期刊文献+

面向移动社交网络内容分享的位置隐私保护方法 被引量:3

Location privacy preservation approach towards to content sharing on mobile online social network
下载PDF
导出
摘要 针对移动社交网络内容分享中内容参与者的位置信息泄露问题,提出一种面向内容分享的位置隐私访问控制模型,细粒度控制分享内容中所涉及用户的敏感位置信息的访问,设计一种针对位置隐私设置的k-匿名算法,保证设置的敏感位置信息在内容分享服务提供商的服务器端不被推测,给出一种基于位置敏感度的位置偏移算法,以平衡隐私与服务质量。最后通过仿真实验验证该方法的有效性。 A privacy access control model for content sharing was presented to fine-grained control users' location information associated with sharing content in mobile social network. A k-anonymity privacy algorithm for privacy settings was given to protect against inference attack on a content sharing service provider server. To balance the privacy and quality of service, a location shifting method was presented. Finally experimental results demonstrate the validity and practicality of the proposed approach.
作者 李超 殷丽华 耿魁 方滨兴 LI Chao YIN Li-hua GENG Kui FANG Bin-xing(State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China Institute of Electronic and Information Engineering, University of Electronic Science and Technology of China in Dongguan, Dongguan 523808, China)
出处 《通信学报》 EI CSCD 北大核心 2016年第11期31-41,共11页 Journal on Communications
基金 广东省产学研合作基金资助项目(No.2016B090921001) 国家自然科学基金-广东联合基金资助项目(No.U1401251) 国家高技术研究发展计划("863"计划)基金资助项目(No.2015AA016007) 国家"核高基"基金资助项目(No.2015ZX01029101)~~
关键词 位置隐私 隐私计算 隐私保护 社交网络隐私 location privacy, privacy computing, privacy preservation, mobile social network
  • 相关文献

参考文献1

二级参考文献88

  • 1CULNAN M J, ARMSTRONG P K. Information privacy concerns, procedural fairness, and impersonal trust: an empirical investigation[J]. Organization Science, 1999, 10(1): 104-115.
  • 2DINEV T, HART P. Privacy concems and intemet use-a model of trade-off factors[C]//,~cademy of Management. c2003:1-6.
  • 3LI H, SARATHY R, XU H. Understanding situational online informa- tion disclosure as a privacy calculus[J]. Journal of Computer Informa- tion Systems, 2010, 51(1): 62-71.
  • 4KEHR F, KOWATSCH T, WENTZEL D, et al. Blissfully ignorant: the effects of general privacy concerns, general institutional trust, and af- fect in the privacy calculus[J]. Information Systems Journal, 2015, 25(6): 607-635.
  • 5MACHANAVAJJHALA A, KIFER D, GEHRKE J, ~t al. /-diversity: privacy beyond k-anonymity[J]. ACM Transactions on Knowledge Discovery from Data (TKDD), 2007, 1(1): 3.
  • 6AGRAWAL D, AGGARWAL C C. On the design and quantification of privacy preserving data mining algorithms[C]//The 20th ACM SIG- MOD-SIGACT-SIGART Symposium on Principles of Database Sys- tems. ACM, c2001 : 247-255.
  • 7LIU K, KARGUPTA H, RYAN J. Random projection-based multipli- eative data perturbation for privacy preserving distributed data min- ing[J]. IEEE Transactions on Knowledge and Data Engineering, 2006, 18(1): 92-106.
  • 8OLIVEIRA S R M, ZAIANE O R. Privacy preserving clustering by data transformation[C]//The 18th Brazilian Symposium on Databases. c2003:304-318.
  • 9OLIVEIRA S R M, ZAIANE O R. Privacy preserving clustering by object similarity-based representation and dimensionality reduction transformation[C]/Fl'he Workshop on Privacy and Security Aspects of Data Mining. e2004:21-30.
  • 10OLIVEIRA S R M, ZAIANE 0 R. Privacy preserving frequent itemsetmining[C]//The IEEE International Conference on Privacy, Security and Data Mining-Volume 14, Australian Computer Society. c2002: 43-54.

共引文献69

同被引文献26

引证文献3

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部