期刊文献+

ARBA:基于分解重构技术的LBS隐私保护方法 被引量:2

A novel anonymization method based on anatomy and reconstruction in LBS privacy preservation
下载PDF
导出
摘要 现有的匿名化方法多采用时空伪装技术,该技术计算负担重,LBS响应延迟时间长,导致LBS服务质量低.为此,提出了分解重构的匿名化方法,该方法首先对接收到的LBS查询集进行分组,形成满足匿名模型的等价类,然后对每个等价类根据不同的策略进行分解和重构,生成新的匿名查询集.此外,面向多种隐私需求,提出了一系列匿名模型,并进一步提出了基于分解重构技术的匿名模型的实现算法MBFAA.实验表明,提出的重构分解技术可以有效地实现各种匿名模型. Most of the existing methods are realized by temporal and spatial cloaking techniques .However , these cloaking-based methods are disadvantageous due to their high computation loads and long response delays ,which lowers service quality . To address these problems , a novel technique , anatomy and reconstruction ,was proposed .This technique first partitions the LBS query set into several equivalence classes , making sure that each equivalence class satisfies the given anonymity constraints . T hen it reconstructs the LBS queries in each equivalence class according to the predefined strategies separately , and generates a new set of anonymous queries .Considering various privacy requirements ,a series of anonymity models were proposed , and a unified anonymization algorithm MBFAA was introduced to realize these models . Experimental results show that the proposed method can effectively implement all the anonymity models .
出处 《中国科学技术大学学报》 CAS CSCD 北大核心 2014年第7期544-553,562,共11页 JUSTC
基金 国家基金项目(61170108 6110019) 浙江省自然科学基金(Y1100161 LQ13F020007)资助
关键词 K-匿名 位置 l-多样性 查询 m-多样性 分解重构 k-anonymity location l-diversity query m-diversity anatomy and reconstruction
  • 相关文献

参考文献20

  • 1Yankee Group, eMarketer. ISACA: LBS services use increases, but privacy concerns remain [EB/OL]. http,l Iwww.199it.com/archives/5I80l. html.
  • 2Sythoff J T, Morrison J. Location-Based Services Market Forecast 2011-2015 [M]. Brazil: Pyramid Research Publisher, 2011.
  • 3Marist Poll. Marist Institute for Public Opinion (MIPO): Half of social networks online concerned about privacy [EE/OL]. http://maristpoll. marist. edu/ 714- hal£-ofsocial-networkers-online-concemed-about-privacy I.
  • 4Shin KG, Ju X E, Chen Z G, et al. Privacy protection for users of location-based services wireless communications [n IEEE Wireless Communications, 2012, 19(1): 30-39.
  • 5Gruteser M, Grunwald D. Anonymous usage of location-based services through spatial and temporal cloaking [C]/ I Proceedings of the 1 st International Conference on Mobile systems, Applications and Services. ACM Press, 2003: 31-42.
  • 6Gedik B, Liu L. Location privacy in mobile systems: A personalized anonymization model[C]/ / Proceedings of the 25th International Conference on Distributed Computing Systems. Columbus, USA: IEEE Press, 2005, 620-629.
  • 7Kalnis p, Ghinita G, Mouratidis K, et al. Preventing location-based identity inference in anonymous spatial queries[J]. IEEE Transactions on Knowledge and Data Engineering, 2007, 19(12): 1 719-1 733.
  • 8Gkoulalas-Divanis A, Kalnis p, Verykios V S. Providing k-anonymity in location based services[J]. ACM SIGKDD Explorations Newsl.etter, 2010, 12(1): 3-10.
  • 9Bettini C, Wang X S, Iajodia S. Protecting privacy against location-based personal identification [C]/ / Proceedings of the 2nd VLDB Workshop. Trondheim, Norway: Springer, 2005: 185-199.
  • 10Gkoulalas-Divanis A. Verykios V S. Mokbel M F. Identifying unsafe routes for network-based trajectory privacy[C]/ / Proceedings of the SIAM International Conference on Data Mining. Sparks, USA: SIAM Press. 2009: 942-953.

二级参考文献28

  • 1潘晓,肖珍,孟小峰.位置隐私研究综述[J].计算机科学与探索,2007,1(3):268-281. 被引量:65
  • 2杨晓春,刘向宇,王斌,于戈.支持多约束的K-匿名化方法[J].软件学报,2006,17(5):1222-1231. 被引量:60
  • 3Mokbel M F, Chow C Y, Aref W G. The new Casper: Query processing for location services without compromising privacy [C] //Proc of the 32nd Int Conf on Very Large Data Bases (VLDB). New York: ACM, 2006:763-774.
  • 4Chow C, Mokbel M F. Enabling privacy continuous queries for revealed user locations [C]//LNCS 4605 : Proc of the Int Syrup on Advances in Spatial and Temporal Databases (SSTD). Berlin: Springer, 2007.
  • 5Gruteser M, Grunwal D. Anonymous usage of location-based services through spatial and temporal cloaking [C] //Proe of the Int Conf on Mobile Systems, Applications, and Services (MobiSys). New York: ACM, 2003:163-168.
  • 6Xiao Zhen, Xu Jianliang, Meng Xiaofeng. P-sensitivity: A semantic privacy-protection model for location-based services [C] //Proc of the 2nd Int Workshop on PriVacy-Aware Location-Based Mobile Services(PALMS). Piscataway, NJ: IEEE, 2008:47-54.
  • 7Bamba B, Liu L. Supporting anonymous location queries in mobile environments with privacy grid [C] //Proc of Int Conf on World Wide Web (WWW). New York: ACM, 2008: 237-246.
  • 8Kido H, Yanagisawa Y, Satoh T. Protection of location privacy using dummies for location-based services [C]//Proc of the 26th Int Conf on the Physics of Semiconductors (ICPS). Piseataway, NJ: IEEE, 2005: 1248-1248.
  • 9Ghinita G, Kalnis P, Khoshgozaran A, et al. Private queries in location based services: Anonymizers are not necessary [C] //Proe of ACM SIGMOD 2008. New York: ACM, 2008.
  • 10Xu T, Cai Y. Location anonymity in continuous location based services [C]//Proc of Int Symp on Advances in Geographic Information Systems(GIS). New York: ACM, 2007.

共引文献123

同被引文献41

  • 1蒋廉雄,卢泰宏.形象创造价值吗?——服务品牌形象对顾客价值—满意—忠诚关系的影响[J].管理世界,2006,22(4):106-114. 被引量:75
  • 2Schmidt- Belz B, l.aamanen H, Poslad S, et al. Location- based mobile tourist services: first user experiences [ C]. ENTER 2003: lOth International Conference on Information Technology in Travel & Tourism, 2003.
  • 3Chow C Y, Mokbel M F, Liu X. A peer - to - peer spatial cloaking algorithm for anonymous location - based service [ C ] //Proceedings of the 14th annual ACM international symposium on Advances in geograph- ic information systems. ACM, 2006:171 - 178.
  • 4Chu T H, Lin M L, Chang C H, et al. