期刊文献+

基于位置敏感哈希分割的空间K-匿名共匿算法 被引量:2

Spatial K-Anonymity Reciprocal Algorithm Based on Locality-sensitive Hashing Partition
下载PDF
导出
摘要 空间K-匿名技术主要用于隐私保护,防止个人信息泄露。目前的主要方法都基于用户-匿名器-基于位置的服务(location based services,LBS)模型。提出了一种基于位置敏感哈希分割的空间K-匿名共匿算法。这种算法在保距性和共匿性方面都可以满足要求,而且算法具有适度的计算复杂度。最后,针对有效性(最小化匿名空间区域)和效率(构建代价)做了实验,证明所提出的算法具有良好的性能。 Spatial K-anonymity is an important measure for privacy to prevent the disclosure of personal data. The main methods are based on the model of User-Anonymizer-LBS. This paper proposed a spatial K-anonymity algorithm based on locality-sensitive hashing partition. The algorithm is shown to preserve both locality and reciprocity with moderate computation complexity. Finally, aimed on effectiveness(minimum anonymizing spatial region size)and efficiency(con- struction cost), the experimental results verify that the proposed method has high performance.
出处 《计算机科学》 CSCD 北大核心 2013年第8期115-118,共4页 Computer Science
基金 国家自然科学基金(61070032)资助
关键词 基于位置的服务 空间K-匿名 隐私保护 空间数据库 Location-based services Spatial K-anonymity Privacy protection Spatial databases
  • 相关文献

参考文献16

  • 1Agrawal D, Aggarwal C C. On the design and quantification of privacy preserving data mining algorithms[C]//Proceedings of the Twentieth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems. 2001 : 247-255.
  • 2Ahmadi H, Pham N, Ganti R, et al. Privacy-aware regression modeling of participatory sensing data [C]//Procee-dings of the 8th ACM Conference on Embedded Networked Sensor Sys- tems. 2010 : 99-112.
  • 3Sweeney L. K-anonymity: a model for protecting privacy [J]. In- ternational Journal of Uncertainty, Fuzziness and Knowledge- Based Systems, 2002,10(5) : 557-570.
  • 4Mokbel M F,Chow C Y,Aref W G. The new casper:query pro- cessing for location services without compromising privacy[C]// Proceedings of the 32nd International Conference on Very Large Data Bases. 2006 : 763-774.
  • 5Gruteser M, Grunwald D. Anonymous usage of location- based services through spatial and temporal cloaking [C]//Proeee- dings of the 1st Intemational Conference on Mobile Systems, Applications and Services. 2003:31-42.
  • 6Butz A R. Alternative algorithm for hilberts space- filling curve [J]. IEEE Transactions on Computers, 1971 ,C-2(4) :424-426.
  • 7Gedik B, Liu L. Location privacy in mobile systems: a persona- lized anonymization model [C] //Proceedings of 25th IEEE In- ternational Conference on Distributed Computing Systems.2005:620-629.
  • 8Cheng R, Zhang Y, Bertino E, et al. Preserving user location pri- vacy in mobile data management infrastructures [J]. Privacy Enhancing Technologies, 2006,4258: 393-412.
  • 9Khoshgozaran A, Shahabi C. Blind evaluation of nearest neigh- bor queries using space transformation to preserve location pri- vacy [J]. Advances in Spatial and Temporal Databases, 2007, 4605 : 239-257.
  • 10Hoh B, Gruteser M. Protecting location privacy through path confusion [C]//First International Conference on Security and Privacy for Emerging Areas in Communications Networks. 2005: 194-205.

同被引文献13

引证文献2

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部