期刊文献+

基于个性化隐私需求的查询隐私保护算法研究 被引量:1

Research of query privacy protection algorithm with personalized requirements of privacy
原文传递
导出
摘要 现有大多数基于位置服务(location based service,LBS)的隐私保护算法都将对用户位置隐私的保护等同于对整个LBS查询服务隐私的保护.但是,在用户位置信息已知的前提下,这些算法有可能面临推断攻击.在考虑用户个性化隐私需求的情况下,基于四分树结构提出了能够避免此类推断攻击的隐私保护算法;为了有效的减小隐惹区域的大小基于半象限的定义对该算法进行了进一步优化.最后,通过仿真实验验证了算法抵御推理攻击的有效性. Location privacy protection and query privacy protecton is considered to be equivalent in most existing LBS ( location - based service) privacy protection algorithms. However, under the prem- ise of the user location information is known, these algorithms will lead to inferring attack. In this pa- per, we proposed an algorithm based on quadtree to avoid this kind of attack, and to satisfy the user' s personalized query privacy. Furthermore, in order to rerude the size of cloaking area, we optimized the algorithm based on half quadrant defination. Finally, the effectiveness of the algorithms to resist inferring attack is verified by simulation experiment.
出处 《福州大学学报(自然科学版)》 CAS CSCD 北大核心 2013年第6期975-980,共6页 Journal of Fuzhou University(Natural Science Edition)
基金 福建省自然科学基金资助项目(2010J01330) 福州大学科技发展基金资助项目(2012-XQ-27)
关键词 查询隐私保护 个性化隐私需求 隐匿区域 四分树 半象限 query privacy protection personalized requirements of privacy cloaking area quadtree half quadrant
  • 相关文献

参考文献11

  • 1潘晓,肖珍,孟小峰.位置隐私研究综述[J].计算机科学与探索,2007,1(3):268-281. 被引量:65
  • 2Thomas Brinkhoff.A Framework for Generating Network-Based Moving Objects[J].GeoInformatica.2002(2)
  • 3Chow C,Mokbel M F,Liu X.A peer to peer spatial cloaking algorithm for anonymous location-based services[].Proc of the Annual ACM Int Symp on Advances in Geographic Information Systems (GIS).2006
  • 4Mokbel M F,Chow C,Aref W G.The New Casper:query processing for location services without compromising privacy[].International Conference on Very Large Data Bases (VLDB’’).2006
  • 5Gedik B,Liu L.Location privacy in mobile systems:A personalized anonymization model[].Proceedings of the th International Conference on Distributed Computing Systems.2005
  • 6C. Y. Chow,M. Mokbel.Enabling private continuous queries for revealed user locations[].Theth International Conference on Advances in Spatial and Temporal Databases.2007
  • 7P Kalnis,G Ghinita,K Mouratidis,D Papadias.Emerging Knowledge and Data Engineering Applications - Preventing Location-Based Identity Inference in Anonymous Spatial Queries[].IEEE Transactions on Knowledge and Data Engineering.2007
  • 8Gruteser M,Grunwald D.Anonymous usage of location-based services through spatial and temporal cloaking[].International Conference on Mobile Systems Applications andServices (MobiSys’’).2003
  • 9Beresford, Alastair R.,Stajano, Frank.Location privacy in pervasive computing[].IEEE Pervasive Computing.2003
  • 10Ghinita G,Kalnis P,Skiadopoulos S.PRIVE:Anonymous loca-tion based queries in distributed mobile systems[].Procee-dings of the International Conference on World Wide Web (WWW’’).2007

二级参考文献10

  • 1Atallah M J,Frikken K B.Privacy-preserving location-dependent query processing[].Proceeding of the IEEE/ACS International Conference on Pervasive Services(ICPS’).2004
  • 2Cheng R,Kalashnikov D V,Prabhakar S.Evaluating probabilistic queries over imprecise data[].Proceeding of ACM International Conference on Management of Data(SIGMOD’).2003
  • 3Machanavajjhala A,Gehrke J,et al.L-diversity:priva-cy beyond k-anonymity[].Proceedings ofnd Interna-tional Conference on Data Engineering(ICDE’).2006
  • 4Mokbel M F.Privacy in location-based services:start-of-the-art and research directions[].Proceeding ofth In-ternational Conference on Mobile Data Management(MDM’).2007
  • 5Man accused of stalking ex-girlfriend with GPS. http://www.foxnews.com/story/0,2933,131487,00.html . 2004
  • 6Authorities:GPS system used to stalk woman. http://www.usatoday.com/tech/news/2002-12-30-gps-stalker_x.htm . 2002
  • 7Sciannamea M.Companies increasingly use GPS-enable cell phones to track employees. http://wifi.weblogsinc.com/2004/09/24/companies-increasingly-use-gps-enabled-cell-phones-to-track/ . 2004
  • 8Gedik B,Liu L.Protecting location privacy with person-alized k-anonymity:architecture and algorithms[].IEEE Transactions on Mobile Computing.
  • 9Hong J I,Landay J A.An architecture for privacy-sen-sitive ubiquitous computing[].Proceedings of the Inter-national Conference on Mobile SystemsApplicationsand Services(MobiSys’).2004
  • 10Bettini C,Wang X S,Jajodia S.Protecting privacy a-gainst location-based personal identification[].Proceeding of the VLDB Workshop on Secure Data Management(SDM’).2005

共引文献64

同被引文献11

引证文献1

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部