期刊文献+

路网条件下基于用户协作的LBS隐私保护 被引量:2

A collaborative LBS privacy protective method in road-network
下载PDF
导出
摘要 针对移动终端在缺乏固定通信基础设施的路网环境下消费LBS服务时的用户位置隐私保护问题,提出了一种基于用户协作的位置隐私保护方法:用户问通过Chord协议自组织成P2P网络,当用户消费服务时,由其选择代理节点进行转发增量近邻查询。为了提高该方法的服务质量,提出了最大连通稳定度理论以实现代理用户优选,保证P2P通讯的稳定性,同时引入通信成本估算方法实现查询点的自适应选择,以减少代理用户的查询通讯开销。对此算法进行了理论分析,并通过实验验证了其性能,实验结果表明该方法在路网条件下具有较高的隐私保护度,而且实现了隐私保护度与服务质量的平衡。 A new user collaborationbased location privacypreserving method for location based service (LBS) users is presented to realize the location privacy protection for mobile users when mobile devices are in the road networks without enough fixed communication infrastructures. According to the method, mobile users are selforganized as a P2P network according to the Chord protoco a proxy user from the P2P network for forw 1, and a user consuming LBS services blurs his real position and selects arding incremental nearestneighbor query. Meanwhile, in order to im prove the QoS(qualityofservice) of the method, the maximum connectstability theory is proposed to select an opti mized proxy user for stable communication of the network, and a communicationcost estimation method is intro duced to determine the queryanchor for eliminating communication overhead. The theoretical analysis and experi mental results validate the technique's effectiveness in LBS accuracy, privacy protection and communication QoS.
出处 《高技术通讯》 CAS CSCD 北大核心 2013年第11期1148-1153,共6页 Chinese High Technology Letters
基金 国家自然科学基金(61170113) 北京市自然科学基金(4112016) 北京市属高等学校人才强教计划(PHR201108075) 北京市属高等学校科学技术与研究生教育创新工程建设项目(PXM2012_014213_000079) 北京市属高等学校教师队伍建设--青年英才计划(YETP1452)资助项目
关键词 P2P网络 基于位置的服务(LBS) 位置隐私 网络安全 隐私保护 P2P network, location based service ( LBS), location privacy, network security, privacy protection
  • 相关文献

参考文献13

  • 1魏志强,康密军,贾东宁,殷波,周炜.普适计算隐私保护策略研究[J].计算机学报,2010,33(1):128-138. 被引量:25
  • 2周傲英,杨彬,金澈清,马强.基于位置的服务:架构与进展[J].计算机学报,2011,34(7):1155-1171. 被引量:170
  • 3GedikB, Liu L. Location privacy in mobile systems : A per- sonalized anonymization model. In: Proceedings of the 25th International Conference on Distributed Computing Systems, Columbus, USA, 2005. 620 -629.
  • 4薛姣,刘向宇,杨晓春,王斌.一种面向公路网络的位置隐私保护方法[J].计算机学报,2011,34(5):865-878. 被引量:36
  • 5潘晓,郝兴,孟小峰.基于位置服务中的连续查询隐私保护研究[J].计算机研究与发展,2010,47(1):121-129. 被引量:66
  • 6Man L Y, Christian S J,Jesper M,et al. Design and analy- sis of a ranking approach to private location-based serv- ices. ACM Transactions on Database Systems, 2011,36 (2) :1.-46.
  • 7Aniket P, Yu W, Zhang N. A context-aware scheme for privacy-preserving location based services. Computer Net- works ,2012,56 ( 11 ) :2551-2568.
  • 8Chow C, Mokel M,Liu X. A peer to peer spatial cloaking algorithm for anonymous location based service. In: Pro- ceedings of 14th ACM International Symposium on Geo- graphic Information Systems, Arlington, USA, 2006. 171- 178.
  • 9Ghinita G, Kalnis P, Skiadopouslos S. MobiHide:A mobile peer to peer system for anonymous location based queries. In:Proceedings of the 10th International Symposium Ad- vances in Spatial and Temporal Databases, Boston, USA,2007. 221-238.
  • 10徐建,黄孝喜,郭鸣,金正平,郑宁.动态P2P网络中基于匿名链的位置隐私保护[J].浙江大学学报(工学版),2012,46(4):712-718. 被引量:13

