期刊文献+

基于非可信用户的P2P加密位置隐私保护 被引量:2

Location Privacy Preservation in Mobile P2P Encryption Based on Non- trusted Users
下载PDF
导出
摘要 近年来,随着移动互联网及智能移动设备的飞速发展,位置服务给人们的生活带来了极大的便利,但是,用户的位置隐私也受到了极大的威胁。文中从LBS位置隐私保护的实际应用出发,根据现有的位置隐私保护模型,分析不同LBS隐私保护的系统结构的优缺点,介绍了在移动分布式P2P结构的构造方法,提出了基于非可信用户的P2P加密位置隐私保护方案。该方案建立在所有角色都不可信的基础上,通过使用将位置隐私和用户隐私分开处理的方式及采用加密的方法来保护用户的隐私。该方案能提供精确地理位置服务,获得精确查询结果的同时还能抵御各种恶意角色攻击,包括恶意邻居节点、恶意LBS服务器、两者的合谋攻击以及连续查询攻击和区域密度攻击,有效地保护了用户的隐私信息。 In recent years,with the rapid development of mobile Internet and portable devices,location services has brought great convenience to people's lives,but user privacy has also been a lot of threats. Based on the practical application of LBS location privacy protection,according to the existing location privacy protection model,it analyzes the pros and cons of the system structure of different LBS privacy in this paper,and briefly describes mobile construction method of distributed P2 P architecture,then an encrypted location scheme of privacy protection for P2 P based on non- trusted user has been put forward. The scheme builds on all the roles are not credible,through location on privacy and privacy of users be handled separately,and uses encryption method to protect users' privacy. The program not only can provide a precise location for precise query results but also safeguard against different kinds of malicious attacks,including malicious neighbor nodes,malicious LBS servers,the two conspired to attack,continuous queries and regional density attack,which protect privacy of the user's information effectively.
作者 周红亚 张倩
出处 《计算机技术与发展》 2016年第5期104-109,119,共7页 Computer Technology and Development
基金 国家自然科学基金资助项目(61073188)
关键词 位置请求服务器 隐私保护 用户协作 加密 LBS privacy protection user collaboration encryption
  • 相关文献

参考文献6

二级参考文献74

  • 1潘晓,肖珍,孟小峰.位置隐私研究综述[J].计算机科学与探索,2007,1(3):268-281. 被引量:65
  • 2张骞,张霞,文学志,刘积仁,Ting Shan.Peer-to-Peer环境下多粒度Trust模型构造[J].软件学报,2006,17(1):96-107. 被引量:71
  • 3李景涛,荆一楠,肖晓春,王雪平,张根度.基于相似度加权推荐的P2P环境下的信任模型[J].软件学报,2007,18(1):157-167. 被引量:115
  • 4Speed prediction for two lane rural highways.Washington,DC,Federal Highway Administration,2000.
  • 5Mokbel M F,Chow C Y,and Aref W G.The new Casper:query processing for location services without compromising privacy[C].Proceedings of the International Conference on Very Large Data Bases.New York,2006:763-774.
  • 6Sweeney L.K-anonymity:a model for protecting privacy[J].International Journal on Uncertainty,Fuzziness and Knowledge-based Systems,2002,10(5):557-570.
  • 7Gruteser M and Grumwald D.Anonymous usage of location based services through spatial and temporal cloaking[C].ACM/USENIX MobiSys,New York,2003:69-78.
  • 8Gedik B and Liu L.Location privacy in mobile systems:a personalized anonymization model[C].Proceedings of International Conference on Distributed Computing Systems,Columbus,2005:620-629.
  • 9Htu H and Xu J.Non-exposure location anonymity[C].Proceedings of the IEEE International Conference on Data Engineering,Shanghai,2009:1120-1131.
  • 10Xu J,Tang X,Hu H,and Du J.Privacy-conscious location-based queries in mobile environments[J].IEEE Transactionson Parallel and Distributed Systems,2010,21(3):313-326.

共引文献145

同被引文献7

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部