期刊文献+

The NCC: An Improved Anonymous Method for Location-Based Services Based on Casper

下载PDF
导出
摘要 Casper Cloak is a privacy protection method based on K-anonymity algorithm. To be anonymous, Casper Cloak needs to search regional sibling and parent node, which requires a complex process and huge expenditure. In addition,the anonymous area has space redundancy and it is not accurate enough to achieve high Location-Based Services (LBS) quality. To address these problems,this paper proposes an improved privacy protection method-NCC, based on the Casper Cloak. To reduce the unnecessary search, NCC introduced the concept of the first sibling node. NCC also improves the LBS quality by considering the characteristics of user mobility. Moreover, the improved method,NCC, which is incorporated with a redundancy optimization processing strategy,realizing more precise in the anonymous area and accurately guaranteeing the related degree of privacy. Adopting NCC verification experiments reflects varied advantages as bellow: (1) By reducing 80% searching time, NCC highly improved searching process. (2) The anonymous area produced in NCC not only meet users' anonymous demands, but the direction of the mobility which improves 4 times accuracy of services in comparison with Casper mode.(3) According to optimization strategy, NCC can reach minimum anonymous area index, increasing the rates of anonymous optimization in original algorithm.
出处 《国际计算机前沿大会会议论文集》 2017年第2期129-131,共3页 International Conference of Pioneering Computer Scientists, Engineers and Educators(ICPCSEE)
  • 相关文献

参考文献3

二级参考文献17

  • 1潘晓,肖珍,孟小峰.位置隐私研究综述[J].计算机科学与探索,2007,1(3):268-281. 被引量:63
  • 2Beresford A.R,Stajano F.Location Privacy in PervasiveComputing[J].IEEE Pervasive Computing,2003,2(1):46-55.
  • 3Tao Jiang,Helen J W,Hu Yih-Chun.Preserving Location Privacyin Wireless LANs[C]//Proc.of the 5th International Conference onMobile Systems.[S.l.]:IEEE Press,2007.
  • 4Hua Lu,Christian S J,Lung M Y.PAD:Privacy-area Aware,Dummy-based Location Privacy in Mobile Services[C]//Proc.ofthe 7th ACM International Workshop on Data Engineering forWireless and Mobile Access.New York,USA:[s.n.],2008.
  • 5Kido H,Yanagisawa Y,Satoh T.An Anonymous CommunicationTechnique Using Dummies for Location-based Services[C]//Proc.of IEEE International Conference on Pervasive Services.Santorini,Greece:[s.n.],2005.
  • 6Gruteser M,Grunwald D.Anonymous Usage of Location-basedServices Through Spatial and Temporal Cloaking[C]//Proc.of the1st International Conference on Mobile Systems,Applications,andServices.[S.l.]:ACM Press,2003.
  • 7Toby X,Cai Ying.Location-anonymity in Continuous Location-based Services[C]//Proc.of the ACM Symposium on Advance inGeographic Information Systems.Seattle,USA:[s.n.],2007.
  • 8Mokbel M F,Chow C Y,Aref W G.The New Casper:QueryProcessing for Location Services Without CompromisingPrivacy[C]//Proc.of the 32nd International Conference on VeryLarge Data Bases.Seoul,Korea:[s.n.],2006.
  • 9林欣,李善平,杨朝晖.LBS中连续查询攻击算法及匿名性度量[J].软件学报,2009,20(4):1058-1068. 被引量:32
  • 10徐建,徐明,林欣,郑宁.路网限制环境中基于匿名蜂窝的位置隐私保护[J].浙江大学学报(工学版),2011,45(3):429-434. 被引量:7

共引文献94

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部