期刊文献+

一种新型基于位置服务的隐私保护方案

A NOVEL PRIVACY PROTECTION SCHEME BASED ON LOCATION SERVICE
下载PDF
导出
摘要 基于位置服务的移动社交网络迅速发展,为用户提供了诸多便利。使用这种增值服务时,用户必须向位置服务提供商提供当前位置信息与请求内容,这一过程难免会造成隐私信息泄露,给用户的人身和财产安全造成威胁。因此提出一种新型基于位置服务的隐私保护方案,利用基于球树的匿名区域构造算法构造匿名区域,根据距离与请求内容的权重计算方法,选择熵最大的用户组,保证区域内用户分布均匀性和请求内容多样性。实验结果表明,该算法构造的匿名区域面积与类四叉树算法相比减少30%,能有效保护用户的隐私安全,降低LBS服务器的开销。 The rapid development of mobile social networks based on location services provides great convenience to users. When using this value-added service, users must provide location information and requested content to the location service provider. This process will inevitably cause the leakage of private information and threaten the safety of users’ personal and property. Therefore, this paper proposes a novel privacy protection scheme based on location service. It used an anonymous area construction algorithm based on a ball tree to build an anonymous area. According to the distance and requested weight calculation method, the user group with the largest entropy was selected to ensure uniform distribution of users in the area and ensure the diverse request content. The experimental results show that compared with the Quadtree-like algorithm, the anonymous area constructed by this algorithm is reduced by 30%, which can effectively protect the privacy of users and reduce the overhead of LBS server.
作者 李兰 张才宝 奚舒舒 马鸿洋 Li Lan;Zhang Caibao;Xi Shushu;Ma Hongyang(School of Information and Control Engineering,Qingdao University of Technology,Qingdao 266000,Shandong,China;School of Science,Qingdao University of Technology,Qingdao 266033,Shandong,China)
出处 《计算机应用与软件》 北大核心 2022年第12期335-340,共6页 Computer Applications and Software
基金 国家自然科学基金项目(11975132) 山东省高等教育科技计划项目(J18KZ012)。
关键词 基于位置服务 位置隐私保护 K-匿名 球树 Location-based service Location privacy protection K-anonymity Ball tree
  • 相关文献

参考文献8

二级参考文献35

  • 1潘晓,肖珍,孟小峰.位置隐私研究综述[J].计算机科学与探索,2007,1(3):268-281. 被引量:65
  • 2薛安荣,鞠时光,何伟华,陈伟鹤.局部离群点挖掘算法研究[J].计算机学报,2007,30(8):1455-1463. 被引量:96
  • 3Beresford A R,Stajano F. Location privacy in pervasive com-puting[J], IEEE Pervasive Computing,2003,2(1) ; 46-55.
  • 4Bettini C,Wang S,Jagodia S. Protecting privacy against location-based personal identification[C]//Proc of VLDB Workshop on Secure Data Management, 2005 : 185-199.
  • 5Broch J,Maltz D A,Johnson D B. et al. A performance comparison of multi-hop wireless ad hoc network routing proto-cols[C] // Proc of the 4th Annual ACM/IEEE International Conference on Mobile Computing and Networking, 1998:85-97.
  • 6Hyytia E,Virtamo J. Random waypoint mobility model in cellular networks [J]. Wireless Networks, 2007,13(2); 177-188.
  • 7Gruteser M’Grunwald D. Anonymous usage of location-based services through spatial and temporal cloakingfC] // Proc of the 1st International Conference on Mobile Systems?Applications and Services, 2003 : 31-42.
  • 8Mokbel M F?Chow C Y, Aref W G. The new casper: Query processing for location services without compromising privacy [C] // Proc of the 32nd International Conference on Very Large Data Bases, 2006 : 763-774.
  • 9Bamba B, Liu L, Pesti P,et al. Supporting anonymous location queries in mobile environments with privacy grid [C] //Proc of the 17th International Conference on World Wide Web,2008:237-246.
  • 10Gedik B, Liu L. A customizable K-anonymity model for protecting location privacy [C] // Proc of the 25th International Conference on Distributed Computing Systems,2005 :620-629.

共引文献35

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部