期刊文献+

对位置信息服务的连续查询攻击算法 被引量:1

Continuous queries attacking algorithms of location based service
下载PDF
导出
摘要 为了解决连续查询攻击算法给位置信息服务(LBS)带来的安全隐患,基于已有的k-匿名化Cloaking算法提出了一种新的连续查询攻击算法——CQACA。该算法首先利用熵和查询匿名度量定义了查询识别率的目标函数,并结合元胞蚁群给出了目标函数的求解算法。最后,利用移动对象数据生成器进行实验,深入研究了影响CQACA的关键因素,同时对比分析了该算法与Cloaking算法的性能差异:CQACA与实际数据的误差为13.27%,而Cloaking算法则为17.35%。结果表明CQACA具有一定的有效性。 In order to mitigate the security risks in Location Based Service (LBS) with continuous query attacking algorithm, a new algorithm -- Continuous Queries Attacking algorithm based on Cellular Ant (CQACA) was proposed by k- anonymity measurement. At first, the objective function of query recognition rate was defined with entropy and anonymity measurement, and the algorithmic process of objective function was presented by cellular ant. Finally, a simulation with the moving object data generator was conducted to study the key factors of CQACA, and the performance between CQACA and Cloaking was compared. Compared with the actual trajectory, the error of CQACA was 13.27%, and error of Cloaking was 17.35%. The result shows that CQACA has better effectiveness.
作者 杨琼 俞立峰
出处 《计算机应用》 CSCD 北大核心 2014年第1期95-98,170,共5页 journal of Computer Applications
基金 浙江省教育厅科研项目(Y201329895) 绍兴市科技局公益性技术应用研究计划项目(2013B70023)
关键词 位置信息服务 连续查询攻击算法 查询匿名度量 查询识别率 元胞蚁群 Location Based Service (LBS) continuous query attacking algorithm anonymity measurement query recognition rate cellular ant colony
  • 相关文献

参考文献19

  • 1MOURATIDIS K,YIU M L. Anonymous query processing in road networks[J].{H}IEEE Transactions on Knowledge and Data Engineering,2010,(01):2-15.
  • 2GUTING R H,BOHLEN M H,ERWIG M. A foundation for representing and quering moving objects[J].{H}ACM Transactions on Database Systems,2000,(01):1-42.
  • 3ARDAGNA C. An obfuscation-based approach for protecting location privacy[J].{H}IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING,2011,(01):13-27.
  • 4XU J,TANG X,DU J. Privacy-conscious location-based queries in mobile environments[J].{H}IEEE Transactions on Parallel and Distributed Systems,2010,(03):313-326.
  • 5ABUL O,BONCHI F,NANNI M. Anonymization of moving objects databases by clustering and perturbation[J].{H}Information Systems,2010,(08):884-910.
  • 6DOMINGO-FERRER J,TRUJILLO-RASUA R. Microaggregation and permutation-based anonymization of movement data[J].{H}Information Sciences,2012.55-80.
  • 7HU H,XU J. PASS:bandwidth-optimized location cloaking for anonymous location-based services[J].{H}IEEE Transactions on Parallel and Distributed Systems,2010,(10):1458-1472.
  • 8潘晓,郝兴,孟小峰.基于位置服务中的连续查询隐私保护研究[J].计算机研究与发展,2010,47(1):121-129. 被引量:66
  • 9REBOLLO D. Private location-based information retrieval through user collaboration[J].{H}Computer Communications,2010,(06):762-744.
  • 10HASHERN T,KULIK L. Don't trust anyone:privacy protection for location-based services[J].Pervasive and Mobile Computing,2011,(01):44-59.

