期刊文献+

划分子匿名区域的k-匿名位置隐私保护方法 被引量:4

A-anonymous Algorithm in Location Privacy Protection Based on Divide Sub Clocking Region
下载PDF
导出
摘要 随着移动计算技术和无线设备的蓬勃发展,位置服务中的隐私保护成为了研究热点。传统的K-匿名方法存在查询结果不精确的缺点,尤其是在用户稀少的场景下,将产生较大的匿名区域,从而增大通信开销。为了平衡服务质量和隐私保护之间的矛盾,依据将匿名区域分裂成几个分散的子匿名区域,提出一种新的划分子匿名区域的方法,该方法将不产生连续的匿名区域而是直接划分出n个子匿名区域,并随机选择一个子匿名区域代替真实用户的位置向LBS服务器发起查询。实验结果表明,该方法能更加有效地保护用户的隐私,并且能够提高服务质量,减少通信开支。 With the vigorous development of the mobile computing and wireless devices, privacy protection has become a research hotspot in the location service. There is a shortcoming of inaccurate query result for the traditional K-anonymous algorithm, especially in the scarce scenarios, which will produce a larger anonymous area and increase communication costs. In order to balance the contradiction between the quality service and privacy protection, a new method that dividing sub anonymous area is proposed according to dividing the anonymous area into a few scattered ones. This method will not produce continuous anonymous area but divide into n sub anonymous areas directly and choose one sub anonymous area which will take place of the user's real location at random to make a query to the LBS service.The experimental results show that the method can more effectively protect the user's privacy, improve the quality service and reduce the communication costs.
出处 《信息安全与技术》 2014年第10期33-37,共5页
关键词 位置服务 隐私保护 K-匿名 服务质量 匿名区域 location-based service privacy protection k-anonymity service quality cloaking region
  • 相关文献

参考文献2

二级参考文献24

  • 1MOKBEL M F, CHOW Chi-Yin, AREF W G. The new Casper: query processing for location services without compromising privacy [ C ]// Proceedings of the 32nd In- ternational Conference on Very Large Data Bases( VLDB' 06). New York:ACM Press, 2006: 763-774.
  • 2CHOW Chi-Yin, MOKBEL M F. Enabling private con- tinuous queries for revealed user locationsE C]//Proceed- ings of the 10th International Conference on Advances in Spatial And Temporal Databases ( SSTD ' 07 ). Berlin, Heidelberg : Springer-Verlag, 2007 : 258-275.
  • 3GRUTESER M, GRUNWALD D. Anonymous usage of location-based services through spatial and temporal cloa- king [ C ]// Proceedings of the 1 st International Confer- ence on Mobile Systems, Applications And Services. New York:ACM Press, 2003 : 31-42.
  • 4KALNIS P, GHINITA G, MOURATIDIS K, et al. Pre- venting location-based identity inference in anonymous spatial queries [ J]. IEEE Transaction on Knowledge and Data Engineering, 2007, 19 (12) : 1719-1733.
  • 5TALUKDER N, AHAMED S I. Preventing multi-query attack in location-based services [ C ]// Proceedings of the 3rd ACM Conference on Wireless Network Security. New York: ACM Press, 2010: 25-36.
  • 6HOH B, GRUTESER M, XIONG H, et al. Preserving privacy in gps traces via uncertainty-aware path cloaking [ C]// Proceedings of the 14th ACM Conference on Computer and Communications Security. New York: ACM Press, 2007: 161-171.
  • 7SAMARATI P. Protecting respondents identities in micro- data release[J]. IEEE Transactions on Knowledge and Data Engineering, 2001, 13 ( 6 ) : 1010 - 1027.
  • 8SAMARATI P, SWEENEY L. Generalizing data to pro- vide anonymity when disclosing information (abstract) [ C]// Proceedings of the 17th ACM SIGACT-SIGMOD- SIGART Symposium on Principles of Database Systems. New York:ACM Press, 1998: 188.
  • 9BAMBA B, LIU Ling, PESTI P, et al. Supporting anon- ymous location queries in mobile environments with priva- cygrid[ C ]// Proceedings of the 17th International Con- ference on World Wide Web. New York: ACM Press, 2008 : 237-246.
  • 10LIU Fuyu, HUA K A, CAI Ying. Query 1-diversity in location-based services [ C ]// Proceedings of 10th Inter- national Conference on Mobile Data Management: Sys- tems, Services and Middleware ( MDM' 09 ). Washing- ton-IEEE Computer Society, 2009: 436-442.

共引文献64

同被引文献21

引证文献4

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部