期刊文献+

基于k-匿名位置隐私保护的自适应学习模型 被引量:3

Adaptive learning model based on k-anonymity location privacy protection
下载PDF
导出
摘要 个性化k-匿名模型能够根据用户隐私偏好实现隐私保护,为用户提供控制位置隐私更多选择性,但由于设置隐私偏好的复杂性,就算最为注重隐私保护的用户也可能忽略一些问题。研究的目的是开发一个框架,帮助用户选择自己的隐私偏好,有效管理和获取来自匿名者的隐私内容。分析一组影响隐私配置选择因素,构建自适应学习模型来帮助用户做出正确的决定,保护他们的隐私信息。随着学习模型的成熟,将以最小的用户干预来管理各种情况下不同用户的隐私偏好,防止隐私泄露,并鼓励用户使用模型推荐的隐私设置。 Personalized k-anonymous models provide privacy protection based on user privacy preferences,giving users morecontrol of location privacy,but due to the complexity of setting privacy preferences,even the most privacy-conscioususers may ignore some of the problems.The purpose of this paper is to develop a framework to help users choose theirown privacy preferences,effective management and access from the anonymous privacy content.Analyze a set of optionsthat affect privacy configuration and build an adaptive learning model to help users make the right decisions and protecttheir privacy information.As the learning model matures,it will manage the user’s different privacy preferences in a varietyof situations with minimal user intervention,prevent privacy disclosure,and encourage users to use the model’s recommendedprivacy settings.
作者 穆良 程良伦 MU Liang;CHENG Lianglun(College of Computer Science and Technology, Guangdong University of Technology, Guangzhou 510006, China)
出处 《计算机工程与应用》 CSCD 北大核心 2017年第18期89-94,101,共7页 Computer Engineering and Applications
基金 国家自然科学基金广东联合基金重点项目(No.U1401251) 粤港共性技术招标项目(No.2015B010104005)
关键词 自适应性学习模型 位置服务(LBS) 隐私保护 K-匿名 adaptive learning model location service(LBS) privacy protection k-anonymous
  • 相关文献

参考文献4

二级参考文献22

  • 1KRUMM J. A survey of computational location privacy[ J]. Journal of Personal and Ubiquitous Computing, 2009, 13 (6): 391-399.
  • 2BELLAVISTA P, KUPPER A, HELAL S. Location-based services: back to the future[ J]. IEEE Pervasive Computing, 2008, 7(2) : 85-89.
  • 3XU F, HE J, WU X, et al. A method for privacy protection in location based services[ C] //Proc 2009 International Conference on Computer and Information Technology ( CIT 2009). Xiamen: IEEE Computer Society Press, 2009 : 11-14.
  • 4TSAI J, KELLEY P, CRANOR L, et al. Location-sharing technologies: privacy risks and controls[ C]//Proc 37th Research Conference on Communication, Information and Internet Policy (TPRC 2009). Arlington, VA: [ s. n. ], 2009: 25-27.
  • 5XU F, CHOW K P, HE J S, et al. Privacy reference monitor-a computer model for law compliant privacy protection[ C ]//Proc 15th International Conference on Parallel and Distributed Systems (ICPADS'09). Shenzhen: IEEE Computer Society Press, 2009 : 8-11.
  • 6DUCKHAM M, KULIK L. Location privacy and locationaware computing[ M]//DRUMMOND J. Dynamic & Mobile GIS:Investigating Change in Space and Time. [ S. l. ] : CRC Press, 2006: 34-51.
  • 7BAUGH J P, GUO Jin-hua. Location privacy in mobile computing enviroments [ C ] //Proc Third International Conference, Vbiquitons Intelligence and Computor ( UIC 2006 ) ( Lecture Notes in Computer Science, Vol. 4159 ). Wuhan: IEEE Computer Society Press, 2006: 936-945.
  • 8XU F, HE J, WU X, et al. A privacy-enhanced access control model[ C]//Proc 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing ( NSWCTC 2009). Wuhan : IEEE Computer Society Press, 2009 : 25 -26.
  • 9BURGHARDT T, BUCHMANN E, MULLER J, et al. Understanding user preferences and awareness: privacy mechanisms in location-based services[C]//Proc on the Move to Meaningful Internet Systems Conferences (OTM 2009) (Lecture Notes in Computer Science, Vol. 5870). Vilamoura, Portugal: Springer-Verlag, 2009 : 1-6.
  • 10Sweeney L.k-anonymity:a model for protecting privacy[J].International Journal of Uncertainty,Fuzziness and Knowledge-Based Systems,2002,10.

共引文献232

同被引文献22

引证文献3

二级引证文献40

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部