期刊文献+

基于连续位置服务请求的位置匿名方法的研究 被引量:7

Research on Location Anonymity Method Based on Continuous Location Services Requests
下载PDF
导出
摘要 随着无线技术和移动定位技术的蓬勃发展,出现了一种新的研究领域——基于位置的服务(location-based service,LBS)。用户在享受此类服务的时候不得不把自己的精确位置发送给服务提供商,使得用户可能面临位置隐私泄露的危险。位置k-匿名是最常见的位置隐私保护技术之一,通过将用户的精确位置泛化为一个具有k-匿名性质的区域来达到隐私保护的目的。但是在移动用户连续不断发出位置服务请求的场景下,攻击者能够根据用户的历史请求之间的关系推测出用户的隐私。此种状况下,传统的孤立查询的k-匿名模型失效。文章提出了一种更加优化的k-匿名模型,在满足用户指定匿名度的前提下,利用活动区域内用户的历史位置分布情况寻找出现次数最多且位置分布最密集的k-1个用户组成共同匿名集。实验结果表明,该方法在保证用户要求匿名度的前提下能够有效降低共同匿名区域的面积。 With the vigorous development of the wireless technology and mobile localization technology, a new research field, location-based service (LBS), is opened up. When users are enjoying this kind of service, they will have to send their precise position information to service providers. In other words, they may face the risk of location privacies let out. Location k- anonymity is one of the most common location privacy protection technologies, which achieves the purpose of privacy protection by generalizing the user's precise position information to be an area with k-anonymity nature. But when the moving user keeps delivering queries of location-based service, the attacker can infer the user's privacy information according to the user's history requests. Thus the traditional isolated k- anonymity model is failed. On the premise of meeting the user's prescribed anonymous degree requirement, this paper puts forward an optimized k-anonymity model, which can use the user's historical position information in the active region to look for k-1 users who appear most frequently and have the densest position distribution to constitute the common anonymities set. The experimental result shows that the method can effectively reduce the area of the common anonymous region on the premise of guaranteeing the user's prescribed anonymous degree.
出处 《信息网络安全》 2015年第1期39-44,共6页 Netinfo Security
基金 浙江省自然科学基金[Y1100818]
关键词 基于位置的服务 K-匿名 历史位置 活动区域 共同匿名集 location-based service k-anonymity historical position active region commonanonymities set
  • 相关文献

参考文献17

  • 1Junglas I A, Watson R T. Location-based services[J]. Communications of the ACM, 2008, 51(3): 65 69.
  • 2潘晓,肖珍,孟小峰.位置隐私研究综述[J].计算机科学与探索,2007,1(3):268-281. 被引量:65
  • 3Shanker P, Ganapathy V, Iftode L. Services with SybilQuery[M]. Orlando Privately Querying Location Based USA: ACM Press. 2009.
  • 4Cornelius C, Kapadia A, Kotz D, et al. AnonySence: Privacy Aware People Centric Sensing[EB/OL]. http://www.cs.indiana.edu/-kapadia/ papers/anonysense_mobisys08.pdf, 2011-05-23.
  • 5Yiu M L, Jensen C S, Huang X, et al. Spacetwist: Managing the trade- offs among location privacy, query performance, and query accuracy in mobile services[C]//Data Engineering, 2008. ICDE 2008. IEEE 24th International Conference on. IEEE, 2008: 366-375.
  • 6Meyerowitz J, Roy Choudhury R. Hiding stars with fireworks: location privacy through camouflage[C]//Proceedings of the 15th annual international conference on Mobile computing and networking. ACM, 2009: 345-356.
  • 7Gruteser M, Grunwald D. Anonymous Usages of Location-based Services Through Spatial and Temporal Cloaking[M]. New York, USA:ACM Press,2003.
  • 8Samarati P, Sweeney L. Protecting Privacy When Disclosing Information: k-anonymity and Its Enforcement Through Generalization and Suppression[R]. SRI Computer Science Laboratory, Tech. Rep.:SRI- CLS-98-04. 1998.
  • 9赵泽茂,李林,张帆,张品,周建钦,王家波.基于分散子匿名区域的位置隐私保护方法[J].山东大学学报(理学版),2013,48(7):56-61. 被引量:2
  • 10Bereford A P,, Stajano F. Mix Zones: User Privacy in Location-aware Service[M]. Orlando, USA: ACM Press, 2009.

