期刊文献+

路网环境下基于Voronoi图的位置隐私保护方法 被引量:3

Protecting Location Privacy with Voronoi Diagram over Road Networks
下载PDF
导出
摘要 位置隐私泄露已经成为限制LBS应用普及的主要因素,而现有的位置隐私保护方法大都没有考虑移动用户所处的环境背景——道路网络。针对此问题,提出了一种基于路网环境的位置隐私保护方法,该方法主要包含3个部分:(1)利用Voronoi图原理构造路网V图,以满足用户路段多样性要求;(2)提出一种新的隐私模型——Vk-隐私模型,其兼顾匿名集内所有用户的隐私需求,并有效保证服务质量;(3)基于Vk-隐私模型提出一种新的位置匿名算法,它对同一V区内的多个用户进行共同匿名处理,以提高匿名效率和安全性。方法充分考虑了道路网络的结构特点,兼顾了用户的隐私需求与服务质量。通过理论分析论证了方法的抗推断攻击特性,并通过实验验证了方法的可行性。 Location privacy disclosure has become main constraint of LBS applications, while most existing location pri- vacyprotection methods do not consider the background of mobile users the road network. A location privacy protec- tion method over road networks was presented. This method consists of three phases. First, in order to meet the require- ment of segment l-diversity,the road-network Voronoi diagram is constructed based on the structure of the road net- work. Second,VK-privacy model is put forward. It satisfies all the users' privacy requirement in the cloaking set and ef- fectively insures the QoS of LBS. Finally, a clocking algorithm based on VK-privaey model is presented, which improves processing efficiency and safety by cloaking multiple users in the same V-region together. The method takes full account of the structure characteristics of road networks and leverages users' privacy requirement and QoS of LBS. The robust- ness against inference attacksof the method was proved through theoretical analysis,and the feasibility of the method was proved by the experimental data.
出处 《计算机科学》 CSCD 北大核心 2013年第7期116-120,共5页 Computer Science
基金 国家自然科学基金(61170241) 博士后科研人员落户黑龙江科研启动资助金项目(LBH-Q10141) 哈尔滨市科技创新人才专项资金(2012RFXXG086) 黑龙江省教育厅科学技术研究项目(12513049)资助
关键词 基于位置的服务 位置隐私 道路网络 VORONOI图 LBS, Location privacy, Road network, Voronoi diagram
  • 相关文献

参考文献15

  • 1Freudiger J,Shokri R, Hubaux J-P. Evaluating the Privacy Risk of Location-Based Services[A] // 15th International Conference on Financial Cryptography and Data Security[C]. Gros Islet, St. Lucia, 2012 : 31-46.
  • 2Cvrcek D,Kumpost M,Matyas V,et al. A study on the value of location privacy[A]//WPES '06: Proceedings of the 5th ACM workshop on Privacy in electronic soeiety[C]. New York, USA: ACM, 2006 : 109-118.
  • 3Gruteser M, Gnmwald D. Anonymous usage of location-based services through spatial and temporal cloaking[A]//Proceedings of the 1st International Conference on Mobile Systems:Applicatio-nsand Services[C]. San Francisco, USA: ACM, 2003: 163-168.
  • 4Sweeney L. k-anonymity: a model for protecting privacy[J]. In- ternational Journal on Uncertainty, Fuzziness and Knowledge- based Systems, 2002,10(5) ; 557-570.
  • 5Mokbel M F, Chow C Y. Casper * :query processing for location services without compromising privacy[J]. ACM Transactions on Data Systems, 2009,34(4) : 24-48.
  • 6Machanavajjhala A, Kifer D, Gehrke J, et al. 1-diversity: Privacy beyond k-anonymity[J]. ACM Transactions on Knowledge Dis- covery from Data, 2007,1 (1) : 3.
  • 7Gedik B, Liu L. Protecting location privacy with personalized k- anonymity: Architecture and algorithms [J] // IEEE Transac- tions on Mobile Computing[C]. California, USA, 2008;1-18.
  • 8Shin K G,Ju X, Chen Z, et al. Privacy protection for users of lo- cation-based services[J]. IEEE Communications Society, 2012, 19(1) : 30-39.
  • 9Kalnis P, Ghinita G, Mouratidis K, et al. Preventing location- based identity inference in anonymous spatial queries [J ]. Knowledge and Data Engineering, 2007,19(12):1719-1733.
  • 10Wang Ting, Liu Ling. Privacy-aware mobile services over road networks[J]. VLDB Endowment, 2009,2(1) : 1042-1053.

