期刊文献+

基于网格偏移的分散位置隐私保护方法

Scattered Position Privacy Protection Method Based on Reseau Offset
在线阅读 下载PDF
导出
摘要 许多位置隐私保护方法基于可信匿名服务器,但实际生活中匿名服务器并不一定可信而且容易成为攻击者集中攻击的目标。该方法将地图区域划分为网格,用户根据周期更新的网格信息计算偏移网格区域并发送给匿名服务器,匿名服务器根据用户查询请求选择k-1个网格坐标构成匿名集合。方法在保护用户隐私信息的同时,具有较低的时间开销,匿名位置集合的位置分布更分散。在模拟数据集上进行实验,实验结果验证该方法的有效性。 Many location privacy protection methods are based on trusted anonymous servers,but in real life,anonymous servers are not indeed trusted and are easily targeted by attackers.The method divides the map area into a grid,and the user calculates the offset reseau area according to the periodically updated grid information and sends it to the anonymous server.The anonymous server selects k-1 reseau coordinates to form an anonymous set according to the user query request.The method has lower time overhead while protecting the user's private information,and the location distribution of the anonymous location set is more dispersed.Experiments are carried out on the simulated data set, and the experimental results verify the effectiveness of the method.
作者 徐俊仪 XU Jun-yi(School of Computers,Guangdong University of Technology,Guangzhou 510006)
出处 《现代计算机》 2019年第15期32-36,46,共6页 Modern Computer
基金 广东省科技计划项目(No.2017B090906003) 广州市科技计划项目(No.201802010043、201807010058)
关键词 不可信匿名服务器 位置隐私 网格偏移 隐私保护 分散位置 Location Privacy Reseau Offset Privacy Protection Scattered Position
作者简介 徐俊仪(1993-),男,广东梅州人,硕士,研究方向为网络空间安全技术、大数据技术、位置隐私保护技术.
  • 相关文献

参考文献9

二级参考文献73

  • 1姜传贤,孙星明,易叶青,杨恒伏.基于JADE算法的数据库公开水印算法的研究[J].系统仿真学报,2006,18(7):1781-1784. 被引量:9
  • 2Mokbel M F. Privacy in location-based services: Start-of- the-art and research directions//Proceedings of the Interna tional Conference on Mobile Data Management ( MDM ' 07). Mannheim, Germany, 2007:228.
  • 3Solanas A, Domingo-Ferrer J, Martinez-Balleste A. Location privacy in location-based services: Beyond TTP-based schemes//Proceedings of the International Workshop on PiLBA. Malaga, Spain, 2008, 397.
  • 4Gruteser M, Grunwal D. Anonymous usage of location-based services through spatial and temporal cloaking//Proeeedings of the International Conference on Mobile Systems, Applications, and Services(MobiSys'03). New York, USA, 2003..163-168.
  • 5Gedik B, Liu L. A customizable k-anonymity model for protecting location privacy//Proceedings of the IEEE Interna tional Con{erence on Distributed Computing Systems (ICDCS'05). Columbus, Ohio, USA, 2005:620-629.
  • 6Mokbel M F, Chow C Y, Aref W G. The new casper: Query processing for location services without compromising privacy//Proceedings of the International Conference on Very Large Data Bases (VLDB'06). New York, USA, 2006: 763-774.
  • 7Xiao Z, Meng X, Xu J. Quality-aware privacy protection for location-based services//Proceedings of the International Conference on Database Systems for Advanced Applications (DASFAA'07). Bangkok, Thailand, 2007: 434 446.
  • 8Gedik B, Liu L. Protecting location privacy with personalized k-anonymity: Architecture and algorithms. IEEE Transac tions on Mobile Computing, 2008, 7(1): 1-18.
  • 9Bamba B, Liu L, Pesti P, Wang T. Supporting anonymous location queries in mobile environments with privaeygrid// Proceedings of the International World Wide Web Conference (WWW'08). Beijing, China, 2008.- 237 246.
  • 10Chow C, Mokbel M F, Liu X. A peer-to-peer spatial cloaking algorithm for anonymous location-based services//Proceedings of the Annual ACM International Symposium on Advances in Geographic Information Systems (GIS'06). Virginia, USA, 2006:171-178.

共引文献983

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部