期刊文献+

一种移动Ad hoc环境下的LBS位置保护算法的研究

A mobile LBS location protection algorithm in Ad hoc environment
下载PDF
导出
摘要 传统的基于位置信息的服务(LBS)的隐私保护需要LBS提供者(简称LSP)与用户之间通过第三方作为中介来进行信息交换,但这种模式极易遭到攻击者攻击。为此提出一种基于K-匿名机制的隐形空间算法KABSCA(k-anonymity based spatial cloaking algorithm),通过移动设备独立建立一个分布式网络直接与LSP通讯进而避免了第三方的安全威胁。仿真实验显示:使用这种算法,用户可以享受到高质量的信息服务以及高度的隐私保护。 Privacy protection of the traditional location-based services (LBS) needs a third party as an intermediary between LBS provider (referred to as the LSP) and users to exchange information, but this model can be easily subjected to the attack of the attacker.So a spatial cloaking algorithm based on K-anonymity mechanisms KABSCA (k-anonymity based spatial cloaking algorithm) is proposed in the paper, which independently uses mobile devices to establish a distributed network for LSP communication directly and thus avoids security threats from a third party. The extensive simulations show that with the implementation of this algorithm, users can enjoy high-quality information services and a high degree of privacy protection.
作者 喻欣 程耕国
出处 《电子设计工程》 2013年第1期142-144,148,共4页 Electronic Design Engineering
基金 国家自然科学基金(60074032)
关键词 LBS(Location-Based Service) 隐私保护 隐形空间 Ad HOC K-ANONYMITY LBS privacy-protection spatial cloaking Ad hoc k-anonymity
  • 相关文献

参考文献10

  • 1Krumm J. A survey of computational location privacy[J]. Personal and Ubiquitous Computing,2009,13(6):391-399.
  • 2Bamba B,Liu L,Pesti P,et al. Supporting anonymous location queries in mobile environments with privacygrid[C]// Proceedings of the international world wide web conference.WWW 2008:237-246.
  • 3Gedik B,Liu L. Protecting location privacy with personalized k-anonymity: architecture and algorithms[J]. IEEE Transactions on Mobile Computing,2008,7(1):1-18.
  • 4Kalnis P,Ghinita G,Mouratidis K,et al. Preventing location-based identity inference in anonymous spatial queries[J]. IEEE Transactions on Knowledge and Data Engineering,2007,19(12):1719-1733.
  • 5Duckham M,Kulik L. A formal model of obfuscation and negotiation for location privacy, in: Pervasive'05[C]//Proc. of the 3rd Int. Conf. on Pervasive Computing,2005:152-170.
  • 6Tschofenig H,Schulzrinne H,Newton A,et al. The IETF geopriv and presence architecture focusing on location privacy[C]//In Position paper for theW3C workshop on languages for privacy policy negotiation and semantics-driven enforcement,2006:1-4.
  • 7Dawson M,Winterbottom J,Thompson M. IP Location Services[M]. McGraw-Hill,2006.
  • 8Samarati P. Protecting respondents' identities in microdata release[J]. IEEE Trans. on Knowledge and Data Eng,2001,13(6):1010-1027.
  • 9Sweeney L. k-anonymity: a model for protecting privacy[J], Int'l Journal of Uncertainty, Fuzziness and Knowledge-Based Systems,2002,10(5):557-570.
  • 10Paar C,Pelzl Jan,Preneel B. Understanding cryptography:A Textbook for Students and Practitioners[M]. Springer,2010.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部