二级参考文献24

  • 1MOKBEL M F, CHOW Chi-Yin, AREF W G. The new Casper: query processing for location services without compromising privacy [ C ]// Proceedings of the 32nd In- ternational Conference on Very Large Data Bases( VLDB' 06). New York:ACM Press, 2006: 763-774.
  • 2CHOW Chi-Yin, MOKBEL M F. Enabling private con- tinuous queries for revealed user locationsE C]//Proceed- ings of the 10th International Conference on Advances in Spatial And Temporal Databases ( SSTD ' 07 ). Berlin, Heidelberg : Springer-Verlag, 2007 : 258-275.
  • 3GRUTESER M, GRUNWALD D. Anonymous usage of location-based services through spatial and temporal cloa- king [ C ]// Proceedings of the 1 st International Confer- ence on Mobile Systems, Applications And Services. New York:ACM Press, 2003 : 31-42.
  • 4KALNIS P, GHINITA G, MOURATIDIS K, et al. Pre- venting location-based identity inference in anonymous spatial queries [ J]. IEEE Transaction on Knowledge and Data Engineering, 2007, 19 (12) : 1719-1733.
  • 5TALUKDER N, AHAMED S I. Preventing multi-query attack in location-based services [ C ]// Proceedings of the 3rd ACM Conference on Wireless Network Security. New York: ACM Press, 2010: 25-36.
  • 6HOH B, GRUTESER M, XIONG H, et al. Preserving privacy in gps traces via uncertainty-aware path cloaking [ C]// Proceedings of the 14th ACM Conference on Computer and Communications Security. New York: ACM Press, 2007: 161-171.
  • 7SAMARATI P. Protecting respondents identities in micro- data release[J]. IEEE Transactions on Knowledge and Data Engineering, 2001, 13 ( 6 ) : 1010 - 1027.
  • 8SAMARATI P, SWEENEY L. Generalizing data to pro- vide anonymity when disclosing information (abstract) [ C]// Proceedings of the 17th ACM SIGACT-SIGMOD- SIGART Symposium on Principles of Database Systems. New York:ACM Press, 1998: 188.
  • 9BAMBA B, LIU Ling, PESTI P, et al. Supporting anon- ymous location queries in mobile environments with priva- cygrid[ C ]// Proceedings of the 17th International Con- ference on World Wide Web. New York: ACM Press, 2008 : 237-246.
  • 10LIU Fuyu, HUA K A, CAI Ying. Query 1-diversity in location-based services [ C ]// Proceedings of 10th Inter- national Conference on Mobile Data Management: Sys- tems, Services and Middleware ( MDM' 09 ). Washing- ton-IEEE Computer Society, 2009: 436-442.

共引文献64

同被引文献97

  • 1刘畅.网络不良行为对思政教育的启示分析[EB/OL]http://www.cnki.COrn.cn/Article/qFDTotal-LCYY201401023htm,2015-04-05.
  • 2FUYU L, HUA K A, YING C. Query 1-diversity in Location-Based Services[C]//Proceedings of the Mobile Data Management: Systems, Services and Middleware, 2009 MDM '09 Tenth International Conference on, 2009: 436-442.
  • 3KHOSHGOZARAN A, SHAHABI C, SHIRANI-MEHR H. Location privacy: going beyond K-anonymity, cloaking and anonymizers[J]. Knowledge and Information Systems, 2011, 26(3): 435-465.
  • 4REBOLLO-MONEDERO D, FORNE J, Solanas A, et al. Private location-based information retrieval through user collaboration[J]. Computer Communications, 2010, 33(6): 762-774.
  • 5BONCHI F. Privacy Preserving Publication of Moving Object Data[M]. Springer-Verlag, 2009: 190-215.
  • 6BONCHI F, LAKSHMANAN L V S, WANG H. Trajectory anonymity in publishing personal mobility data[J]. SIGKDD Explor Newsl, 2011, 13(1): 30-42.
  • 7CHOW C Y, MOKBEL M F. Trajectory privacy in location-based services and data publication[J]. SIGKDD Explor Newsl, 2011, 13(1): 19-29.
  • 8BERESFORD A R, STAJANO F. Location privacy in pervasive computing[J]. Pervasive Computing, IEEE, 2003, 2(1): 46-55.
  • 9FREUDIGER J, SHOKRI R, HUBAUX J P. On the optimal placement of mix zones[C]//9th International Symposium, PETS 2009, Seattle, WA, USA, 2009: 216-234.
  • 10FREUDIGERJ, RAYA M, FELEGYHAZI M, et al. Mix-zones for location privacy in vehicular networks[C]//first international workshop on wireless networking for intelligent transportation systems (Win-ITS), Canada, 2007: 216-234.

引证文献7

二级引证文献44

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部