期刊文献+

位置服务中基于盲签名的隐私保护技术研究

Research on Privacy Preserving Using Blind Signature in Location Based on Service
下载PDF
导出
摘要 针对传统的基于位置的服务(LBS)隐私保护模式的不足,提出了一种新的位置隐私保护技术,利用RSA密码体制,构造一种盲签名方案来实现用户真实身份的隐藏,从而达到了保护位置信息的目的,实现用户对位置隐私的完全控制,分析结果表明,该技术能有效降低通信开销以及服务器与客户端的处理代价。 For the flaw of traditional location-based services (LBS) privacy mode, a new protection technology is proposed, which using blind signa- ture scheme based on RSA cryptosystem to protect users' true identity and location information , so as to achieve the purpose of the protection of location information, let the users have completely control of their location privacy. The proposed design has proved its ability in reducing the communication over- head, as well as the processing cost of server and client.
作者 刘思思 叶猛
出处 《电视技术》 北大核心 2014年第3期89-92,共4页 Video Engineering
基金 国家"863"计划项目(2012BAH38B05)
关键词 隐私保护 盲签名 基于位置服务 privacy protection blind signature location-based services
  • 相关文献

参考文献5

  • 1潘晓,肖珍,孟小峰.位置隐私研究综述[J].计算机科学与探索,2007,1(3):268-281. 被引量:65
  • 2XU J,TANG X,HU H. Privacy-conscious location-based queries in mobile environment[J].{H}IEEE Transactions on Parallel and Distributed Systems,2010,(3):313-326.
  • 3KIDO H,YANAGISAWA Y,SATOH T. An anonymous communication technique using dummies for location-based service[EB/OL].http://wenku.baidu.com/link? url =8cWAfO9q6ra9e-9Ce8 CiQi8p9b0 HlzRfiGZYGHe692 aQNPGVq4EY0gQM8ZcT7ui4ESyOBfv s13n2j L6TgLpaAtwamAI9-c_QWPs4clKd0yq,2013.
  • 4HONG J I,LANDY J A. An architecture for privacy-sensitive ubiquitous computing[EB/OL].http://wenku.baidu.com/link? url =olsk4mMAunSCY0gL-Ta7iqrvstnge7myfG0eNMqbAlGD5alY2vcu RaaQxgpH2urJa4lY3-iS1 O2 v3 SfKM8 HHevuViy27 U2rPWFtI5 ea3 zaq,2013.
  • 5GEDIK B,LIU L. A customizable k-anonymity model for protecting location privacy[EB/OL].https://smartech.gatech.edu/ handle/1853/100,2013.

二级参考文献10

  • 1Atallah M J,Frikken K B.Privacy-preserving location-dependent query processing[].Proceeding of the IEEE/ACS International Conference on Pervasive Services(ICPS’).2004
  • 2Cheng R,Kalashnikov D V,Prabhakar S.Evaluating probabilistic queries over imprecise data[].Proceeding of ACM International Conference on Management of Data(SIGMOD’).2003
  • 3Machanavajjhala A,Gehrke J,et al.L-diversity:priva-cy beyond k-anonymity[].Proceedings ofnd Interna-tional Conference on Data Engineering(ICDE’).2006
  • 4Mokbel M F.Privacy in location-based services:start-of-the-art and research directions[].Proceeding ofth In-ternational Conference on Mobile Data Management(MDM’).2007
  • 5Man accused of stalking ex-girlfriend with GPS. http://www.foxnews.com/story/0,2933,131487,00.html . 2004
  • 6Authorities:GPS system used to stalk woman. http://www.usatoday.com/tech/news/2002-12-30-gps-stalker_x.htm . 2002
  • 7Sciannamea M.Companies increasingly use GPS-enable cell phones to track employees. http://wifi.weblogsinc.com/2004/09/24/companies-increasingly-use-gps-enabled-cell-phones-to-track/ . 2004
  • 8Gedik B,Liu L.Protecting location privacy with person-alized k-anonymity:architecture and algorithms[].IEEE Transactions on Mobile Computing.
  • 9Hong J I,Landay J A.An architecture for privacy-sen-sitive ubiquitous computing[].Proceedings of the Inter-national Conference on Mobile SystemsApplicationsand Services(MobiSys’).2004
  • 10Bettini C,Wang X S,Jajodia S.Protecting privacy a-gainst location-based personal identification[].Proceeding of the VLDB Workshop on Secure Data Management(SDM’).2005

共引文献64

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部