期刊文献+

移动社交网络中基于代理转发机制的轨迹隐私保护方法 被引量:5

The Method of Trajectory Privacy Preserving Based on Agent Forwarding Mechanism in Mobile Social Networks
下载PDF
导出
摘要 K匿名技术是当前轨迹隐私保护的主流方法,但该方法也存在隐私泄露的风险。该文提出一种在移动社交网络中基于代理转发机制(BAFM)的轨迹隐私保护方法。该方法利用安全多方计算和内积安全计算进行隐私加密匹配,通过可信服务器在移动社交网络中找最匹配的用户做代理,然后由代理转发用户的请求到服务器进行查询,隐藏用户的真实轨迹与位置服务器的联系,有效保护用户的轨迹隐私。安全分析表明该方法能有效保护用户的轨迹隐私;同时,通过实验验证该方法相对K匿名更高效,能减小服务器的查询和通信开销。 The trajectory K-anonymous is the mainstream of the current trajectory privacy protection, but the method has some defects such as privacy leakage. In this paper, a method of trajectory privacy preserving is proposed Based on Agent Forwarding Mechanism (BAFM) in mobile social networks, which uses secure multi-party computation and inner product secure computation to find the best matching user by the trusted server as the agent. The agent forwards the user's request to the server to query, which hides the correlation between user's real trajectory and the server in order to achieve user's trajectory privacy. Security analysis shows that the propose method can effectively protect the user's trajectory privacy. Experiments show that the proposed method is more effective, it reduces the overhead of server's query and communication.
出处 《电子与信息学报》 EI CSCD 北大核心 2016年第9期2158-2164,共7页 Journal of Electronics & Information Technology
基金 国家自然科学基金(61472451,61272151,61402161,61502163) 中南大学中央高校基本科研业务费专项资金(2016zzts058,2016zzts060)
关键词 移动社交网络 轨迹隐私保护 安全多方计算 内积安全计算 Mobile social network Trajectory privacy-preserving Secure multi-party computation Inner product secure computation
  • 相关文献

参考文献5

二级参考文献78

  • 1Gruteser M, Grunwald D. Anonymous usage of location-based services through spatial and temporal cloaking//Pro-ceedings of the International Conference on Mobile Systems.Applications, and Services (MobiSys,03). San Fransisco,USA, 2003; 31-42.
  • 2Pan X, Xu J,Meng X. Protecting location privacy againstlocation-dependent attacks in mobile services. IEEE Transac-tions on Knowledge and Data Engineering, 2012, 24 (8):1506-1519.
  • 3Mokbel M F, Chow C Y,Aref W G. The newcasper:Queryprocessing for location services without compromising privacy//Proceedings of the 32nd Conference of Very Large Databases(VLDB 2006). Seoul, 2006:763-774.
  • 4Bamba B,Liu L. Supporting anonymous location queries inmobile environments with privacy grid//Proceedings of the17th International Conference on World Wide Web (WWW2008). Beijing, 2008; 237-246.
  • 5Krumm J. A survey of computational location privacy.Personal and Ubiquitous Computing, 2009,13(6):391-399.
  • 6Huo Z, Meng X, Hu H,Huang Y. You can walk alone:Trajectory privacy-preserving through significant stays pro-tection//Proceedings of the 17th International Conference onDatabase Systems for Advanced Applications (DASFAA,12).Busan, Korea,2012:351-366.
  • 7You T H, Peng W C,Lee W C. Protecting moving trajecto-ries with dummies//Proceedings of the 8th InternationalConference on Mobile Data Management (MDM,07). Mann-heim, Germany, 2007 ; 278-282.
  • 8Terrovitis M, Mamoulis N. Privacy preserving in the publi-cation of trajectories//Proceedings of the 9th InternationalConference on Mobile Data Management (MDM,08). Bei-jing, China, 2008:65-72.
  • 9Gruteser M, Liu X. Protecting privacy in continuous locationtracking applications. IEEE Security and Privacy, 2004,2(2):28-34.
  • 10Abul O,Bonchi F, Nanni M. Never walk alone:Uncertaintyfor anonymity in moving object databases//Proceedings ofthe 24th International Conference on Data Engineering(ICDE’08). Cancun,Mexico,2008 ; 376-385.

共引文献118

同被引文献40

引证文献5

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部