期刊文献+

面向LBS的隐私保护模型及方案 被引量:14

LBS-oriented location privacy protection model and scheme
在线阅读 下载PDF
导出
摘要 首先,提出一种基于中心服务器结构的位置隐私保护模型,然后,针对该模型设计了一种基于伪随机置换的位置隐私保护方案,此方案借鉴k-匿名技术、秘密信息检索技术的设计理念和方法,实现了完美匿名和基于位置的盲查询。最后,证明此方案具备不可追踪性和不可关联性等安全属性,并对方案的效率问题进行了分析。 A location privacy protection model was proposed based on the central server structure, designed a location privacy protection scheme based on pseudo-random permutation for the model. Proposed scheme builds on k-anonymous and secret information retrieval technology design concept and methods, achieves a blind query and perfect anonymous. This scheme has been proven to have untraceability and unlinkability, and the efficiency is analyzed as well.
出处 《通信学报》 EI CSCD 北大核心 2014年第8期116-124,共9页 Journal on Communications
基金 国家自然科学基金资助项目(61170241) 高等学校博士学科点专项科研基金资助项目(20132304110017) 黑龙江省教育厅科学技术研究基金资助项目(12513049) 哈尔滨市科技创新人才专项基金资助项目(2012RFXXG086)~~
关键词 隐私保护 基于位置的服务 K-匿名 盲查询 privacy protection location-based services k-anonymity blind query
作者简介 杨松涛(1972-),男,黑龙江佳木斯人,哈尔滨工程大学博士生,佳木斯大学副教授,主要研究方向为物联网安全、隐私保护。 马春光(1974-),男,黑龙江双鸭山人,哈尔滨工程大学院教授、博士生导师,哈尔滨工程大学国家保密学院副院长,主要研究方向为密码学、信息安全、传感网与物联网。 周长利(1985-),男,黑龙江哈尔滨人,哈尔滨工程大学博士生,主要研究方向为物联网安全、隐私保护。
  • 相关文献

参考文献21

  • 1HARRISON B, DEY A. What have you done with location-based services lately[J]. IEEE Pervasive Computing, 2009, 8(4): 66-70.
  • 2GRUTESER M, GRUNWALD D. Anonymous usage of location-based services through spatial and temporal cloaking[A]. Proceedings of the 1st International Conference on Mobile Systems, Applications and Ser- vices[C]. A Francisco, California, 2003.31-42.
  • 3BAMBA B, LIU L, PESTI P, et al. Supporting anonymous location queries in mobile environments with privacygrid[A]. Proceedings of the 17th International Conference on World Wide Web[C]. Beijing, China, 2008.237-246.
  • 4LIU F, HUA K A, CAI Y. Query l-diversity in location-based ser- vices[A]. Proceedings of the 10th International Conference on Mobile Data Managouent: Systems, Sarvices and Middlcwarc[C]. 2009. 436-442.
  • 5LEE B, OH J, YU H, et al. Protecting location privacy using location semantics[A]. Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining[C]. 2011. 1289-1297.
  • 6KALNIS P, GHINITA G, MOURATIDIS K, et al. Preventing loca- tion-based identity inference in anonymous spatiat queries[J]. IEEE Transactions on Knowledge and Data Engineering, 2007, 19(12): 1719-1733.
  • 7PINGLEY A, YU W, ZHANG N, et al. A context-aware scheme for privacy-preserving location-based services[J]. Computer Networks,2012, 56(11): 2551-2568.
  • 8倪巍伟,郑锦旺,崇志宏.HilAnchor:Location Privacy Protection in the Presence of Users' Preferences[J].Journal of Computer Science & Technology,2012,27(2):413-427. 被引量:4
  • 9CHOW C, MOKBEL M F, LIU X. A peer to peer spatial cloaking algorithm for anonymous location based services[A]. Proceedings of the ACM Symposium on Advances in Geographic Information Sys- terns[C]. Arlington, VA, 2006.171 - 178.
  • 10黄毅,霍峥,孟小峰.CoPrivacy:一种用户协作无匿名区域的位置隐私保护方法[J].计算机学报,2011,34(10):1976-1985. 被引量:82

