期刊文献+

基于位置服务中半可信用户的位置隐私保护方法 被引量:2

Location Privacy Preserving for Semi-honest Users in LBS
下载PDF
导出
摘要 随着移动计算和无限设备的蓬勃发展,基于位置服务中的位置隐私保护研究受到了学术界广泛关注。为保护位置隐私,学术界提出了很多匿名算法。但现有这些算法均基于一个假设,即网络中的所有用户均可信。实际上,网络中并不存在任何可信实体,现有基于真实位置生成匿名集的方法应用领域有限。针对此问题,根据用户发出信号强弱判断位置邻近性,提出了一种在k*NNG上的匿名算法,并通过"协作"的方式在不暴露用户任何隐私的前提下生成匿名区域。在不同系统设置下对算法进行实验,实验结果表明,算法在效率和服务质量上取得了较好的平衡。 Location privacy preservation has recently received considerable attention in LBS. A large num- ber of location cloaking algorithms have been proposed for protecting the location privacy of mobile users. How- ever, most of existing cloaking approaches assume that mobile users are trusted. And exact locations are required to protect location privacy, which are just the information mobile users want to hide. /12 this paper, we propose a p-anti-conspiring privacy model to anonymize over semi-honest users. Furthermore, a k * NNG -based cloaking algorithm k * NNCA is proposed to protect the location privacy without exact locations. The preliminary experi- mental results show the effectiveness of the proposed algorithm.
出处 《石家庄铁道大学学报(自然科学版)》 2014年第1期99-105,共7页 Journal of Shijiazhuang Tiedao University(Natural Science Edition)
基金 河北省教育厅青年基金项目(Q2012131) 河北社科基金项目(HB12GL017) 国家自然科学基金青年基金项目(61303017 61202111) 山东省高等学校科技计划项目(J12LN05)
关键词 位置隐私 移动数据管理 移动计算 location privacy mobile data management mobile computing
  • 相关文献

参考文献8

  • 1SWEENEY L. K-anonymity: a model for protecting privacy[ J ]. International Journal on Uncertainty. Fuzziness and Knowledge- based Systems ,2002, 10:557-570.
  • 2PAN X, MENG X, XU J. Distortion-based anonymity for continuous query in location-based mobile services [ C]//In Proc of ACM SIGSPATIAL GIS. Washington,2009:256-265.
  • 3PAN X,XU J, MENG X. Protecting location privacy against location-dependent attacks in mobile services [ J ]. IEEE Trans. Knowl. Data Eng,2012,24(8) : 1506-1519.
  • 4HUH , XU J. Non-exposure location anonymity[ C]//Proceedings of the 25th International Conference on Data Engineering (ICDE). Washington: IEEE Computer Society, 2009 : 1120-1131.
  • 5MOKBEL M F, CHOW C, AREF W G. The New Casper: query processing for location services without compromising privacy [ C]//Proceedings of the 32nd international conference on Very large data bases(VLDB). Seoul: VLDB Endowment, 2006: 763-774.
  • 6DING C H, HE X. K-nearest-neighbor consistency in data clustering: incorporating local information into global optimization [ C]//Proceedings of the ACM symposium on Applied computing(SAC). New York: ACM Press, 2004:584-589.
  • 7WELSH D J A, POWELL M B. An upper bound for the chromatic number of a graph and its application to timetabling problems [ J]. The Computer Journal, 1967,10:85-86.
  • 8BRINKHOFF T. Thomas Brinkhoff Network - based Generator of Moving Objects [ R/OL ]. Oldenburg: Jade University, 2013. http ://www. fboow, de/institute/iapg/personen/brinkhoff.

同被引文献11

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部