期刊文献+

一种基于决策树的位置隐私保护方法

Location Privacy-Preserving Method Based on Decision Tree
下载PDF
导出
摘要 针对位置信息滥用导致用户隐私泄漏问题,设计了位置隐私保护模型,该模型满足查询匿名性、轨迹不可追踪性.在该模型下,提出了基于决策树的匿名方法,该方法通过决策树判定规则来实现位置匿名,解决了位置k-匿名、位置l-多样性问题.理论分析和实验验证表明该方法的安全性和有效性. Abuse of location lead to serious problem of user's location privacy leakage,a location privacy-preserving model is designed,which is satisfied with requirement of query anonymity and trajectory intractability. An anonymity method based on decision tree solved location anonymity problem in terms of location k-anonymity and location l-diversity. Theoretical analysis and experimental verification shows the safety and effectiveness of this method.
出处 《佳木斯大学学报(自然科学版)》 CAS 2015年第6期888-891,共4页 Journal of Jiamusi University:Natural Science Edition
基金 黑龙江省自然科学基金(F2015022) 佳木斯大学重点项目(Lz2013-010)资助
关键词 隐私保护 基于位置的服务 位置k-匿名 决策树 Privacy-preserving Location-based services Location k-anonymity Decision tree
  • 相关文献

参考文献2

二级参考文献13

  • 1SHIN K G, JU X, CHEN Z, et al. Privacy protection for us- ers of location-based services [ J]. IEEE Wireless Communi- cations, 2012, 19(1): 30-39.
  • 2BENISCH M, KELLEY P G, SADEH N, et al. Capturing location-privacy preferences: quantifying accuracy and user- burden tradeoffs [ J]. Personal and Ubiquitous Computing, 2011, 15(7): 679-694.
  • 3KALNIS P, GHINITA G, MOURATIDIS K, et al. Preven- ting location-based identity inference in anonymous spatial queries[ J] .IEEE Transactions on Knowledge and Data Engi- neering, 2007, 19(12) : 1719-1733.
  • 4BAMBA B, LIU L, PESTI P, et al. Supporting anonymous location queries in mobile environments with privacy grid [ C ] // Proceedings of the 17th International Conference on World Wide Web. Beijing, China, 2008: 237-246.
  • 5NUSSBAUM D, OMRAN M T, SACK J. Techniques to pro- tect privacy against inference attacks in location based serv- ices[ C]// Proceedings of the 3rd ACM SIGSPATIAL Inter- national Workshop on Geo-Streaming. New York, USA, 2012 : 58-67.
  • 6GHINITA G, KALNIS P, KHOSHGOZARAN A, et al. Pri- vate queries in location based services: anonymizers are not necessary [ C ] //Proceedings of the 2008 ACM SIGMOD In- ternational Conference on Management of Data. Vancouver, Canada, 2008 : 121-132.
  • 7KHOSHGOZARAN A, SHAHABI C, SHIRANI H. Loca- tion privacy: going beyond k-anonymity, cloaking and ano- nymizers[J]. Knowledge and Information Systems, 2011, 26(3) : 435-465.
  • 8WANG S, CHEN C, TING I, et al. Muhi-layer partition for query location anonymization [ C ]// Proceedings of the 2012 IEEE International Conference on Systems, Man, and Cybernetics. Seoul, Korea, 2012:378-383.
  • 9林欣,李善平,杨朝晖.LBS中连续查询攻击算法及匿名性度量[J].软件学报,2009,20(4):1058-1068. 被引量:32
  • 10周水庚,李丰,陶宇飞,肖小奎.面向数据库应用的隐私保护研究综述[J].计算机学报,2009,32(5):847-861. 被引量:220

共引文献158

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部