期刊文献+

移动智能终端的位置隐私保护技术 被引量:8

The Location Privacy Protection Technology of Mobile Intelligent Terminal
下载PDF
导出
摘要 针对大数据时代中,用户的个人位置隐私安全面临极大威胁的问题,依据位置大数据的理论,从用户的移动智能终端角度分析研究了现有位置隐私保护技术的缺点与不足。提出在现有的加密扭曲算法模型的基础上,引入了坐标转换方法,增加对用户位置请求信息的碎片化处理,改进优化了哑元、假名两个技术。仿真实验中,利用模拟软件生成大量的用户移动轨迹,研究比对改进前后的算法各自的信息熵以证明优化算法的优越性。分析实验结果验证了改进后的加密扭曲算法实现了对个人位置隐私信息更有效地保护。 To solve the problems of users′personal location privacy are facing great threat in the era of big data,according to the theory of location big data,the shortcomings of existing location privacy protection technology are analyzed from the perspective of users′mobile intelligent terminals.Based on the existing encryption and distortion algorithm models,it introduces a coordinate transformation method,increases fragmentation of user location information,and optimizes the technologies of dummies and false-name.In simulation experiments,a large number of user trajectories are generated by simulation software,and the information entropy of improved and original algorithm is studied to demonstrate the superiority of the improved algorithm.The experimental results verify that the improved encryption and distortion algorithm is more effective to protect personal location privacy information.
作者 李志鹏 孙名松 宋增林 LI Zhi-peng;SUN Ming-song;SONG Zeng-lin(School of Computer Science and Technology,Harbin University of Science and Technology,Harbin 150080,China;School of Software,Harbin University of Science and Technology,Harbin 150040,China)
出处 《哈尔滨理工大学学报》 CAS 北大核心 2018年第2期58-64,共7页 Journal of Harbin University of Science and Technology
基金 黑龙江省自然科学基金(QC2013C060)
关键词 位置大数据 基于位置服务 位置隐私保护 加密扭曲算法 location big data location-based Service location privacy protection encryption distortion algorithm
  • 相关文献

参考文献8

二级参考文献221

  • 1潘晓,肖珍,孟小峰.位置隐私研究综述[J].计算机科学与探索,2007,1(3):268-281. 被引量:65
  • 2Chen M Y,Yang C C,Hwang M S.Privacy protection dataaccess control[J].International Journal of NetworkSecurity,2013,15(6):391-399.
  • 3Warren S D,Brandeis L D.The right to privacy[J].Harvard Law Review,1890,4(5):193-220.
  • 4Smith J,Dinev T,Xu H.Information privacy research:Aninterdisciplinary review[J].MIS Quarterly,2011,35(4):989-1016.
  • 5Bennett C J.The political economy of privacy:A review ofthe literature[R].Hackensack,NJ:Center for Social andLegal Research,1995.
  • 6Westin A F.Privacy and Freedom[M].New York:Atheneum,1968.
  • 7Bansal G,Zahedi F,Gefen D.The moderating influence ofprivacy concern on the efficacy of privacy assurance mechanisms for building trust:A multiple-contextinvestigation[C]//Proc of rhe Int Conf on Information System (ICIS 2008).Australian:AIS,2008:14-17.
  • 8Hanisar D,Davies S.Global trends in privacy protection:An international survey of privacy,data protection,and surveillance laws and developments[J].Journal of Computer Information Law,1999,18(1):3-111.
  • 9Soltani A,Canty S,Mayo Q,et al.Flash cookies andprivacy[C]//Proc of the AAAI Spring Symp:Intelligent Information Privacy Management 2010.Menlo Park,CA:AAAI,2010:1-8.
  • 10Ayenson M,Wambach D,Soltani A,et al.Flash cookiesand privacy II:Now with HTML5 and etag respawning[OL].(2011-07-29)[2013-02-13].http://ssm.com/abstract= 1898390.

共引文献368

同被引文献73

引证文献8

二级引证文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部