期刊文献+

一种移动社交网络中的位置内容分享方法 被引量:2

Location content sharing method in mobile social networks
下载PDF
导出
摘要 针对移动社交网络中位置内容分享多方用户的位置隐私问题,在访问控制层面,提出一种基于信任度的合作访问控制模型,采用了基于让步意愿的冲突消解方法处理多用户间的冲突,以兼顾隐私保护与分享程度二者之间的平衡。针对不可信好友恶意转发问题,提出了基于拒绝覆盖的控制方法,支持用户设置转发跳数和个性化控制分享范围。在LBS位置隐私保护层面,提出了一种基于贪心算法的虚假位置选择算法,使构造的虚假位置集合能够保证最大熵且构造的匿名区域最大,以抵御服务提供商获取用户的敏感位置问题。实验数据验证了该算法的可用性。 Aimed at the problem of multiple user location privacy in mobile social networks,a cooperative access control model based on trust is proposed at the level of access control. The conflict resolution method based on concession willingness is given among multiple users to achieve a balance between the privacy protection and the sharing degree. According to the problems of untrustworthy friends' malicious forwarding,a control method,called the ‘refuse to be covered'is studied to support the user in setting the number of forwarding hops and controlling the range of sharing. In the case of LBS location privacy protection,a dummy location selection algorithm based on the greedy algorithm is proposed to prevent the service provider from obtaining the sensitive location of the user,in which the constructed dummy location set can guarantee the maximum entropy and the maximum cloaking region. Experimental results show that the algorithm is available.
作者 金超 张琳 王汝传 JIN Chao ZHANG Lin WANG Ruchuan(School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing 210023, China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks, Nanjing University of Posts and Telecommunications, Nanjing 210003, China)
出处 《南京邮电大学学报(自然科学版)》 北大核心 2017年第5期101-110,共10页 Journal of Nanjing University of Posts and Telecommunications:Natural Science Edition
基金 国家自然科学基金(61402241 61572260 61373017 61572261 61472192) 江苏省科技支撑计划(BE2015702) 江苏省自然科学优秀青年基金(BK20160089) 江苏省高校自然科学研究面上项目(17KJB520026) 南京邮电大学校级科研基金(NY217050)资助项目
关键词 位置隐私 访问控制 让步 信任度 location privacy access control concession trust entropy
  • 相关文献

参考文献9

二级参考文献68

  • 1Gruteser M, Grunwald D. Anonymous usage of location-based services through spatial and temporal cloaking//Pro-ceedings of the International Conference on Mobile Systems.Applications, and Services (MobiSys,03). San Fransisco,USA, 2003; 31-42.
  • 2Pan X, Xu J,Meng X. Protecting location privacy againstlocation-dependent attacks in mobile services. IEEE Transac-tions on Knowledge and Data Engineering, 2012, 24 (8):1506-1519.
  • 3Mokbel M F, Chow C Y,Aref W G. The newcasper:Queryprocessing for location services without compromising privacy//Proceedings of the 32nd Conference of Very Large Databases(VLDB 2006). Seoul, 2006:763-774.
  • 4Bamba B,Liu L. Supporting anonymous location queries inmobile environments with privacy grid//Proceedings of the17th International Conference on World Wide Web (WWW2008). Beijing, 2008; 237-246.
  • 5Krumm J. A survey of computational location privacy.Personal and Ubiquitous Computing, 2009,13(6):391-399.
  • 6Huo Z, Meng X, Hu H,Huang Y. You can walk alone:Trajectory privacy-preserving through significant stays pro-tection//Proceedings of the 17th International Conference onDatabase Systems for Advanced Applications (DASFAA,12).Busan, Korea,2012:351-366.
  • 7You T H, Peng W C,Lee W C. Protecting moving trajecto-ries with dummies//Proceedings of the 8th InternationalConference on Mobile Data Management (MDM,07). Mann-heim, Germany, 2007 ; 278-282.
  • 8Terrovitis M, Mamoulis N. Privacy preserving in the publi-cation of trajectories//Proceedings of the 9th InternationalConference on Mobile Data Management (MDM,08). Bei-jing, China, 2008:65-72.
  • 9Gruteser M, Liu X. Protecting privacy in continuous locationtracking applications. IEEE Security and Privacy, 2004,2(2):28-34.
  • 10Abul O,Bonchi F, Nanni M. Never walk alone:Uncertaintyfor anonymity in moving object databases//Proceedings ofthe 24th International Conference on Data Engineering(ICDE’08). Cancun,Mexico,2008 ; 376-385.

共引文献292

同被引文献18

引证文献2

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部