期刊文献+

位置轨迹隐私保护综述 被引量:14

Review on Location Trajectory Privacy Protection
下载PDF
导出
摘要 基于位置服务在为用户的日常生活带来极大便利的同时,又不可避免地导致一定程度上用户隐私信息的泄露。在隐私泄露问题上,当前较为关注的是用户在使用位置服务时位置隐私的泄露。大量的位置数据存在着相互关联进而有形成位置轨迹的可能,而位置轨迹数据含有比单纯的位置数据更为丰富的时空关联,这些关联使得攻击者更容易获取用户的隐私信息。针对这一问题,研究者们提出了大量针对位置轨迹数据的隐私保护方法。在众多的位置轨迹隐私保护方法中,如何找到同类方法,有针对性地进行位置轨迹隐私保护研究成为研究者不得不面对的问题。文章在借鉴已有分类方法的基础上,针对近年来提出的和由原有算法改进而来的位置轨迹隐私保护算法,基于攻击者所掌握的背景知识,从位置轨迹追踪和位置轨迹重构两种攻击方法的角度对这些算法加以分类,总结并分析其优缺点。最后,文章针对当前潜在的数据挖掘攻击技术,提出了研究展望。 Location based service brings great convenience for users in daily life, but at the same time it inevitably leads to a certain degree of users' private information exposure. On issues of privacy, the focus of current research is protection of users' location privacy. Due to the relationships between locations, scattered locations could be constituted into location trajectory, and that location trajectory contains more spatio-temporal correlations, with comparison of solo location. The attacker could be more accessible to user's privacy with the help of these correlations. In order to solve this problem, researchers put forward a lot of methods to protect the location trajectory privacy. But how to find the similar methods for study or imitation has puzzled the researcher, because there is no specific classification. In this article, based on the attack techniques of location trajectory tracking and reconstruction, we propose a new classification. With this classification, we analyze these protection methods and summarize the advantages and disadvantages of them. Finally, we put forward in the research prospects for the potential attacks of data mining technology.
出处 《信息网络安全》 2015年第10期24-31,共8页 Netinfo Security
基金 国家自然科学基金[61472097] 黑龙江省自然科学基金[F2015022] 高等学校博士学科点专项科研基金(博导类)[20132304110017]
关键词 位置轨迹 隐私保护 轨迹追踪 轨迹重构 location trajectory privacy protection trajectory tracking trajectory reconstruction
  • 相关文献

参考文献61

  • 1王勇,高诗梦,聂肖,张俊浩.基于速度动态差异的位置服务匿名算法[J].信息网络安全,2015(4):28-35. 被引量:6
  • 2FUYU L, HUA K A, YING C. Query 1-diversity in Location-Based Services[C]//Proceedings of the Mobile Data Management: Systems, Services and Middleware, 2009 MDM '09 Tenth International Conference on, 2009: 436-442.
  • 3王家波,赵泽茂,李林.位置服务中一种基于假轨迹的轨迹隐私保护方法[J].信息网络安全,2014(3):62-67. 被引量:7
  • 4KHOSHGOZARAN A, SHAHABI C, SHIRANI-MEHR H. Location privacy: going beyond K-anonymity, cloaking and anonymizers[J]. Knowledge and Information Systems, 2011, 26(3): 435-465.
  • 5REBOLLO-MONEDERO D, FORNE J, Solanas A, et al. Private location-based information retrieval through user collaboration[J]. Computer Communications, 2010, 33(6): 762-774.
  • 6车浩然,何永忠,刘吉强.基于P2P和网格ID的位置匿名算法研究[J].信息网络安全,2015(3):28-32. 被引量:3
  • 7BONCHI F. Privacy Preserving Publication of Moving Object Data[M]. Springer-Verlag, 2009: 190-215.
  • 8BONCHI F, LAKSHMANAN L V S, WANG H. Trajectory anonymity in publishing personal mobility data[J]. SIGKDD Explor Newsl, 2011, 13(1): 30-42.
  • 9霍峥,孟小峰.轨迹隐私保护技术研究[J].计算机学报,2011,34(10):1820-1830. 被引量:109
  • 10CHOW C Y, MOKBEL M F. Trajectory privacy in location-based services and data publication[J]. SIGKDD Explor Newsl, 2011, 13(1): 19-29.

二级参考文献119

  • 1潘晓,肖珍,孟小峰.位置隐私研究综述[J].计算机科学与探索,2007,1(3):268-281. 被引量:65
  • 2Gruteser M, Grunwald D. Anonymous usage of locationbased services through spatial and temporal cloaking//Proceedings of the 1st International Conference on Mobile Sys tems, Applications, and Services (MobiSys 2003). San Fransisco, 2003: 31 -42.
  • 3Mokbel M F, Chow C Y, Aref W G. The newcasper: Query processing for location services withoutcompromising privacy//Proceedings of the 32nd Conference of Very Large Databases (VLDB 2006). Seoul, 2006: 763-774.
  • 4Bamba B, Liu L. Supporting anonymous location queries in mobile environments with privacy grid//Proceeding of the 17th International Conference on World Wide Web (WWW 2008). Beijing, 2008:237-246.
  • 5Pan X, Meng X, Xu J. Distortion-based anonymity for continuous queries in location-based mobile services//Proceedings of the 17th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems (GIS 2009). Washington, 2009:256-265.
  • 6Krumm J. A survey of computational location privacy. Personal and Ubiquitous Computing, 2009, 13(6): 391-399.
  • 7Bettini C, Wang S X, Jajodia S. Protecting privacy against location-based personal identification//Proceedings of the 2nd VLDB workshop on Secure Data Management (SDM2005). Trondheim, 2005:185-199.
  • 8Krumm J. Inference attacks on location tracks//Proceedings of the 5th International Conference on Pervasive Computing (PERVASIVE 2007). Toronto, 2007:127-143.
  • 9Luper D, Cameron D, Miller J A, Arabnia H R. Spatial and temporal target association through semantic analysis and GPS data mining//Proceedings of the 2007 International Conference on Information & Knowledge Engineering (IKE 2007). LasVegas, 2007:251-257.
  • 10Xu T, Cai Y. Exploring historical location data for anonymity preservation in location-based services//Proceedings of the 27th Conference on Computer Communications (INFOCOM 2008). Phoenix, 2008:547-555.

共引文献261

同被引文献56

引证文献14

二级引证文献52

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部