期刊文献+

移动社会性软件中的位置隐私研究 被引量:2

Research of location privacy for mobile social software
在线阅读 下载PDF
导出
摘要 为了保护移动社会性软件中用户的位置隐私,以位置-匿名模型为基础,基于分布式结构提出了一种移动社会性软件系统中的P2P位置匿名算法。用户在提出服务请求前,查找-1个用户形成包含自己在内的一个组,覆盖整个组成员的最小区域就是用户匿名后的位置范围。在该算法中引入了复杂网络中度的概念。根据用户度的大小决定查找-1个用户的方式(单跳/多跳),有效地减少了服务的平均响应时间。实验结果表明,与基于中心服务器结构的匿名算法相比,该算法有较强的可扩展性和有效性。 To protect the users’ location privacy in the mobile social software,based on the location-anonymity model and decentralized scheme,a P2P location privacy algorithm in the mobile social software is proposed.Before requesting services,the user will form a group from-1 users through finding,the minimum region covered the entire group members is the anonymous position range.In the algorithm,the concept of degree in the complex network is introduced.Based on the size of the users’ degree,the mode of finding users(single-hop /multi-hop) is decided,and the average response time of service is reduced effectively.Experimental results show that compared to the anonymous algorithm based on the centralized scheme,this algorithm has strong scalability and effectiveness.
出处 《计算机工程与设计》 CSCD 北大核心 2010年第17期3781-3784,共4页 Computer Engineering and Design
基金 国家自然科学基金项目(60975081) 山东省自然科学基金项目(Y2007G18) 山东省博士后科研择优基金项目(200602005)
关键词 位置隐私 -匿名 分布式结构 移动社会性软件 location privacy -anonymity decentralized scheme mobile social software degree
作者简介 徐娜(1983-),女,山东淄博人,硕士研究生,研究方向为复杂网络、移动社会性软件; 王红,女,山东济南人,教授,硕士生导师,研究方向为复杂网络理论与应用、计算机网络、移动计算等; 黄雯(1983-),女,山东济南人,硕士研究生,研究方向为复杂网络、移动社会性软件。E-maihxn_713@163.com
  • 相关文献

参考文献1

二级参考文献10

  • 1Atallah M J,Frikken K B.Privacy-preserving location-dependent query processing[].Proceeding of the IEEE/ACS International Conference on Pervasive Services(ICPS’).2004
  • 2Cheng R,Kalashnikov D V,Prabhakar S.Evaluating probabilistic queries over imprecise data[].Proceeding of ACM International Conference on Management of Data(SIGMOD’).2003
  • 3Machanavajjhala A,Gehrke J,et al.L-diversity:priva-cy beyond k-anonymity[].Proceedings ofnd Interna-tional Conference on Data Engineering(ICDE’).2006
  • 4Mokbel M F.Privacy in location-based services:start-of-the-art and research directions[].Proceeding ofth In-ternational Conference on Mobile Data Management(MDM’).2007
  • 5Man accused of stalking ex-girlfriend with GPS. http://www.foxnews.com/story/0,2933,131487,00.html . 2004
  • 6Authorities:GPS system used to stalk woman. http://www.usatoday.com/tech/news/2002-12-30-gps-stalker_x.htm . 2002
  • 7Sciannamea M.Companies increasingly use GPS-enable cell phones to track employees. http://wifi.weblogsinc.com/2004/09/24/companies-increasingly-use-gps-enabled-cell-phones-to-track/ . 2004
  • 8Gedik B,Liu L.Protecting location privacy with person-alized k-anonymity:architecture and algorithms[].IEEE Transactions on Mobile Computing.
  • 9Hong J I,Landay J A.An architecture for privacy-sen-sitive ubiquitous computing[].Proceedings of the Inter-national Conference on Mobile SystemsApplicationsand Services(MobiSys’).2004
  • 10Bettini C,Wang X S,Jajodia S.Protecting privacy a-gainst location-based personal identification[].Proceeding of the VLDB Workshop on Secure Data Management(SDM’).2005

共引文献65

同被引文献16

  • 1Gruteser M,Grunwald D. Anonymous usage of location ba-sed services through spatial and temporal cloaking[ C]//Proc of first international conference on mobile systems, applica- tions, and services. San Francisco, California, USA: ACM, 2003 : 31-42.
  • 2Luper D, Cameron D, Miller J A, et al. Spatial and temporal target association through semantic analysis and GPS data mining [ C ]//Proceedings of IKE 2007. Las Vegas, USA: [ s. n. ] ,2007:251-257.
  • 3Abul O, Bonchi F, Nanni M. Never walk alone:uncertainty for anonymity in moving objects databases[ C]//Proceedings of ICDE 2008. Cancun,Mexico: [ s. n. ] ,2008:376-385.
  • 4Huang Leping, Matsuura K, Yamane H, et al. Enhancing wireless location privacy using silent period[ C]//Proceed- ings of the IEEE wireless communications and networking conference. [ s. 1. ] : IEEE,2005 : 1187-1192.
  • 5Huang Leping, Yamane H, Matsuura K, et al. Towards mod- eling wireless location privacy [ C ]//Proceedings of the workshop on privacy enhancing technologies. Dubrovnik (Cavtat) ,Croatia: [ s. n. ] ,2005:59-77.
  • 6Huang Leping, Yamane L, Mastsuura K, et al. Silent cas- cade : enhancing location privacy without communication QoS degradation[ C]//Proceedings of the 3rd international con- ference on security in pervasive computing. [ s. I. ] : [ s. n. ], 2006 : 165-180.
  • 7Xu T, Cai Y. Exploring historical location data for anonymity preservation in location-based services[ C ]//Proceedings of INFOCOM 2008. Phoenix : IEEE ,2008.
  • 8彭志宇,李善平.移动环境下LBS位置隐私保护[J].电子与信息学报,2011,33(5):1211-1216. 被引量:21
  • 9霍峥,孟小峰.轨迹隐私保护技术研究[J].计算机学报,2011,34(10):1820-1830. 被引量:111
  • 10黄毅,霍峥,孟小峰.CoPrivacy:一种用户协作无匿名区域的位置隐私保护方法[J].计算机学报,2011,34(10):1976-1985. 被引量:82

引证文献2

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部