期刊文献+

P2P模式下基于网格扩增的位置匿名算法 被引量:7

Spatial Cloaking Algorithm Based on Grid Expansion in P2P Mode
下载PDF
导出
摘要 位置k-匿名方法是当前基于位置的服务中隐私保护领域的研究热点。典型的位置匿名算法多采用单一可信的中心匿名服务器对用户位置进行匿名,但中心服务器容易成为性能瓶颈和集中攻击点,而已有P2P模式下的位置匿名算法在安全性上较弱。针对上述问题,提出了一种P2P模式下基于网格扩增的位置匿名算法,其利用网格划分平面,通过不断翻倍扩增网格宽度寻找满足用户隐私需求的匿名区,最终完成对用户位置的匿名。同时算法在运行中能够与邻近节点分享计算所得中间结果,并对其进行缓存。实验表明,与已有算法相比,本算法可显著降低网络带宽的消耗,减少位置匿名耗时,同时能够避免匿名区中心攻击,且抗查询采样攻击的能力得到较大提升。 Location k-anonymity becomes a research focus in the privacy-preserving field of location-based service recently.Typical spatial cloaking algorithms require a centralized trusted anonymity server which could be the system bottleneck and single point of attacks,while the existing spatial cloaking algorithms in P2P (Peer to Peer) mode suffer from several attack models.A spatial cloaking algorithm based on grid expansion in P2P mode was proposed to solve this problem.It divides the space into grids and computes cloaking region by keeping trying to double the grid's width until user's privacy requirement is satisfied.Meanwhile the intermediate result is shared and cached with other peers during the running process of the algorithm.The experimental results show that the proposed algorithm reduces the consumption of network bandwidth and time cost of spatial cloaking.Moreover,it is free from center-of-cloak attack and more resistant to sample query attack in comparison with the existing algorithms.
出处 《计算机科学》 CSCD 北大核心 2014年第4期90-94,共5页 Computer Science
基金 国家科技支撑计划项目(2012BAH15F03) 上海市自然科学基金项目(13ZR1443100) 科技部国际合作项目(2013DFM10100) 上海市科委计划项目(11JC1412800)资助
关键词 基于位置的服务 位置隐私 K-匿名 P2P Location-based service Location privacy k-Anonymity P2P
  • 相关文献

参考文献15

  • 1Hong J I,Landay J A.An architecture for privacy-sensitive ubiquitous computing[C] //Proceedings of the 2nd international conference on Mobile systems,applications,and services.New York:ACM,2004:177-189.
  • 2Yiu M L,Jensen C S,Huang X,et al.SpaceTwist Managing the Trade-Offs Among Location Privacy,Query Performance,and Query Accuracy in Mobile Services[C] // IEEE 24th International Conference on Data Engineering.Cancun:ICDE,2008:366-375.
  • 3胡磊,王佳俊,倪巍伟.一种基于坐标和的保护位置隐私近邻查询方法[J].计算机科学,2012,39(8):173-177. 被引量:3
  • 4Gruteser M,Grunwald D.Anonymous Usage of Location-based Services through Spatial and Temporal Cloaking[C] //Proceedings of the 1st international conference on Mobile systems,applications and services.New York:ACM,2003:31-42.
  • 5Chow C Y,Mokbel M F,Aref W G.Casper *:Query processing for location services without compromising privacy[J].ACM Transactions on Database Systems,2009,34 (4):24-48.
  • 6Chow C Y,Mokbel M F.Enabling private continuous queries for revealed user locations[C] //Proceedings of the 10th international conference on Advances in spatial and temporal databases.Berlin Heidelberg:Springer-Verlag,2007:258-273.
  • 7Kalnis P,Ghinita G,Mouratidis K,et al.Preventing LocationBased Identity Inference in Anonymous Spatial Queries[J].IEEE Transactions on Knowledge and Data Engineering,2007,19(12):1719-1733.
  • 8Gedik B,Liu L.Location Privacy in Mobile Systems:A Personalized Anonymization Model[C] // Proceedings of the 25th IEEE International Conference on Distributed Computing Systems.Washington:IEEE,2005:620-629.
  • 9Chow C Y,Mokbel M F,Liu X.A Peer-to-Peer Spatial Cloaking Algorithm for Anonymous Location-based Services[C] //Proceedings of the 14th annual ACM international symposium on Advances in geographic information systems.New York:ACM,2006:171-178.
  • 10黄毅,霍峥,孟小峰.CoPrivacy:一种用户协作无匿名区域的位置隐私保护方法[J].计算机学报,2011,34(10):1976-1985. 被引量:81

