control. International Conference for Internet Technology and Secured Transactions, IEEE, pp. 597–602

  14. Gao L, Li M, Zhou W et al (2013) Privacy protected data forwarding in human associated delay tolerant networks. IEEE International Conference on Trust, Security and Privacy in Computing and Communications, IEEE, pp 586–593

  15. Zhang G, Yang Y, Chen J (2013) A privacy-leakage-tolerance based noise enhancing strategy for privacy protection in cloud computing. IEEE International Conference on Trust, Security and Privacy in Computing and Communications, IEEE, pp 1–8

  16. Pawar T et al (2012) Privacy preserving techniques for storage privacy attacks: A survey. International Conference on Hybrid Intelligent Systems, IEEE, pp 283–287

  17. Chen Y, Li Q, He L (2012) An improved association rule privacy protection algorithm research. In: CF Liu, LZ Wang, AM Yang (eds) Information computing and applications: communication in computer and information science, vol. 307. Springer Berlin Heidelberg, pp 225–231

  18. Malandrino D, Scarano V (2013) Privacy leakage on the Web: diffusion and countermeasures. Comput Netw 57(14):2833–2855

    Article  Google Scholar 

  19. Ji Z, Elkan C (2013) Differential privacy based on importance weighting. Mach Learn 93(1):163–183

    Article  MathSciNet  MATH  Google Scholar 

  20. Chadwick DW et al (2012) A privacy preserving authorisation system for the cloud. J Comput Syst Sci 78(5):1359–1373

    Article  Google Scholar 

  21. Martínez S, Sánchez D, Valls A (2013) A semantic framework to protect the privacy of electronic health records with non-numerical attributes. J Biomed Inform 46(2):294–303

    Article  Google Scholar 

  22. Wang M, Liu D, Zhu L et al (2014) LESPP: lightweight and efficient strong privacy preserving authentication scheme for secure VANET communication. Computing, pp 1–24

  23. Thomas MC, Joy AT (1991) Elements of information theory. Wiley

  24. Shokri R, Theodorakopoulos G, Le Boudec J. –Y, Hubaux J. -P (2011) Quantifying location privacy. IEEE Symposium on Security and Privacy, IEEE, pp 247–262

Download references

Acknowledgments

This work was supported by National Nature Science Foundation [61373123, 61572229]; Scientific Research Foundation for Returned Scholars; International Scholar Exchange Fellowship (ISEF) program of Korea Foundation for Advanced Studies (KFAS); Jilin Provincial Foundation for Young Scholars [20130522116JH]; and Jilin Provincial International Cooperation Foundation [20140414008GH, 20150414004GH].

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jian Wang.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wang, J., Wu, Z., Liu, Y. et al. Computational data privacy in wireless networks. Peer-to-Peer Netw. Appl. 10, 865–873 (2017). https://doi.org/10.1007/s12083-016-0435-6

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-016-0435-6

Keywords

Navigation