二级参考文献183

  • 1潘晓,肖珍,孟小峰.位置隐私研究综述[J].计算机科学与探索,2007,1(3):268-281. 被引量:65
  • 2Halpern J Y, Weissman V. Using first-order logic to reason about policies//Proceedings of the IEEE Computer Security Foundations Workshop. NY, 2003:187-201.
  • 3Damiani E, Di Vimercati S C, Paraboschi S, Samarati P. A fine-grained access control system for XML documents. ACM Transactions on Information and System Security, 2002, 5(2), 169-202.
  • 4Jajodia S, Samarati P, Subrahmanian V S. A logical language for expressing authorizations//Proceedings of the IEEE Symposium on Security and Privacy. Oakland, CA, 1997:31- 43.
  • 5Pucella R, Weissmann V. Reasoning about dynamic policies//Proceedings of FoSSaCS-7, 2004: 453-467.
  • 6Dougherty D J, Fisler K, Krishnamurthi S. Specifying and reasoning about dynamic access-control policies//Bhalla S ed. Lecture Notes in Computer Science 4130. Springer, 2006:632-646.
  • 7DeTreville J. Binder, a logic-based security language//Proceedings of the IEEE Symposium on Security and Privacy. Berkeley, CA, 2002:105- 113.
  • 8Jajodia S, Samarati P, Sapino M L, Subrahmanian V. Flexible support for multiple access control policies. ACM Transactions on Database Systems, 2006, 26(2): 214-260.
  • 9Li N, Mitchell J C, Winsborough W H. Design of a rolebased trust-management framework//Proceedings of the IEEE Symposium on Security and Privacy. Berkeley, CA, 2002:114-130.
  • 10Barker S. Security policy specification in logic//Proceedings of the International Conference on Artificial Intelligence. Las Vegas, Nevada, USA, 2000:143-148.

共引文献326

同被引文献29

  • 1GRUTESER M, GRUNVqALD D. Anonymous usage of loca- tion-based services through spatial and temporal cloaking[A]. Pro- ceedings of the 1st International Conference on Mobile Systems, Ap- plications and Services[C]. 2003.31-42.
  • 2NIU B, LI Q, ZHU X, et al. Achieving k-anonymity in privacy-aware location-based services[A].Proc IEEE INFOCOM[C]. 2014.754-762.
  • 3GHINITA G. Privacy for location-based services[J]. Synthesis Lee- tures on Information Security, Privacy, & Trust, 2013, 4(1): 1-85.
  • 4BAMBA B, LIU L, PESTI P, et al. Supporting anonymous location queries in mobile environments with privacygrid[A]. Proceedings of the 17th International Conference on World Wide Web[C]. 2008. 237-246.
  • 5DONDI R, MAURI G, ZOPPIS I. The l-diversity problem: tractability and approximability[J]. Theoretical Computer Science, 2013, 511: 159-171.
  • 6KIDO H, YANAGISAWA Y, SATOH T. An anonymous communica- tion technique using dummies for location-based services[A]. Perva- sive Services, ICPS'05, Proceedings International Conference[C]. 2005.88-97.
  • 7NIU B, ZHANG Z, LI X, et al. Privacy-area aware dummy generation algorithms for location-based services[A].Commtmications (ICC), 2014 IEEE International Conference[C]. 2014. 957-962.
  • 8HONG J I, LANDAY J A. An architecture for privacy-sensitive ubiquitous computing[A].Proceedings of the 2nd International Conference on Mobile Systems, Applications, and Services[C]. 2004. 177-189.
  • 9YIU M L, JENSEN C S, HUANG X, et al. Spacetwist: managing the txade-offs among location privacy, query performance, and query ac- curacy in mobile services[A].Data Engineering, ICDE 2008, IEEE 24th International Conference[C]. 2008. 366-375.
  • 10HUO Z, MENG X, HU H, et al. You can walk alone: trajectory pri- vacy-preserving through significant stays protection[A]. Database Sys- tems for Advanced Applications[C]. Springer Berlin Heidelberg, 2012. 351-366.

引证文献2

二级引证文献22

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部