二级参考文献70

  • 1潘晓,肖珍,孟小峰.位置隐私研究综述[J].计算机科学与探索,2007,1(3):268-281. 被引量:65
  • 2Gruteser M,Grunwald D.Anonymous usage of locationbased services through spatial and temporal cloaking//Proceedings of the first International Conference on Mobile Systems,Applications,and Services.San Francisco,CA,USA,2003:163-168.
  • 3Wang T,Liu L.Privacy-aware mobile services over road networks//Proceedings of the 35th International Conference on Very Large Data Bases.Lyon,France,2009:1042-1053.
  • 4Gedik B,Liu L.A customizable k-anonymity model for proteeting location privacy//Proceedings of the International Conference on Distributed Computing Systems.Columbus,OH,USA,2005:620-629.
  • 5Xiao Z,Meng X,Xu J.Quality aware privacy protection for location-based services.Advances in Database:Concepts,Systems and Applications,2007,10(33):434-446.
  • 6Mokbel M,Chow C,Aref W.The new Casper:Query processing for location services without compromising privacy//Proceedings of the 32nd International Conference on Very Large Data Bases.Seoul,Korea,2006:763-774.
  • 7Bamba B,Liu L,Pesti P,Wang T.Supporting anonymous location queries in mobile environments with privacy grid//Proceedings of the 17th International World Wide Web Conferenee.Beijing,China,2008:237-246.
  • 8Kalnis P,Ghinita G,Mouratidis K.Preventing locationbased identity inference in anonymous spatial queries.IEEE Transactions on Knowledge and Data Engineering,2007,19(12):1719-1733.
  • 9Chow C,Mokbel M,Liu X.A peer-to-peer spatial cloaking algorithm for anonymous location-based services//Proceedings of the 14th International Symposium on Advances in Geographic Information Systems.Arlington,VA,USA,2006:171-178.
  • 10Ghinita G,Kalnis P,Skiadopuslos S.PRIVE.:Anonymous location-based queries in distributed mobile systems//Proceedings of the 16th International World Wide Web Conference.Banff,Alberta,Canada,2007:1-10.

共引文献56

同被引文献26

  • 1A1-Amin Hossain, Amina Hossain, Hye-Kyeom Yoo, Jae-Woo Chang. H-star: Hilbert-order based star network expansion cloak- ing algorithm in road networks[C]. Computational Science and Engineering(CSE 2011), 2011 International Conference on. IEEE,2011:81-88.
  • 2T Wang, L Liu. Privacy- aware mobile services over road networks[J]. Proceedings of the VLDB Endowment, 2009,2(1): 1042-1053.
  • 3Xinyue Fan, Jin Tu, Chaolong Ye, Fei Zhou. The research for protecting location privacy based on V- W algorithm[J]. Eurasip Journal on Wireless Communications and Networking,2014(1): 1686-1706.
  • 4Jung- Ho Um, Mi- Young Jang, Kyoung- Jin Jo, Jae- Woo Chang. A new cloaking method supporting both K-anonymity and L-diversity for privacy protection in location-based services[C]. Parallel & Distributed Processing with Applications, 2009 Inter- national Symposium on. IEEE, 2009:79-85.
  • 5Xinxin Liu, Xiaolin Li. Privacy preserving techniques forlocation based services in mobile networks[C]. Parallel and Distributed Processing Symposium Workshops & PhD Forum (IPDPSW), 2012 International Conference on. IEEE, 2012:2474- 2477.
  • 6Chunguang Ma, Changli Zhou, and Songtao Yang. A voronoi- based location privacy-preserving method for continuous query in LBS[J].International Journal of Distributed Sensor Networks, 2015,2015:1-17.
  • 7Chow Chi-Yin, Mokbel Mohamed, Bao Jie, Liu Xua. Query- aware location anonymization for road networks [J]. GeoInformat- ica,2011,15(3):571-607.
  • 8Atsuyuki Okabe, Barry Boots, Kokichi Sugihara. Spatial tessellations concepts and applications of voronoi diagrams[M]. Tokyo:Wiley,2000:65-115.
  • 9SWEENEY L.k-anonymity:A Model for Protecting Privacy[J]. International Journal on Uncertainty,Fuzziness and Knowledge-based Systems,2002,10(5):557-570.
  • 10GRUTESER M, GRUNWALD D. Anonymous Usage of Location- based Services through Spatial and Temporal Cloaking[C]//ACM. International Conference on Mobile Systems, Applications, and Services, May 5-8, 2003.San Francisco, CA, USA. N Y: ACM,2003:31-42.

引证文献3

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部