期刊文献+

A Privacy Protection Method for Continuous Query Based on Location Services 被引量:2

A Privacy Protection Method for Continuous Query Based on Location Services
原文传递
导出
摘要 To solve the problem that the traditional location-based services anonymity model is not applied to the continuous query, quasi real-time cloak algorithm (QR-TCA) has been proposed, and the non-delay cloak model (N-DCM) has been established. After comprehensive analysis of location-based continuous query privacy protection models, a model that can solve the user service delay problem is proposed, which can provide the users with quasi-real time location-based services. The experiment measures the N-DCM model with multiple dimensions, such as service response time and service quality of standard datasets. The experiment results show that the method is suitable for continuous query location privacy protection and can effectively protect the user’s location privacy. To solve the problem that the traditional location-based services anonymity model is not applied to the continuous query, quasi real-time cloak algorithm (QR-TCA) has been proposed, and the non-delay cloak model (N-DCM) has been established. After comprehensive analysis of location-based continuous query privacy protection models, a model that can solve the user service delay problem is proposed, which can provide the users with quasi-real time location-based services. The experiment measures the N-DCM model with multiple dimensions, such as service response time and service quality of standard datasets. The experiment results show that the method is suitable for continuous query location privacy protection and can effectively protect the user’s location privacy.
出处 《Wuhan University Journal of Natural Sciences》 CAS 2013年第5期449-454,共6页 武汉大学学报(自然科学英文版)
基金 Supported by the National Natural Science Foundation(61170035, 61272420) the Natural Science Foundation of Jiangsu Province(BK2011022, BK2011702) the Fundamental Research Funds for the Central Universities (30920130112006) Jiangsu Province Blue Project Innovation team,Nanjing science and technology project (020142010) Nanjing University of Science and Technology in 2009 Zijin Star Project Funding
关键词 location-based services privacy protecting K-MEANS continuous query location-based services privacy protecting k-means continuous query
  • 相关文献

参考文献1

二级参考文献28

  • 1Ackerman L,Kempf J,Miki T. Wireless location privacy:a report on law and policy in the United States,the Europrean Union,and Japan.Technical Report DCL-TR2003-001[M].DoCoMo Cotmuuinication Laboratories,USA,2003.
  • 2Barkhuus L,Dey A K. Location-based services for mobile telephony:a study of users' privacy concerns[A].2003.
  • 3Beresford A R,Stajano F. Location privacy in pervasive computing[J].IEEE Pervasive Computing,2003,(01):46-55.
  • 4Gedik B,Liu L. Protecting location privacy with personalized kanonymity:architecture and algorithms[J].IEEE Transactions on Mobile Computing,2008,(01):1-18.
  • 5Ghinita G,Kalnis P,Skiadopoulos S. PRIVE:anonymous location-based queries in distributed mobile systems[A].2007.371-389.
  • 6Wang T,Liu L. Privacy-aware mobile services over road networks[J].Proceedings of the VLDB Endowment,2009,(01):1042-1053.
  • 7Kido H,Yanagisawa Y,Satoh T. An anonymous communication technique using dummies for location-based services[A].2005.88-97.
  • 8Hong J I,Landay J A. An architecture for privacy-sensitive ubiquitous computing[A].2004.177-189.
  • 9Duckham M,Kulik L. A formal model of obfuscation and negotiation for location privacy[A].2005.152-170.
  • 10Gruteser M,Grunwald D. Anonymous usage of location-based services through spatial and temporal cloaking[A].2003.31-42.

共引文献4

同被引文献38

  • 1DAMIANI M L. Location privacy models in mobile applications: con- ceptnal view and research directions [ J l. Geolnfotmatica, 2014, 18(4) :819-842.
  • 2MOKBEL M F, CHOW C Y, AREF W G. The new Casper: query processing for location services without compromising privacy [ C ]// Proc of the 32nd International Conference on Very Large Data Bases. New York: ACM Press, 2006: 763-774.
  • 3XU T, CAI Ying. Location anonymity in continuous location-based serviees [ C ]//Proc of the 15th Annual ACM International Symposium on Advances in Geographic Information Systems. New York: ACM Press, 2007: 39.
  • 4WERNKE M, SKVORTSOV P, DURR F, et al. A classification of location privacy attacks and approaches [ J]. Persona[ and Ubiqui- tous Com0uting, 2014, 18(1 ) : 163-175.
  • 5PALANISAMY B, LIU Ling. MobiMix: protecting location privacy with mix-zones over road networks [ C ]//Proc of the 27th International Conference on Data Engineering. 2011: 494-505.
  • 6AGIR B, PAPAIOANNOU T G, NARENDULA R, et al. User-side adaptive protection of location privacy in participatory sensing [ J ].Geolnformatica, 2014, 18 ( 1 ) : 165-191.
  • 7SWEENEY L. k-anonymity: a model for protecting privacy [ J]. In- ternational Journal of Uncertainty, Fuzziness and Knowledge- based Systems, 2002, 10(5)= 557-570.
  • 8YIU M L, JENSEN C S, HUANG Xue-gang, et al. SpaeeTwist : mana- ging the trade-offs among location privacy, query performance, and query accuracy in mobile services[ C]//Proc of the 24th International Conference on Data Engineering. 2008: 366-375.
  • 9DEWRI R. Local differential perturbations: location privacy under approximate knowledge attackers[J]. IEEE Trans on Mobile Com- puting, 2013, 12(12) : 2360-2372.
  • 10I-IUO Zheng, MENG Xiao-feng, HU Hai-bo, et al. You can walk alone: trajectory privacy-preserving through significant stays protection [ C ]//Proc of the 17th International Conference on Database Systems for Advanced Applications. Berlin : Springer, 2012 : 351 - 366.

引证文献2

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部