期刊文献+

随机匿名的位置隐私保护方法 被引量:8

Random anonymity method for location privacy protection
下载PDF
导出
摘要 基于空间匿名区域的研究方法容易受到多查询攻击和推理攻击,从而带来隐私暴露问题。为了保证基于位置服务中的隐私安全,基于k-匿名思想,构建了随机k-隐藏集以满足位置k-匿名性和位置l-多样性。随机k-隐藏集是由离散的位置点组成,并且彼此之间的网格距离大于阈值s。利用私有信息检索协议保证了查询结果在检索过程中的隐私性,实现了服务提供者在无法知道用户精确查询结果的前提下为用户提供基于位置的服务。仿真实验验证了算法的安全性和有效性。 The methods that are based on the anonymous spatial region are vulnerable to multiple queries attacks and inference attacks,which result in the privacy exposure issues. In order to ensure the location-based privacy security,this paper constructed the random k-cloak set to meet requirement of location k-anonymity and location l-diversity. Random k-cloak set is composed of discrete dots of location,and the grid distance between dots is greater than the threshold value s. Private information retrieval employed in the study guaranteed privacy in retrieval processing,and achieved the goal that the server provides the location-based service for users on the premise of not knowing user's query results. Simulation experiments verify the security and validity of this method.
出处 《哈尔滨工程大学学报》 EI CAS CSCD 北大核心 2015年第3期374-378,共5页 Journal of Harbin Engineering University
基金 国家自然科学基金资助项目(61472097) 黑龙江省教育厅科学技术研究基金资助项目(12541788) 佳木斯大学重点资助项目(Lz2013-010)
关键词 无线网络 移动通信 隐私保护 基于位置服务 位置k-匿名 私有信息检索 随机匿名 wireless networks mobile communication privacy protection location-based services location k-anonymity private information retrieval random anonymity
  • 相关文献

参考文献11

  • 1周傲英,杨彬,金澈清,马强.基于位置的服务:架构与进展[J].计算机学报,2011,34(7):1155-1171. 被引量:171
  • 2SHIN K G, JU X, CHEN Z, et al. Privacy protection for us- ers of location-based services [ J]. IEEE Wireless Communi- cations, 2012, 19(1): 30-39.
  • 3BENISCH M, KELLEY P G, SADEH N, et al. Capturing location-privacy preferences: quantifying accuracy and user- burden tradeoffs [ J]. Personal and Ubiquitous Computing, 2011, 15(7): 679-694.
  • 4KALNIS P, GHINITA G, MOURATIDIS K, et al. Preven- ting location-based identity inference in anonymous spatial queries[ J] .IEEE Transactions on Knowledge and Data Engi- neering, 2007, 19(12) : 1719-1733.
  • 5BAMBA B, LIU L, PESTI P, et al. Supporting anonymous location queries in mobile environments with privacy grid [ C ] // Proceedings of the 17th International Conference on World Wide Web. Beijing, China, 2008: 237-246.
  • 6林欣,李善平,杨朝晖.LBS中连续查询攻击算法及匿名性度量[J].软件学报,2009,20(4):1058-1068. 被引量:32
  • 7NUSSBAUM D, OMRAN M T, SACK J. Techniques to pro- tect privacy against inference attacks in location based serv- ices[ C]// Proceedings of the 3rd ACM SIGSPATIAL Inter- national Workshop on Geo-Streaming. New York, USA, 2012 : 58-67.
  • 8霍峥,孟小峰.轨迹隐私保护技术研究[J].计算机学报,2011,34(10):1820-1830. 被引量:109
  • 9GHINITA G, KALNIS P, KHOSHGOZARAN A, et al. Pri- vate queries in location based services: anonymizers are not necessary [ C ] //Proceedings of the 2008 ACM SIGMOD In- ternational Conference on Management of Data. Vancouver, Canada, 2008 : 121-132.
  • 10KHOSHGOZARAN A, SHAHABI C, SHIRANI H. Loca- tion privacy: going beyond k-anonymity, cloaking and ano- nymizers[J]. Knowledge and Information Systems, 2011, 26(3) : 435-465.

二级参考文献137

  • 1潘晓,肖珍,孟小峰.位置隐私研究综述[J].计算机科学与探索,2007,1(3):268-281. 被引量:65
  • 2杨晓春,刘向宇,王斌,于戈.支持多约束的K-匿名化方法[J].软件学报,2006,17(5):1222-1231. 被引量:60
  • 3Gruteser M, Grunwald D. Anonymous usage of locationbased services through spatial and temporal cloaking//Proceedings of the 1st International Conference on Mobile Sys tems, Applications, and Services (MobiSys 2003). San Fransisco, 2003: 31 -42.
  • 4Mokbel M F, Chow C Y, Aref W G. The newcasper: Query processing for location services withoutcompromising privacy//Proceedings of the 32nd Conference of Very Large Databases (VLDB 2006). Seoul, 2006: 763-774.
  • 5Bamba B, Liu L. Supporting anonymous location queries in mobile environments with privacy grid//Proceeding of the 17th International Conference on World Wide Web (WWW 2008). Beijing, 2008:237-246.
  • 6Pan X, Meng X, Xu J. Distortion-based anonymity for continuous queries in location-based mobile services//Proceedings of the 17th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems (GIS 2009). Washington, 2009:256-265.
  • 7Krumm J. A survey of computational location privacy. Personal and Ubiquitous Computing, 2009, 13(6): 391-399.
  • 8Bettini C, Wang S X, Jajodia S. Protecting privacy against location-based personal identification//Proceedings of the 2nd VLDB workshop on Secure Data Management (SDM2005). Trondheim, 2005:185-199.
  • 9Krumm J. Inference attacks on location tracks//Proceedings of the 5th International Conference on Pervasive Computing (PERVASIVE 2007). Toronto, 2007:127-143.
  • 10Luper D, Cameron D, Miller J A, Arabnia H R. Spatial and temporal target association through semantic analysis and GPS data mining//Proceedings of the 2007 International Conference on Information & Knowledge Engineering (IKE 2007). LasVegas, 2007:251-257.

共引文献300

同被引文献25

引证文献8

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部