期刊文献+

一种安全高效的轨迹隐私保护方案

A safe and efficient track privacy protection scheme
下载PDF
导出
摘要 针对现有的假轨迹隐私保护方法大多忽视了背景知识攻击并且生成的轨迹相似度不足,提出一种基于第三方可信服务器的新的保护方法。当用户端提出请求时,首先根据用户所在的地理位置和假位置的距离约束生成合适的假位置,然后利用轨迹相似度这一约束让生成的假轨迹的方向与真实轨迹的方向更加相似。实验表明:该算法与随机生成的假轨迹算法相比轨迹方向相似度更高、运行时间较少,且能防止敌手的背景知识攻击,能更好地实现轨迹隐私保护。 Aiming at the short-coming that most existing false track privacy protection method neglect background knowledge attack and the generated track lack of similarity,a new protection method based on the third party trusted server is proposed.When the client makes a request,firstly,according to the geographical location of the user and the distance constraint of the pseudo location,a suitable pseudo location is generated,and then the constraint of the trajectory similarity is used to make the direction of the generated pseudo trajectory more similar to the direction of the real trajectory.Experiment shows that the algorithm has higher similarity of trajectory direction,less run time,compared with pseudo trajectory algorithm randomly generated.And it can prevent adversarial attacks of background knowledge,and can realize track privacy protection better.
作者 张家磊 钟伯成 房保纲 丁佳蓉 贾媛媛 ZHANG Jialei;ZHONG Bocheng;FANG Baogang;DING Jiarong;JIA Yuanyuan(School of Electronic of Electrical Engineering,Shanghai University of Engineering Science,Shanghai 201620,China)
出处 《传感器与微系统》 CSCD 北大核心 2021年第3期62-64,76,共4页 Transducer and Microsystem Technologies
关键词 假轨迹 第三方可信服务器 地理位置 轨迹相似度 false track the third party trusted server geographical location trajectory similarity
  • 相关文献

参考文献2

二级参考文献25

  • 1祝刚,苏伟,魏可惠,李世玲.自由段航天器惯性/星光组合定位方法研究[J].宇航学报,2007,28(6):1589-1592. 被引量:4
  • 2杨淑洁,杨功流,尹洪亮,邹成伟,李霄.一种航天飞行器的INS/CNS自主导航方案[J].中国惯性技术学报,2014,12(6):728-733. 被引量:4
  • 3Gruteser M, Grunwald D. Anonymous usage of location-based services through spatial and temporal cloaking//Pro-ceedings of the International Conference on Mobile Systems.Applications, and Services (MobiSys,03). San Fransisco,USA, 2003; 31-42.
  • 4Pan X, Xu J,Meng X. Protecting location privacy againstlocation-dependent attacks in mobile services. IEEE Transac-tions on Knowledge and Data Engineering, 2012, 24 (8):1506-1519.
  • 5Mokbel M F, Chow C Y,Aref W G. The newcasper:Queryprocessing for location services without compromising privacy//Proceedings of the 32nd Conference of Very Large Databases(VLDB 2006). Seoul, 2006:763-774.
  • 6Bamba B,Liu L. Supporting anonymous location queries inmobile environments with privacy grid//Proceedings of the17th International Conference on World Wide Web (WWW2008). Beijing, 2008; 237-246.
  • 7Krumm J. A survey of computational location privacy.Personal and Ubiquitous Computing, 2009,13(6):391-399.
  • 8Huo Z, Meng X, Hu H,Huang Y. You can walk alone:Trajectory privacy-preserving through significant stays pro-tection//Proceedings of the 17th International Conference onDatabase Systems for Advanced Applications (DASFAA,12).Busan, Korea,2012:351-366.
  • 9You T H, Peng W C,Lee W C. Protecting moving trajecto-ries with dummies//Proceedings of the 8th InternationalConference on Mobile Data Management (MDM,07). Mann-heim, Germany, 2007 ; 278-282.
  • 10Terrovitis M, Mamoulis N. Privacy preserving in the publi-cation of trajectories//Proceedings of the 9th InternationalConference on Mobile Data Management (MDM,08). Bei-jing, China, 2008:65-72.

共引文献70

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部