二级参考文献39

  • 1潘晓,肖珍,孟小峰.位置隐私研究综述[J].计算机科学与探索,2007,1(3):268-281. 被引量:65
  • 2葛红霞,祝会兵,戴世强.智能交通系统的元胞自动机交通流模型[J].物理学报,2005,54(10):4621-4626. 被引量:31
  • 3何中胜,刘宗田,庄燕滨.基于数据分区的并行DBSCAN算法[J].小型微型计算机系统,2006,27(1):114-116. 被引量:16
  • 4朱刚,马良.基于元胞自动机的物流系统选址模型[J].上海理工大学学报,2006,28(1):19-22. 被引量:12
  • 5杨晓春,刘向宇,王斌,于戈.支持多约束的K-匿名化方法[J].软件学报,2006,17(5):1222-1231. 被引量:60
  • 6Mokbel M F, Chow C Y, Aref W G. The new Casper: Query processing for location services without compromising privacy [C] //Proc of the 32nd Int Conf on Very Large Data Bases (VLDB). New York: ACM, 2006:763-774.
  • 7Chow C, Mokbel M F. Enabling privacy continuous queries for revealed user locations [C]//LNCS 4605 : Proc of the Int Syrup on Advances in Spatial and Temporal Databases (SSTD). Berlin: Springer, 2007.
  • 8Gruteser M, Grunwal D. Anonymous usage of location-based services through spatial and temporal cloaking [C] //Proe of the Int Conf on Mobile Systems, Applications, and Services (MobiSys). New York: ACM, 2003:163-168.
  • 9Xiao Zhen, Xu Jianliang, Meng Xiaofeng. P-sensitivity: A semantic privacy-protection model for location-based services [C] //Proc of the 2nd Int Workshop on PriVacy-Aware Location-Based Mobile Services(PALMS). Piscataway, NJ: IEEE, 2008:47-54.
  • 10Bamba B, Liu L. Supporting anonymous location queries in mobile environments with privacy grid [C] //Proc of Int Conf on World Wide Web (WWW). New York: ACM, 2008: 237-246.

共引文献147

同被引文献20

  • 1Mokbel M F,Chow C Y,Aref W G.The new casper:query processing for location services without compromising privacy[J].Proc of the International Conference on Very Large Data Bases Vldb,2006,34(4):763-74.
  • 2Wernke M,Skvortsov P,Dürr F,et al.A classification of location privacy attacks and approaches[J].Personal and Ubiquitous Computing,2014,18(1):163-75.
  • 3Song Y,Hu Z,Leng X,et al.Friendship influence on mobile behavior of location based social network users[J].Communications and Networks Journal,2015,17(2):126-132.
  • 4Pingley A,Yu W,Zhang N,et al.CAP:a context-aware privacy protection system for location-based services[C]∥Distributed Computing Systems,2009.ICDCS'09.29th IEEE International Conference on.IEEE,2009:49-57.
  • 5Chang W,Wu J,Tan C C.Friendship-based location privacy in Mobile Social Networks[J].International Journal of Security and Networks,2011,6(4):226-36.
  • 6Ghinita G,Kalnis P,Khoshgozaran A,et al.Private queries in location based services:anonymizers are not necessary[C]∥Proceedings of the 2008 ACM SIGMOD international conference on Management of data.ACM,2008:121-132.
  • 7Sweene L.k-Anonymity:a model for protecting privacy[J].International Journal of Uncertainty Fuzziness and Knowledge-Based Systems,2002,10(5):557-70.
  • 8Gruteser M,Grunwald D.Anonymous usage of location-based services through spatial and temporal cloaking[C]∥In Proceedings of the First International Conference on Mobile Systems,Applications,and Services.ACM2003:31-42.
  • 9Gedik B,Liu L.Location privacy in mobile systems:a personalized anonymization model[C]∥Distributed Computing Systems,2005.ICDCS 2005.Proceedings.25th IEEE International Conference on.IEEE,2005:620-629.
  • 10Chow C Y,Mokbel M F,Aref W G.Casper*:query processing for location services without compromising privacy[J].Acm Transactions on Database Systems,2009,34(4):763-74.

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部