二级参考文献45

  • 1潘晓,肖珍,孟小峰.位置隐私研究综述[J].计算机科学与探索,2007,1(3):268-281. 被引量:65
  • 2Mokbel M F. Privacy in location-based services: Start-of- the-art and research directions//Proceedings of the Interna tional Conference on Mobile Data Management ( MDM ' 07). Mannheim, Germany, 2007:228.
  • 3Solanas A, Domingo-Ferrer J, Martinez-Balleste A. Location privacy in location-based services: Beyond TTP-based schemes//Proceedings of the International Workshop on PiLBA. Malaga, Spain, 2008, 397.
  • 4Gruteser M, Grunwal D. Anonymous usage of location-based services through spatial and temporal cloaking//Proeeedings of the International Conference on Mobile Systems, Applications, and Services(MobiSys'03). New York, USA, 2003..163-168.
  • 5Gedik B, Liu L. A customizable k-anonymity model for protecting location privacy//Proceedings of the IEEE Interna tional Con{erence on Distributed Computing Systems (ICDCS'05). Columbus, Ohio, USA, 2005:620-629.
  • 6Mokbel M F, Chow C Y, Aref W G. The new casper: Query processing for location services without compromising privacy//Proceedings of the International Conference on Very Large Data Bases (VLDB'06). New York, USA, 2006: 763-774.
  • 7Xiao Z, Meng X, Xu J. Quality-aware privacy protection for location-based services//Proceedings of the International Conference on Database Systems for Advanced Applications (DASFAA'07). Bangkok, Thailand, 2007: 434 446.
  • 8Gedik B, Liu L. Protecting location privacy with personalized k-anonymity: Architecture and algorithms. IEEE Transac tions on Mobile Computing, 2008, 7(1): 1-18.
  • 9Bamba B, Liu L, Pesti P, Wang T. Supporting anonymous location queries in mobile environments with privaeygrid// Proceedings of the International World Wide Web Conference (WWW'08). Beijing, China, 2008.- 237 246.
  • 10Chow C, Mokbel M F, Liu X. A peer-to-peer spatial cloaking algorithm for anonymous location-based services//Proceedings of the Annual ACM International Symposium on Advances in Geographic Information Systems (GIS'06). Virginia, USA, 2006:171-178.

共引文献85

同被引文献46

  • 1潘晓,肖珍,孟小峰.位置隐私研究综述[J].计算机科学与探索,2007,1(3):268-281. 被引量:65
  • 2CHODOROW K,DIROLF M MongoDB 权威指南[M].北京:人民邮电出版社,2011.76-78.
  • 3Hong J I, Landay J A. An architecture for privacy-sensitive ubiqui- tous computing[ C ]//Proe of the 2nd International Conference on Mo- bile Systems, Applications, and Services. New York : ACM Press, 2004 : 177-189.
  • 4Yiu M L, Jensen C S, Huang Xuegang, et al. SpaceTwist managing the trade-offs among location privacy, query performance, and query accuracy in mobile services [ C ]//Proc of the 24th IEEE International Conference on Data Engineering. 2008:366-375.
  • 5Gruteser M, Grunwald D. Anonymous usage of location-based ser- vices through spatial and temporal cloaking [ C ]//Proc of the 1 st In- tematianal Conference on Mobile Systems, Applications and Services. New York: ACM Press,2003:31-42.
  • 6Geohash tips & tricks [ EB/OL ]. ( 2015- 05 - 21 ). http ://geohash. ore_/-site/tios, html.
  • 7Dimiduk N, Khurana A. HBase in action [ M ]. New York : Manning Publications Co,2012:203-235.
  • 8The Apache Software Foundation. Apache Lucene 4. 2.0 documen- tation[ EB/OL]. (2015-05-11 ). http ://lucene. apache, org/core/4_ 2_0/index. html.
  • 9The Apache Software Foundation. Apache Solr 4.2.0 documentation [EB/OL]. (2015-05-13). http://lucene, apache, org/solr/4_2__0.
  • 10朱青,赵桐,王珊.面向查询服务的数据隐私保护算法[J].计算机学报,2010,33(8):1315-1323. 被引量:33

引证文献7

二级引证文献20

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部