期刊文献+

一种位置服务隐私保护方法

Location-Based Service Privacy Protection Method
下载PDF
导出
摘要 近年来,大多数的位置服务隐私保护转向了基于用户协作的P2P形式,但是此模式最大的弊端在于协作用户存在不诚信的情况,如果出现恶意的协作用户,那么协作组用户信息可能会被泄露.在此前提下,本文通过添加第三方信任机构为移动用户进行网络行为异常检测的方式,提出一种防范位置隐私泄露给恶意用户的方法,并通过二叉树的形式扩展P2P模式下的寻找协作用户的范围.通过实验验证,可以有效地防范非诚信用户加入匿名组,降低了信息泄露的可能. In recent years, most location-based service privacy protection turns to peer-to-peer based on subscriber cooperation. However, the biggest drawback of that mode lies in the integrity of collaborative users. If there are vicious users in ambient collaborative users, the information of collaborative users may be accessed illegally. So this paper proposes a method of preventing the location privacy from being revealed to vicious users via using third-party trust institutions to detect the abnormal network behaviors for mobile users. In the meanwhile, we broaden the zone of collaborative users in the mode of peer to peer through binary tree. The experimental result shows the method can effectively prevent unfaithful users from joining in the anonymous group and reduce the probability of the information leakage.
出处 《计算机系统应用》 2017年第8期267-272,共6页 Computer Systems & Applications
关键词 位置服务隐私保护 P2P 第三方信任 二叉树模型 location-based service privacy protection P2P the trusted institutions third party binary tree
  • 相关文献

参考文献5

二级参考文献45

  • 1罗永龙,徐致云,黄刘生.安全多方的统计分析问题及其应用[J].计算机工程与应用,2005,41(24):141-143. 被引量:14
  • 2潘晓,肖珍,孟小峰.位置隐私研究综述[J].计算机科学与探索,2007,1(3):268-281. 被引量:65
  • 3CLIFTON C, KANTARCIOGLU M, VAIDYA J ,et al. Tools for privacy preserving distributed data mining [ J ]. SIGKDD Explorations, 2002,4(2) :28-34.
  • 4BHADURI K, DAS K, KARGUPTA H. Peer-to-peer data mining, privacy issues, and games[ C ]//Lecture Notes in Computer Science, vol 4476. Berlin : Springer, 2007 : 1-10.
  • 5KARGUPTA H, DAS K, LIU K. A game theoretic approach toward muhi-party privacy-preserving distributed data mining, TR-CS-0701 [R]. [S. l. ] :UMBC,2007.
  • 6KARGUPTA H, DAS K, LIU K. Multi-party, privacy-preserving data mining using a game theoretic framework[ C ]//Proc of the 11 th European Conference on Principles and Practice of Knowledge Discovery in Databases ( PKDD' 07 ). Berlin, Heidelberg: Springer-Vedag, 2007 : 523-531.
  • 7Mokbel M F. Privacy in location-based services: Start-of- the-art and research directions//Proceedings of the Interna tional Conference on Mobile Data Management ( MDM ' 07). Mannheim, Germany, 2007:228.
  • 8Solanas A, Domingo-Ferrer J, Martinez-Balleste A. Location privacy in location-based services: Beyond TTP-based schemes//Proceedings of the International Workshop on PiLBA. Malaga, Spain, 2008, 397.
  • 9Gruteser M, Grunwal D. Anonymous usage of location-based services through spatial and temporal cloaking//Proeeedings of the International Conference on Mobile Systems, Applications, and Services(MobiSys'03). New York, USA, 2003..163-168.
  • 10Gedik B, Liu L. A customizable k-anonymity model for protecting location privacy//Proceedings of the IEEE Interna tional Con{erence on Distributed Computing Systems (ICDCS'05). Columbus, Ohio, USA, 2005:620-629.

共引文献170

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部