期刊文献+

位置服务隐私保护 被引量:6

Privacy preservation for location-based services
原文传递
导出
摘要 隐私的泄露问题不仅包含用户提交的位置和查询数据,更是包含了其中隐藏的用户身份、兴趣爱好、社会习惯、行为模式等。对位置服务隐私保护的技术进行综述,介绍了位置服务的应用场景、位置隐私的攻击方法。对现有的隐私保护体系结构和保护技术进行整理归纳。对未来的研究进行了展望,并提出一种基于缓存的时空扰动方法和LBS隐私保护度量假设方案。 The disclosure of privacy involves not only the users' locations and queries data, but also the users' identities, interests, social habits, behavior patterns and privacy hidden in these data. A review of privacy preserving for location-based services (LBS) is provided. The application scenarios of location services is introduced, the method of location privacy attack is given. The existing research on the privacy protection system structure and protection technology is summarized. Finally, future research is prospected, and a cache-based spatiotemporal disturbance method and LBS privacy protection metric hypothesis scheme are proposed.
作者 康海燕 朱万祥 Hai-yan KANG;Wan-xiang ZHU(School of Information Management, Beijing Information Science and Technology University, Beijing 100192, China;School of Computer Science, Beijing Information Science and Technology University, Beijing 100192, China)
出处 《山东大学学报(理学版)》 CAS CSCD 北大核心 2018年第11期35-50,共16页 Journal of Shandong University(Natural Science)
基金 北京市社会科学基金项目(15JGB099) 国家自然科学基金资助项目(61370139) 2018年北京信息科技大学大学生创业培育基金支持项目
关键词 位置服务 位置隐私 查询隐私 轨迹隐私 隐私保护 location service location privacy query privacy trajectory privacy privacy preservation
  • 相关文献

参考文献17

二级参考文献125

  • 1潘晓,肖珍,孟小峰.位置隐私研究综述[J].计算机科学与探索,2007,1(3):268-281. 被引量:65
  • 2Samarati P. Protecting respondent's identities in microdata release [J]. IEEE Trans on Knowledge and Data Engineering, 2001, 13(6): 1010-1027.
  • 3Sweeney L. K-anonymity: A model for protecting privacy [J]. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, 2002, 10(5) : 557-570.
  • 4Michael B, Tom Z J. A face is exposed for aol searcher no. 4417749 IN]. New York Times, 2006-08-09(8).
  • 5Abul O, Bonchi F, Nanni M. Never walk alone: Trajectory anonymity via clustering, ISTI-007/2007 [R]. Pisa: Institute of Information Science and Technologies (ISTI), Italian National Research Council (CNR), 2007.
  • 6Abul O, Bonchi F, Nanni M. Never walk alone: Uncertainty for anonymity in moving objects databases [C]//Proc of IEEE ICDE'08. Piscataway, NJ: IEEE, 2008:3.76-385.
  • 7Saygin Y, Nergiz E, Atzori M. Towards trajectory anonymization: A generalization-based approach [C]//Proc of the SIGSPATIAL ACM GIS 2008 Int Workshop on Security and Privacy in GIS and LBS. New York: ACM, 2008: 52-61.
  • 8Yarovoy R, Bonchi F, Lakshmanan V S, et al. Anonymizing moving objects: How to hide a MOB in a crowd? [C]//Proc of the 12th Int Conf on Extending Database Technology:Advances in Database Technology. New York: ACM, 2009:23-26.
  • 9Lin Dan, Gurung S, Jiang Wei, et al. Privacy-preserving location pub].ishing under road-network constraints [G] // LNCS 5982: Proc of the 15th Int Conf on Database Systems for Advanced Applications. Berlin: Springer, 2010:17-31.
  • 10Abul O, Bonchi F, Nanni M. Anonymization of moving objects databases by clustering and perturbation [J]. Information Systems, 2010, 35(8): 884-910.

共引文献398

同被引文献27

引证文献6

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部