期刊文献+

一种个性化的k-匿名位置隐私保护算法 被引量:3

Protecting Location Privacy with Personalized k-anonymity
下载PDF
导出
摘要 文中提出了一种基于个性k-匿名模型的新的k-匿名算法。在普通匿名算法中增加匿名群记忆模块,从而加快匿名算法的匿名速度。仿真结果表明当用户对安全要求较高的情况下,新匿名算法与普通算法相比具有更快的匿名速度,同时匿名成功率也得到了提升;但在用户对安全要求低的情况下,新算法在匿名速度方面要慢于普通算法,成功率方面的优势也不明显。 This paper presents a new k-anonymity algorithm based on the personalized k-anonymity model. Increasing anonymous group of anonymous memory modules in the ordinary algorithm speeds up the anon- ymous speed. Simulation results show that when the user' s requireements for high security situations, the proposed algorithm has faster anonymity speed compared to the ordinary anonymous algorithm, meanwhile the success rate of anonymity has also been improved. When users have the low security requirements, the proposed algorithm has slower anonymous speed than the normal algorithm, advantages of the success rate were not evident.
作者 何康 吴蒙
出处 《南京邮电大学学报(自然科学版)》 北大核心 2012年第6期69-73,共5页 Journal of Nanjing University of Posts and Telecommunications:Natural Science Edition
基金 国家重点基础研究发展计划(973计划)(2011CB302903)资助项目
关键词 K-匿名 个性k-匿名 匿名群 k-anonymity personalized k-anonymity clique
  • 相关文献

参考文献2

二级参考文献12

  • 1杨晓春,刘向宇,王斌,于戈.支持多约束的K-匿名化方法[J].软件学报,2006,17(5):1222-1231. 被引量:60
  • 2Speed prediction for two lane rural highways.Washington,DC,Federal Highway Administration,2000.
  • 3Mokbel M F,Chow C Y,and Aref W G.The new Casper:query processing for location services without compromising privacy[C].Proceedings of the International Conference on Very Large Data Bases.New York,2006:763-774.
  • 4Sweeney L.K-anonymity:a model for protecting privacy[J].International Journal on Uncertainty,Fuzziness and Knowledge-based Systems,2002,10(5):557-570.
  • 5Gruteser M and Grumwald D.Anonymous usage of location based services through spatial and temporal cloaking[C].ACM/USENIX MobiSys,New York,2003:69-78.
  • 6Gedik B and Liu L.Location privacy in mobile systems:a personalized anonymization model[C].Proceedings of International Conference on Distributed Computing Systems,Columbus,2005:620-629.
  • 7Htu H and Xu J.Non-exposure location anonymity[C].Proceedings of the IEEE International Conference on Data Engineering,Shanghai,2009:1120-1131.
  • 8Xu J,Tang X,Hu H,and Du J.Privacy-conscious location-based queries in mobile environments[J].IEEE Transactionson Parallel and Distributed Systems,2010,21(3):313-326.
  • 9Pan X,Xu J,and Meng X.Protecting location privacy against location-dependent attack in mobile services[C].Proceeding of the ACM Conference on Information and Knowledge Management,Napa Valley,2008:1475-1476.
  • 10Brinkhoff T.A framework for generating network-based moving objects[J].Geoinformatica,2002,6(2):153-180.

共引文献46

同被引文献21

引证文献3

二级引证文献24

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部