二级参考文献37

  • 1杨晓春,刘向宇,王斌,于戈.支持多约束的K-匿名化方法[J].软件学报,2006,17(5):1222-1231. 被引量:60
  • 2Mokbel M F. Privacy in location-based services: Start-of- the-art and research directions//Proceedings of the Interna tional Conference on Mobile Data Management ( MDM ' 07). Mannheim, Germany, 2007:228.
  • 3Solanas A, Domingo-Ferrer J, Martinez-Balleste A. Location privacy in location-based services: Beyond TTP-based schemes//Proceedings of the International Workshop on PiLBA. Malaga, Spain, 2008, 397.
  • 4Gruteser M, Grunwal D. Anonymous usage of location-based services through spatial and temporal cloaking//Proeeedings of the International Conference on Mobile Systems, Applications, and Services(MobiSys'03). New York, USA, 2003..163-168.
  • 5Gedik B, Liu L. A customizable k-anonymity model for protecting location privacy//Proceedings of the IEEE Interna tional Con{erence on Distributed Computing Systems (ICDCS'05). Columbus, Ohio, USA, 2005:620-629.
  • 6Mokbel M F, Chow C Y, Aref W G. The new casper: Query processing for location services without compromising privacy//Proceedings of the International Conference on Very Large Data Bases (VLDB'06). New York, USA, 2006: 763-774.
  • 7Xiao Z, Meng X, Xu J. Quality-aware privacy protection for location-based services//Proceedings of the International Conference on Database Systems for Advanced Applications (DASFAA'07). Bangkok, Thailand, 2007: 434 446.
  • 8Gedik B, Liu L. Protecting location privacy with personalized k-anonymity: Architecture and algorithms. IEEE Transac tions on Mobile Computing, 2008, 7(1): 1-18.
  • 9Bamba B, Liu L, Pesti P, Wang T. Supporting anonymous location queries in mobile environments with privaeygrid// Proceedings of the International World Wide Web Conference (WWW'08). Beijing, China, 2008.- 237 246.
  • 10Chow C, Mokbel M F, Liu X. A peer-to-peer spatial cloaking algorithm for anonymous location-based services//Proceedings of the Annual ACM International Symposium on Advances in Geographic Information Systems (GIS'06). Virginia, USA, 2006:171-178.

共引文献109

同被引文献79

  • 1GRUTESER M, GRUNVqALD D. Anonymous usage of loca- tion-based services through spatial and temporal cloaking[A]. Pro- ceedings of the 1st International Conference on Mobile Systems, Ap- plications and Services[C]. 2003.31-42.
  • 2NIU B, LI Q, ZHU X, et al. Achieving k-anonymity in privacy-aware location-based services[A].Proc IEEE INFOCOM[C]. 2014.754-762.
  • 3GHINITA G. Privacy for location-based services[J]. Synthesis Lee- tures on Information Security, Privacy, & Trust, 2013, 4(1): 1-85.
  • 4BAMBA B, LIU L, PESTI P, et al. Supporting anonymous location queries in mobile environments with privacygrid[A]. Proceedings of the 17th International Conference on World Wide Web[C]. 2008. 237-246.
  • 5DONDI R, MAURI G, ZOPPIS I. The l-diversity problem: tractability and approximability[J]. Theoretical Computer Science, 2013, 511: 159-171.
  • 6KIDO H, YANAGISAWA Y, SATOH T. An anonymous communica- tion technique using dummies for location-based services[A]. Perva- sive Services, ICPS'05, Proceedings International Conference[C]. 2005.88-97.
  • 7NIU B, ZHANG Z, LI X, et al. Privacy-area aware dummy generation algorithms for location-based services[A].Commtmications (ICC), 2014 IEEE International Conference[C]. 2014. 957-962.
  • 8HONG J I, LANDAY J A. An architecture for privacy-sensitive ubiquitous computing[A].Proceedings of the 2nd International Conference on Mobile Systems, Applications, and Services[C]. 2004. 177-189.
  • 9YIU M L, JENSEN C S, HUANG X, et al. Spacetwist: managing the txade-offs among location privacy, query performance, and query ac- curacy in mobile services[A].Data Engineering, ICDE 2008, IEEE 24th International Conference[C]. 2008. 366-375.
  • 10HUO Z, MENG X, HU H, et al. You can walk alone: trajectory pri- vacy-preserving through significant stays protection[A]. Database Sys- tems for Advanced Applications[C]. Springer Berlin Heidelberg, 2012. 351-366.

引证文献14

二级引证文献74

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部