期刊文献+

增强现实中的位置隐私保护 被引量:1

Location Privacy Protection in Augmented Reality
在线阅读 下载PDF
导出
摘要 随着增强现实技术和基于位置服务(LBS)技术的发展,增强现实的应用也越来越广泛,LBS是增强现实的一个重要应用,用户位置隐私的泄漏是LBS用户的重要威胁,因此对用户位置隐私的管理就显得非常重要。论文首先分析用户位置隐私保护的重要性,接着介绍用户位置隐私泄露的类型,并分析和比较目前已有的用户位置隐私保护方法的优缺点,最后提出含有集中受信任的第三方模型的用户位置隐私保护方法,该方法优化了现有的用户位置隐私保护方法,可以有效地实现用户位置隐私的保护。 With the development of augmented reality technology and location based services ( LBS ) technology, the application of augmented reality is applied more and more widely. LBS is one of the most important applications in augmented reality. The leak of user location privacy (ULP) is a major threat to clients of LBS. So the management of ULP is very important. It analyzed the importance of ULP protection, introduced the types of ULP leak and analyzed the advantages and disadvantages of the existing ULP pro~,cting meth- ods. Finally put forward an improved ULP protection method with centralized trusted third party model, which would optimize the existing ULP protecting methods and effectively realize the ULP protecting.
作者 杨洋 王汝传
出处 《计算机技术与发展》 2012年第9期232-234,238,共4页 Computer Technology and Development
基金 国家自然科学基金(60973139 61170065 61171053) 江苏省自然科学基金(BK2011755) 江苏省科技支撑计划项目(BE2010197 BE2010198 BE2011844 BE2011189)
关键词 基于位置服务 位置隐私 K-匿名法 假匿名法 受信任的第三方 location based service (LBS) location privacy K-anonymity method pseudo-anonymity method trusted third party
作者简介 杨洋(1980-),女,江苏南京人,硕士,讲师,主要研究领域为网格计算、增强现实技术、无线传感器网络; 王汝传,教授,博士生导师,主要研究方向为计算机软件、计算机网络、信息安全、移动代理和虚拟现实技术等。
  • 相关文献

参考文献12

  • 1Hollerer T H,Feiner S K. Mobile augmented reality [ M]. [ s. I.].Taylor and Francis Books Ltd,2004.
  • 2Wikipedia. Augmented reality[ EB/OL]. 2009. http://en. wikipedia. org/wiki/Augmented_reality.
  • 3彭志宇,李善平.移动环境下LBS位置隐私保护[J].电子与信息学报,2011,33(5):1211-1216. 被引量:21
  • 4Mokbel M F,Chow C Y,Aref W G. The newCasper : query processing for location services without compromising privacy [C]./Proceedings of the International Conference on Very Large Data Bases. New York: [s. n.].2006:763-774.
  • 5Gedik B,Liu L. Protecting location privacy with personalized k -anonymity ; architecture and algorithms [ J]. IEEE Trans, on Mobile Computing,2008,9(1) : 1-17.
  • 6Gruteser M,Grunwald D. Anonymous usage of location basedservices through spatial and temporal cloaking[ C]./Proc. ofACM Intl Conf. on Mobile Systems. [ s. I.]. [ s. n.].2003.
  • 7Kido H,Yanagisawa Y,Satoh T. Protection of location privacy using dummies for location-based services [ C]./Proc. of the 25 th International Conference on Distributed Computing Systems ( ICPS"05). [ s. I.]. [ s. n.].2005.
  • 8潘晓,肖珍,孟小峰.位置隐私研究综述[J].计算机科学与探索,2007,1(3):268-281. 被引量:66
  • 9王平水,马钦娟.隐私保护k-匿名算法研究[J].计算机工程与应用,2011,47(28):117-119. 被引量:12
  • 10Machanavajjhala A,Gehrke J,Kifer D,et al. L-diversity:privacy beyond k-anonymity [ C]./Proceedings oif the 22nd IC-DE. Atlanta, US A : ACM,2006 : 24 -35.

二级参考文献31

  • 1Speed prediction for two lane rural highways.Washington,DC,Federal Highway Administration,2000.
  • 2Mokbel M F,Chow C Y,and Aref W G.The new Casper:query processing for location services without compromising privacy[C].Proceedings of the International Conference on Very Large Data Bases.New York,2006:763-774.
  • 3Sweeney L.K-anonymity:a model for protecting privacy[J].International Journal on Uncertainty,Fuzziness and Knowledge-based Systems,2002,10(5):557-570.
  • 4Gruteser M and Grumwald D.Anonymous usage of location based services through spatial and temporal cloaking[C].ACM/USENIX MobiSys,New York,2003:69-78.
  • 5Gedik B and Liu L.Location privacy in mobile systems:a personalized anonymization model[C].Proceedings of International Conference on Distributed Computing Systems,Columbus,2005:620-629.
  • 6Htu H and Xu J.Non-exposure location anonymity[C].Proceedings of the IEEE International Conference on Data Engineering,Shanghai,2009:1120-1131.
  • 7Xu J,Tang X,Hu H,and Du J.Privacy-conscious location-based queries in mobile environments[J].IEEE Transactionson Parallel and Distributed Systems,2010,21(3):313-326.
  • 8Pan X,Xu J,and Meng X.Protecting location privacy against location-dependent attack in mobile services[C].Proceeding of the ACM Conference on Information and Knowledge Management,Napa Valley,2008:1475-1476.
  • 9Brinkhoff T.A framework for generating network-based moving objects[J].Geoinformatica,2002,6(2):153-180.
  • 10Samarati P, Sweency L.Generalizing data to provide anonymity when disclosing information(abstract)[C]//Proc of the 17th ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems.New York:ACM Press, 1998.

共引文献93

同被引文献11

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部