期刊文献+

基于差分隐私的个人轨迹信息保护机制 被引量:9

Personal Trajectory Information Protection Based on Differential Privacy Mechanism
下载PDF
导出
摘要 随着智能手机的发展,基于位置的服务越来越受欢迎,这种服务正在引起严重的隐私问题,因为许多用户不愿看到他们的位置信息泄露给服务提供商。近年来研究人员将广义的差分隐私概念引入了位置信息保护中,提供了一个具有严格数学证明的专用隐私保护框架。直观地说,差分隐私意味着通过扰动,使给定距离内的任何两个可能的发布位置的生成概率相似,因此攻击者无法了解用户的真实位置。然而,在保证隐私的前提下,用户总是希望所访问服务的质量损失是最小的。针对上述问题给出了一种后置映射的方法来实现。后置映射机制可以在满足相同的隐私级别同时改善其平均服务质量,并结合真实数据,对机制进行了仿真分析,结果显示机制的服务质量损失低于平面拉普拉斯机制。 With the development of smartphones, location-based services are becoming more and more popular, and such services are causing serious privacy problems because many users are reluctant to see their location information leaked to service providers. In recent years, researchers have introduced the concept of differential privacy in a broad sense into location information protection, providing a private privacy protection framework with strict mathematical proof. Intuitively speaking, differential privacy means that by perturbation, the probability of generating any two possible release locations within a given distance is similar, so the attacker cannot understand the true location of the user. However, under the premise of ensuring privacy, users always want the quality loss of the accessed service to be minimal. A post mapping method is implemented to solve the above problem. The post-mapping mechanism can improve the average quality of service while satisfying the same privacy level, and combines the real data to simulate the mechanism. The result shows that the service quality loss of the mechanism is lower than the plane Laplacian mechanism.
作者 侯尧 陶洋 杨理 熊炼 HOU Yao;TAO Yang;YANG Li;XIONG Lian(School of Communication and Information Engineering,Chongqing University of Posts and Telecommunications,Chongqing 400065,China)
出处 《计算机工程与应用》 CSCD 北大核心 2020年第9期106-110,共5页 Computer Engineering and Applications
基金 中国国家自然科学基金青年科学基金(No.61801072)。
关键词 差分隐私 位置隐私 轨迹隐私 位置服务 differential privacy location privacy trajectory privacy location-based services
  • 相关文献

参考文献5

二级参考文献59

  • 1潘晓,肖珍,孟小峰.位置隐私研究综述[J].计算机科学与探索,2007,1(3):268-281. 被引量:65
  • 2Gruteser M, Grunwald D. Anonymous usage of location-based services through spatial and temporal cloaking//Pro-ceedings of the International Conference on Mobile Systems.Applications, and Services (MobiSys,03). San Fransisco,USA, 2003; 31-42.
  • 3Pan X, Xu J,Meng X. Protecting location privacy againstlocation-dependent attacks in mobile services. IEEE Transac-tions on Knowledge and Data Engineering, 2012, 24 (8):1506-1519.
  • 4Mokbel M F, Chow C Y,Aref W G. The newcasper:Queryprocessing for location services without compromising privacy//Proceedings of the 32nd Conference of Very Large Databases(VLDB 2006). Seoul, 2006:763-774.
  • 5Bamba B,Liu L. Supporting anonymous location queries inmobile environments with privacy grid//Proceedings of the17th International Conference on World Wide Web (WWW2008). Beijing, 2008; 237-246.
  • 6Krumm J. A survey of computational location privacy.Personal and Ubiquitous Computing, 2009,13(6):391-399.
  • 7Huo Z, Meng X, Hu H,Huang Y. You can walk alone:Trajectory privacy-preserving through significant stays pro-tection//Proceedings of the 17th International Conference onDatabase Systems for Advanced Applications (DASFAA,12).Busan, Korea,2012:351-366.
  • 8You T H, Peng W C,Lee W C. Protecting moving trajecto-ries with dummies//Proceedings of the 8th InternationalConference on Mobile Data Management (MDM,07). Mann-heim, Germany, 2007 ; 278-282.
  • 9Terrovitis M, Mamoulis N. Privacy preserving in the publi-cation of trajectories//Proceedings of the 9th InternationalConference on Mobile Data Management (MDM,08). Bei-jing, China, 2008:65-72.
  • 10Gruteser M, Liu X. Protecting privacy in continuous locationtracking applications. IEEE Security and Privacy, 2004,2(2):28-34.

共引文献123

同被引文献122

引证文献9

二级引证文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部