期刊文献+

一种满足共匿性要求的空间K-匿名及分割算法

Reciprocal_cloaking and Partition Algorithms for Spatial K-Anonymity
下载PDF
导出
摘要 空间K-匿名(spatial K-anonymity,SKA)是利用K-匿名的概念来保护用户免受基于位置的攻击.然而,现有的满足共匿性(reciprocity)要求的算法—Hilbert隐匿依赖特定的数据结构,而所提出的共匿算法在采用用户—匿名器—LBS架构的情况下能够使用现有的空间索引.在此基础上,进一步提出了一种新型调节中值分割方法,以提高有效性(即最小化匿名空间区域的尺寸)和查询效率(构建代价).最后,实验证明所提出的方法具有更优良的性能,并且由于使用通用的空间索引,所以该方法也支持传统的空间查询. Spatial K-anonymity ( SKA ) exploits the concept of K-anonymity in order to protect the identity of users from locationbased attacks. However, the existing reciprocal method (Hilbert Cloak ) relies on a specialized data structure. In contrast, the proposed reciprocal algorithm uses existing spatial indices on the user locations based on the framework of User-Anonymizer-LBS. At the same time, an adjusted median splits algorithm is provided, aimed on effectiveness ( i.e., minimum anonymizing spatial region size) and efficiency (i. e. , construction cost}. Finally, the experimental results verify that the proposed methods have higher performance. Moreover, since employing general-purpose spatial indices, the proposed methods support conventional spatial queries as well.
出处 《小型微型计算机系统》 CSCD 北大核心 2014年第1期93-98,共6页 Journal of Chinese Computer Systems
基金 国家自然科学基金项目(61070032)资助
关键词 基于位置的服务 匿名 隐私 空间数据库 location-based services anonymity privacy spatial databases
  • 相关文献

参考文献17

  • 1Beresford A R,Stajano F.Location privacy in pervasive computing[J]_ IEEE Pervasive Computing,2003,2(1):46-55.
  • 2Bettini C,Wang S,Jagodia S.Protecting privacy against location-based personal identification[C].VLDB Workshop on Secure DataManagement,Trondheim,Norway,2005,3674:185-199.
  • 3Chow C,Mokbel M F,Liu X.A peer-to-peer spatial cloaking algo-rithm for anonymous location-based services[C].Proceedings ofthe 14th Annual ACM International Symposium on Advances inGeographic Information Systems,New York,2006:171-178.
  • 4Kainis P,Ghinita G,Mouratidis K,et al.Preventing location-based identity inference in anonymous spatial queries[J].IEEETransactions on Knowledge and Data Engineering,2007,19(12):1719-1733.
  • 5Qiinita G,Zhao K,Papadias D,et al.A reciprocal frameworic for spatialK-Anonymity[J].Information Systems,2010,35(3):299-314.
  • 6Mokbel M F,Chow C-Y,Aref W G.The new casper:query pro-cessing for location services without compromising privacy[C].Proceedings of the 32nd International Conference on Very LargeData Bases f Seoul,Korea,2006:763-774.
  • 7Gruteser M,Grunwald D.Anonymous usage of location-based serv-ices through spatial and temporal cloaking[C].Proceedings of the1 st International Conference on Mobile Systems,Applications andServices,2003:3M2.
  • 8Butz A R.Alternative algorithm for hilbert's space-filling curve[J].IEEE Transactions on Computers,1971,C-20(4):424-426.
  • 9Gedik B,Liu L.Location privacy in mobile systems:a personal-ized anonymization model[C].Proceedings of 25th IEEE Interna-tiona! Conference on Distributed Computing Systems,Columbus,OH,2005:620-629.
  • 10Cheng R,Zhang Y,Bertino E,et al.Preserving user location priva-cy in mobile data management infrastructures[C].Proceedings ofthe 6th Workshop on Privacy Enhancing Technologies,2006,4258:393-412.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部