期刊文献+

路网限制环境中基于匿名蜂窝的位置隐私保护 被引量:7

Location privacy protection through anonymous cells in road network
下载PDF
导出
摘要 为了解决路网限制上下文环境的位置隐私保护问题,提出一个基于匿名蜂窝的位置隐私保护算法.根据路网环境特殊的点、线网络结构,事先将道路网络处理成由道路交叉点为圆心的圆形基本匿名区域———匿名蜂窝组成的网络.使用Hilbert曲线对匿名蜂窝进行空间编码,在算法中使用B+树对其进行索引.讨论了基于匿名蜂窝对用户查询进行匿名处理的2种成组方法:相邻结点优先成组和相邻路径结点优先成组,并对它们进行分析比较.在具体描述该算法的同时,进行了理论分析.通过实验验证了算法的可行性.实验结果表明:基于匿名蜂窝的相邻路径结点优先成组方法能够较好的增强算法应对推理攻击的鲁棒性. To solve the problem of location privacy protection under restricted context in road network,this work developed and demonstrated a privacy protection algorithm.According to the characteristics of points and lines structure in the road network,the network is divided into anonymous cells with each road intersection as the center in advance.Cells are coded with Hilbert curve and indexed by a B+ tree.Two cellular-based methods for query anonymous processing nearest neighbor first and nearest road first were introduced.Then the two methods were analyzed and compared.Data from a real city map simulation show the effectiveness of the algorithm.The results prove that the nearest road first cloaking method can achieve more location privacy without loss of efficiency than the other,therefore improve the robustness against inference attacks.
出处 《浙江大学学报(工学版)》 EI CAS CSCD 北大核心 2011年第3期429-434,439,共7页 Journal of Zhejiang University:Engineering Science
基金 国家自然科学基金资助项目(61003195 60903169) 浙江省自然科学基金资助项目(Y106427)
关键词 道路网络 位置隐私 匿名蜂窝 基于位置的服务 road network location privacy anonymous cell location-based services
  • 相关文献

参考文献13

  • 1KARIM W.Privacy implications of personal locators:why you should think twice before voluntarily availingyourself to GPS monitoring. Journal of Law&Poli-cy . 2004
  • 2GRUTESER M,GRUNWALD D.Anonymous usage oflocation based services through spatial and temporalcloaking. Proceedings of Mobile Systems,Applica-tions and Services . 2003
  • 3KIDO,YANAGISAWA H.A anonymous communicationtechnique using dummies for location-based services. Proceedings of ICPS . 2005
  • 4BAMBA B,LIU L,PESTI P.Supporting anonymouslocation queries in mobile environments with privacygrid. Proceedings of World Wide Web . 2008
  • 5GEDIK B,LIU L.Protecting location privacy with person-alized k-anonymity:architecture and algorithms. IEEETransactions on Mobile Computing . 2008
  • 6XU J,TANG X,HU H,et a1.Privacy-conscious lo-cation-based queries in mobile environments. IEEETransactions on Parallel and Distributed Systems . 2010
  • 7KYRIAKOS M,YIU Man-Lung.Anonymous queryprocessing in road networks. IEEE Transactions onKnowledge and Data Engineering . 2010
  • 8THOMAS B.Generating network-based movingobjects. Proceedings of International Conferenceon Scientific and Statistical Database Management . 2000
  • 9Barkhuus L,Dey A.Location-based services for mobile telephony:a study of users‘ privacy concerns. 9th Internation Conference on Human-Computer Interaction INTERACT . 2003
  • 10Mohamed F Mokbel,Chi-Yin Chow,Walid G Aref.The new casper:query processing for location services without compro-mising privacy. VLDB2006 .

同被引文献83

  • 1朱良,孙未未,荆一楠,杜江帆.基于Voronoi图的路网k聚集最近邻居节点查询方法[J].计算机研究与发展,2011,48(S3):155-162. 被引量:5
  • 2Beresford A.R,Stajano F.Location Privacy in PervasiveComputing[J].IEEE Pervasive Computing,2003,2(1):46-55.
  • 3Tao Jiang,Helen J W,Hu Yih-Chun.Preserving Location Privacyin Wireless LANs[C]//Proc.of the 5th International Conference onMobile Systems.[S.l.]:IEEE Press,2007.
  • 4Hua Lu,Christian S J,Lung M Y.PAD:Privacy-area Aware,Dummy-based Location Privacy in Mobile Services[C]//Proc.ofthe 7th ACM International Workshop on Data Engineering forWireless and Mobile Access.New York,USA:[s.n.],2008.
  • 5Kido H,Yanagisawa Y,Satoh T.An Anonymous CommunicationTechnique Using Dummies for Location-based Services[C]//Proc.of IEEE International Conference on Pervasive Services.Santorini,Greece:[s.n.],2005.
  • 6Gruteser M,Grunwald D.Anonymous Usage of Location-basedServices Through Spatial and Temporal Cloaking[C]//Proc.of the1st International Conference on Mobile Systems,Applications,andServices.[S.l.]:ACM Press,2003.
  • 7Toby X,Cai Ying.Location-anonymity in Continuous Location-based Services[C]//Proc.of the ACM Symposium on Advance inGeographic Information Systems.Seattle,USA:[s.n.],2007.
  • 8Mokbel M F,Chow C Y,Aref W G.The New Casper:QueryProcessing for Location Services Without CompromisingPrivacy[C]//Proc.of the 32nd International Conference on VeryLarge Data Bases.Seoul,Korea:[s.n.],2006.
  • 9Freudiger J,Shokri R, Hubaux J-P. Evaluating the Privacy Risk of Location-Based Services[A] // 15th International Conference on Financial Cryptography and Data Security[C]. Gros Islet, St. Lucia, 2012 : 31-46.
  • 10Cvrcek D,Kumpost M,Matyas V,et al. A study on the value of location privacy[A]//WPES '06: Proceedings of the 5th ACM workshop on Privacy in electronic soeiety[C]. New York, USA: ACM, 2006 : 109-118.

引证文献7

二级引证文献29

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部