期刊文献+

障碍空间中保持位置隐私的最近邻查询方法 被引量:10

Location Privacy Preserving Obstructed Nearest Neighbor Queries
下载PDF
导出
摘要 基于位置服务的隐私保护是近年来空间数据库领域研究的热点.然而,现有的位置隐私保护方法只支持简单的最近邻查询,没有考虑障碍物的空间.但是障碍物的空间在实际中是普遍存在的,因此,研究障碍空间中保持位置隐私的最近邻查询问题是有意义的,也是一个难点.针对这个问题,提出了一种基于第三方可靠服务器的方法.该方法能够保证用户在享受基于位置服务所提供的实际准确答案的同时,其位置信息不被泄露.该方法首先针对用户查询的准确位置,利用第三方可靠服务器来构造一个匿名的区域并发送给位置服务器,进行匿名区域的查询处理.在查询处理过程中,提供了两种查询处理方法:1)基于线段的最大障碍距离的查询处理方法(基本方法),即利用线段的最大障碍距离来扩展匿名区域,返回扩展后的区域内的结果;2)优化查询处理方法,即在基本方法的基础上,进行迭代优化,进一步缩小扩展区域.然后把匿名区域的查询处理的结果返回给第三可信方.最后,第三方可靠服务器根据用户的准确位置,把实际准确结果返回给用户.实验结果和理论表明了这两种查询处理方法的有效性和正确性. Location privacy has been a hot topic in recent years. However, the methods of existing location privacy preserving only support simple nearest neighbor queries, which do not consider the obstructed space. But in fact, the obstructed space is very popular in our life. Therefore, we study location privacy preserving obstructed nearest neighbor queries. Due to the effect of obstacles, this problem is also very hard. In this paper, we adopt a normal approach based on the third trusted party for privacy preserving obstructed nearest neighbor (ONN) queries. The approach can entertain the location-based service without leaking the user's exact location and obtain the exact answer. In our approach, firstly, the third trusted party constructs a cloaked region corresponding to the exact location and sends the cloaked region to the LBS. Then LBS processes the query region. In the process of query processing, we use two methods to return a set of candidate answers with respect to the cloaking region for the actual user location: 1)Basic approach of query processing, which uses the max obstructed distance of segment to expand the region and returning the results in the expanded region; 2)Improved approach of query processing, which further narrows the expanded region based on the basic approach. At last, the third trusted party returns the actual answer to the users corresponding to user's exact location . Finally, experimental results and proof theory show the effectiveness and correctness of our approach.
出处 《计算机研究与发展》 EI CSCD 北大核心 2014年第1期115-125,共11页 Journal of Computer Research and Development
基金 国家"九七三"重点基础研究发展计划基金项目(2012CB316201) 国家自然科学基金项目(61173031 61272178) 国家自然科学基金海外及港澳学者合作基金项目(61129002) 高等学校博士学科点专项科研基金项目(20110042110028) 中央高校基本科研业务费专项基金项目(N110404015 N120504001)
关键词 障碍空间 最近邻查询 位置隐私 匿名区域 障碍距离 obstructed space nearest neighbor queries location privacy cloaked region obstructeddistance
  • 相关文献

参考文献2

二级参考文献14

  • 1潘晓,肖珍,孟小峰.位置隐私研究综述[J].计算机科学与探索,2007,1(3):268-281. 被引量:65
  • 2Gruteser M,Grunwald D.Anonymous usage of locationbased services through spatial and temporal cloaking//Proceedings of the first International Conference on Mobile Systems,Applications,and Services.San Francisco,CA,USA,2003:163-168.
  • 3Wang T,Liu L.Privacy-aware mobile services over road networks//Proceedings of the 35th International Conference on Very Large Data Bases.Lyon,France,2009:1042-1053.
  • 4Gedik B,Liu L.A customizable k-anonymity model for proteeting location privacy//Proceedings of the International Conference on Distributed Computing Systems.Columbus,OH,USA,2005:620-629.
  • 5Xiao Z,Meng X,Xu J.Quality aware privacy protection for location-based services.Advances in Database:Concepts,Systems and Applications,2007,10(33):434-446.
  • 6Mokbel M,Chow C,Aref W.The new Casper:Query processing for location services without compromising privacy//Proceedings of the 32nd International Conference on Very Large Data Bases.Seoul,Korea,2006:763-774.
  • 7Bamba B,Liu L,Pesti P,Wang T.Supporting anonymous location queries in mobile environments with privacy grid//Proceedings of the 17th International World Wide Web Conferenee.Beijing,China,2008:237-246.
  • 8Kalnis P,Ghinita G,Mouratidis K.Preventing locationbased identity inference in anonymous spatial queries.IEEE Transactions on Knowledge and Data Engineering,2007,19(12):1719-1733.
  • 9Chow C,Mokbel M,Liu X.A peer-to-peer spatial cloaking algorithm for anonymous location-based services//Proceedings of the 14th International Symposium on Advances in Geographic Information Systems.Arlington,VA,USA,2006:171-178.
  • 10Ghinita G,Kalnis P,Skiadopuslos S.PRIVE.:Anonymous location-based queries in distributed mobile systems//Proceedings of the 16th International World Wide Web Conference.Banff,Alberta,Canada,2007:1-10.

共引文献35

同被引文献74

  • 1卢炎生,何亚军,潘鹏.EINN最近邻居查询索引遍历算法改进[J].计算机工程与科学,2005,27(7):62-64. 被引量:2
  • 2ROUSSOPOULOS N,KELLEY S,VINCENT F.Nearest neighbor queries[C]//Proceedings of the ACM Special Interest Group on Management of Data(SIGMOD’95).California,USA,1995:71-79.
  • 3GRUTESER M,GRUNWAL D.Anonymous usage of location based services through spatial and temporal cloaking[C]//Proceedings of the International Conference on Mobile Systems,Applications,and Services(MobiSys’03).California,USA,2003:31-42.
  • 4MOKBEL M F,CHOW C Y,AREF W G.The new casper:Query processing for location services without compromising privacy[C]//Proceedings of the International Conference on Very Large Data Bases(VLDB’06).Seoul,Korea,2006:763-774.
  • 5GEDIK B,LIU L.Location privacy in mobile systems:A personalized anonymization model[C]//Proceedings of the IEEE International Conference on Distributed Computing Systems(ICDCS’05).Ohio,USA,2005:620-629.
  • 6FIROOZJAEI M D,YU J,KIM H.Privacy preserving nearest neighbor search based on topologies in cellular networks[C]//Proceedings of the IEEE International Conference on Advanced Information Networking and Applications Workshops.Suwon,Korea,2015:146-149.
  • 7INDYK P,WOODRUFF D,Polylogarithmic private approximations and efficient matching[C]//Proceedings of the Third Theory of Cryptography Conference(TCC’06),New York,USA,2006:245-264.
  • 8KHOSHGOZARAN A,SHAHABI C.Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy[C]//Proceedings of the International Symposium on Spatial and Temporal Databases(SSTD’07),Massachusetts,USA,2007:239-257.
  • 9YIU M L,JENSEN C S,HUANG X,et al.Spacetwist:Managing the trade-offs among location privacy,query performance,and query accuracy in mobile services[C]//Proceedings of the IEEE International Conference on Data Engineering(ICDE’08).Cancun,Mexico,2008:366-375.
  • 10GONG Z,SUN G,XIE X.Protecting privacy in location-based servicesusing k-anonymity without cloaked region[C]//Proceedings of the International Conference on Mobile Data Management(MDM’10).Missouri,USA,2010:366-371.

引证文献10

二级引证文献27

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部