期刊文献+

一种路网环境下LBS隐私保护算法 被引量:1

A privacy protection algorithm designed for LBS in road networks
下载PDF
导出
摘要 近年来,基于位置服务(LBS)的应用越来越广泛.用户在享受这种位置服务带来的方便快捷之同时,也要承担可能暴露自身隐私信息(如位置等)的风险.目前,很多工作已经在诸如保护用户隐私信息方面取得了重大进展,但大多是集中于欧氏空间下的隐私保护技术,而路网环境下的隐私保护研究相对较少.针对路网环境下用户边权分布不均的问题,提出了基于哑元的边权均衡算法,即在保证匿名集中各路段邻近性的同时,以生成哑元的方式均衡各边边权分布.这样既能最大程度降低查询代价,又能使边权分布不会太分散.最后,通过实验验证了本算法的有效性,同时显示该算法还能有效防止边权分布不均引发的推断攻击. In recent years, location based services (LBS) have become more and more popular. However, the user's privacy information such as his(her) locations is threatened, while the user enjoys the convenience and effectiveness provided by such services. Many different approaches have been raised to protect the user's privacy under Euclidean space. But these approaches rarely focus on conditions under road networks. Now, we propose an edge weight balancing algorithm. The main idea of this algorithm is to create anonymous sets to guarantee the proximity of all edges and then to generate dummies to balance edge weight. Finally, the experiment verifies that the algorithm is able to resist inference attacks caused by uneven edge weight distributions.
出处 《中国计量学院学报》 2015年第3期359-364,共6页 Journal of China Jiliang University
关键词 位置服务LBS 路网 边权 隐私保护 location based services road networks edge weight privacy protection
  • 相关文献

参考文献18

  • 1MOKBEL M F.Privacy in location based services:state of the art and research directions[C]//International Conference on Mobile Data Management.Mannheim:IEEE,2007:228-228.
  • 2PEDRESCHI D,BONCHI F,TURINI F,et al.Privacy protection:regulations and technologies,opportunities and threats[C]//Mobility,Data Mining and Privacy.Berlin:Springer,2008:101-119.
  • 3SHANKAR P,GANAPATHY V,IFTODE L.Privately querying location-based services with sybilquery[C]//Proceedings of the 11th International Conference on Ubiquitous Computing.New York:ACM,2009:31-40.
  • 4GRUTESER M,GRUNWALD D.Anonymous usage of location based services through spatial and temporal cloaking[C]//Proceedings of the 1st International Conference on Mobile Systems,Applications and Services.New York:ACM,2003:31-42.
  • 5ZHANG C,HUANG Y.Cloaking locations for anonymous location based services:a hybrid approach[J].Geoinformatica,2009,13(2):159-182.
  • 6BAMBA B,LIU L,PESTI P,et al.Supporting anonymous location queries in mobile environments with privacygrid[C]//Proceedings of the 17th International Conference on World Wide Web.New York:ACM,2008:237-246.
  • 7LI N,LI T,VENKATASUBRAMANIAN S.t-closeness:privacy beyond k-anonymity and l-diversity[C]//Proceedings of the 23rd International Conference on Data Engineering.Istanbul:IEEE,2007:106-115.
  • 8SOLANAS A,SEBE F,DOMINGO-FERRER J.Micro aggregation based heuristics for p-sensitive k-anonymity:one step beyond[C]//Proceedings of the 2008International Workshop on Privacy and Anonymity in Information Society.New York:ACM,2008:61-69.
  • 9MASCETTI S,BETTINI C,WANG X S,et al.Providenthider:An algorithm to preserve historical k-anonymity in lbs[C]//Tenth International Conference on Mobile Data Management:Systems,Services and Middleware.Taipei:IEEE,2009:172-181.
  • 10ARDAGNA C A,CREMONINI M,DAMIANI E,et al.Location privacy protection through obfuscation-based techniques[C]//Data and Applications Security XXI.Berlin:Springer,2007:47-60.

同被引文献2

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部