期刊文献+

基于伪随机数加密的保护位置隐私近邻查询方法 被引量:6

Pseudo-random number encryption based location privacy preserving nearest neighbor querying
下载PDF
导出
摘要 空间定位与移动通信的快速发展促进了基于位置服务的普及,近邻查询作为位置服务的基本操作得到了广泛的应用.位置服务在给人们带来方便的同时也带来位置隐私保护问题,随着人们对个体隐私的日益关注,保护位置隐私近邻查询成为数据库领域研究热点之一.近年来,隐私信息检索以其能提供高强度隐私保护、无需可信第三方等优点得到了研究者的持续关注.针对已有的基于隐私信息检索的保护位置隐私近邻查询方法普遍存在预处理时间长、查询效率较低的不足,提出基于隐私信息检索的近邻查询方法 PRN_kNN,通过空间加密使用户可以在本地快速查询k近邻候选集;同时,引入伪随机数加密规则替代查询计划,抵御模式攻击的同时减少预处理时间;在数据组织方面,采用连续储存POI实体的策略避免部分块存储大量假实体的情况,实现对查询效率的提升.理论分析和实验结果验证了所提方法的有效性. The rapid development of positioning and mobile communication promotes the popularity of location-based services.Nearest neighbor querying witness its thriving in location-based services.With the increasing attention people pay to individual privacy,location privacy preserving k nearest neighbor querying becomes a hot topic.In recent years,private information retrieval techniques attract increasing concerning from researchers for its merits in providing highlocation protection strength,as well as its independence on any trusted third-party.A series of methods are proposed based on PIR to surmount the problem of location privacy protection in nearest neighbors querying.Most of them suffer from heavy time cost in preprocessing as well as query process.Concerning these problems,a novel PIR based method PRN_kNN is proposed to surmount above mentioned problems.The client can pinpoint the candidate k nearest neighbor set quickly by spatial encryption.Meanwhile,apseudo-random number encryption schema is elaborated to avoid pattern attack and reduce the workload of preprocessing.Further,continuous storage policy for POI entity is adopted to avoid storing large amounts of fake entities in some blocks,which can enhance the efficiency of preprocessing and the querying process.Theoretical and empirical analysis demonstrate the effectiveness and efficiency of our method.
作者 张峰 倪巍伟
出处 《华东师范大学学报(自然科学版)》 CAS CSCD 北大核心 2015年第5期128-142,共15页 Journal of East China Normal University(Natural Science)
基金 国家自然科学基金(61370077 61003057)
关键词 位置服务 位置隐私保护 隐私信息检索 伪随机数规则 location-based services location privacy protection private information retrieval pseudo-random number rule
  • 相关文献

参考文献18

  • 1ROUSSOPOULOS N,KELLEY S,VINCENT F.Nearest neighbor queries[C]//Proceedings of the ACM Special Interest Group on Management of Data(SIGMOD’95).California,USA,1995:71-79.
  • 2GRUTESER M,GRUNWAL D.Anonymous usage of location based services through spatial and temporal cloaking[C]//Proceedings of the International Conference on Mobile Systems,Applications,and Services(MobiSys’03).California,USA,2003:31-42.
  • 3MOKBEL M F,CHOW C Y,AREF W G.The new casper:Query processing for location services without compromising privacy[C]//Proceedings of the International Conference on Very Large Data Bases(VLDB’06).Seoul,Korea,2006:763-774.
  • 4GEDIK B,LIU L.Location privacy in mobile systems:A personalized anonymization model[C]//Proceedings of the IEEE International Conference on Distributed Computing Systems(ICDCS’05).Ohio,USA,2005:620-629.
  • 5朱怀杰,王佳英,王斌,杨晓春.障碍空间中保持位置隐私的最近邻查询方法[J].计算机研究与发展,2014,51(1):115-125. 被引量:10
  • 6FIROOZJAEI M D,YU J,KIM H.Privacy preserving nearest neighbor search based on topologies in cellular networks[C]//Proceedings of the IEEE International Conference on Advanced Information Networking and Applications Workshops.Suwon,Korea,2015:146-149.
  • 7INDYK P,WOODRUFF D,Polylogarithmic private approximations and efficient matching[C]//Proceedings of the Third Theory of Cryptography Conference(TCC’06),New York,USA,2006:245-264.
  • 8KHOSHGOZARAN A,SHAHABI C.Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy[C]//Proceedings of the International Symposium on Spatial and Temporal Databases(SSTD’07),Massachusetts,USA,2007:239-257.
  • 9YIU M L,JENSEN C S,HUANG X,et al.Spacetwist:Managing the trade-offs among location privacy,query performance,and query accuracy in mobile services[C]//Proceedings of the IEEE International Conference on Data Engineering(ICDE’08).Cancun,Mexico,2008:366-375.
  • 10倪巍伟,郑锦旺,崇志宏.HilAnchor:Location Privacy Protection in the Presence of Users' Preferences[J].Journal of Computer Science & Technology,2012,27(2):413-427. 被引量:4

二级参考文献25

  • 1Gruteser M, Schelle G, Jain A, Han R, Grunwald D. Privacyaware location sensor networks. In Proc. the 9th Workshop on Hot Topics in Operating Systems (HotOS 2003), Hawaii, USA, May 18-21, 2003, pp.163-167.
  • 2Beresford A R, Stajano F. Location privacy in pervasive computing. IEEE Pervasive Computing, 2003, 2(1): 46-55.
  • 3Ronssopoulos Nick R, Kelley S, Vincent F. Nearest neighbor queries. In Proc. the ACM SIGMOD International Conference on Management of Data (SIGMOD 1995), San Jose, California, USA, May 22-25, 1995, pp.71-79.
  • 4Xiao Z, Meng X F, Xu J L. Quality aware privacy protection for location-based services. In Proc. the 12th International Conference on Database Systems for Advanced Applications (DASFAA 2001), Bangkok, Thailand, April 9-12, 2007, pp.434-446.
  • 5Bettini C, Wang X S, Jajodia S. Protecting privacy against location-based personal identification. In Proc. the 2nd VLDB Workshop on Secure Data Management (SDM 2005), Trondheim, Norway, September 2-3, 2005, pp.185-199.
  • 6Mokbel M F, Chow C Y, Aref W G. The new Casper: Query processing for location services without compromising privacy. In Proc. the 32nd International Conference on Very Large Data Bases (VLDB 2006), Seoul, Korea, September 12-15,2006, pp.763-774.
  • 7Li P Y, Peng W C, Wang T W, Ku W S, Xu J, Hamilton J A. A cloaking algorithm based on spatial networks for location privacy. In Proc. IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC 2008), Taichung, Taiwan, China, June 11-13, 2008, pp.90-97.
  • 8Duckham M, Kulik L. A formal model of obfuscation and negotiation for location privacy. In Proc. the 3th International Conference on Pervasive Computing (Pervasive 2005), Munich, Germany, May 8-13, 2005, pp.152-170.
  • 9Kalnis P, Ghinita G, Mouratidis K, Papadias D. Preventing location-based identity inference in anonymous spatial queries. IEEE Trans. Knowl. Data Eng., 2007,19(12): 1719- 1733.
  • 10Ghinita G, Kalnis P, Skiadopoulos S. PRIVE: Anonymous location-based queries in distributed mobile systems. In Proc. the 16th International Conference on World Wide Web (WWW 2001), Banff, Alberta, Canada, May 8-12,2007, pp.371-380.

共引文献163

同被引文献54

引证文献6

二级引证文献32

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部