期刊文献+

位置服务中基于二分图的身份推理攻击算法 被引量:1

Identity attack algorithm based on bipartite graph in location-based services
下载PDF
导出
摘要 针对位置服务中的身份隐私泄露问题,提出了一种基于二分图的身份推理攻击算法。其基本思想是构建移动用户真实身份和假名间的有权二分图,运用Kuhn-Munkres算法找到其最佳完美匹配,确定用户的真实身份完成攻击。通过实验验证了该算法的有效性,并分析了隐私保护机制、位置服务隐私泄露率和假名生存期等因素对算法的影响。 According to the identity privacy exposure problem of location-based service, an identity attack algorithm based on bipartite graph is proposed. The basic idea is to build a bipartite graph between mobile users' identity and their pseudonyms, and then use Kuhn-Munkres algorithm to find the best perfect match, finally determine the user's identity to complete the attack. The effectiveness of the proposed algorithm is verified by experiment, and also the impact of the privacy protection mechanism, the privacy exposure rate of the location-based service, and pseudonyms lifetime on the algorithm is analysed.
出处 《计算机工程与应用》 CSCD 北大核心 2016年第9期67-70,共4页 Computer Engineering and Applications
基金 国家自然科学基金(No.61472097 No.61170241) 山东省高等学校优秀骨干教师国内访问学者项目经费资助
关键词 位置服务 隐私泄露 二分图 完美匹配 location-based services privacy exposure bipartite graph perfect match
  • 相关文献

参考文献14

  • 1Gmteser M,Gruwald D.Anonymous usage of locationbased services through spatial and temporal cloaking[C]//Pro of the 1st International Conference on Mobile Systems,Applications,and Services,2003:31-42.
  • 2Shokri R,Theodorakopoulos G,Boudec J.Quantifying location privacy[C]//Proc of the 32nd IEEE Symposium on Security and Privacy,2011:247-262.
  • 3Olteanu A M,Huguenin K,Shokri R.Quantifying the effect of co-location information on location privacy[C]//14th International Symposium,PETS 2014,2014.
  • 4Shokri R,Theodorakopoulos G,Danezis G.Quantifying location privacy:the case of sporadic location exposure[C]//LNCS 6794:PETS 2011,2011:57-76.
  • 5王彩梅,郭亚军,郭艳华.位置服务中用户轨迹的隐私度量[J].软件学报,2012,23(2):352-360. 被引量:31
  • 6Huang L,Yamane H,Matura K,et al.Silent cascade:enhancing location privacy without communication Qos degradation[C]//LNCS 3934:Security of Pervasive Computing,2006:165-180.
  • 7Ma Z D,Frank K,Michael M.A location privacy metric for V2X communication systems[C]//Proc of the IEEE Sarnoff Symposium,2009:1-6.
  • 8Ahamed S,Haque M,Hasan C.A novel location privacy framework without trusted third party based on location anonymity prediction[J].ACM SIGAPP Applied Computing Review,2012,12(1):24-34.
  • 9Lu R X,Lin X D,Luan T,et al.Pseudonym changing at social spots:an effective strategy for location privacy in VANETs[J].IEEE Transactions on Vehicular Technology,2012,61(1):86-96.
  • 10林欣,李善平,杨朝晖.LBS中连续查询攻击算法及匿名性度量[J].软件学报,2009,20(4):1058-1068. 被引量:32

二级参考文献2

共引文献53

同被引文献5

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部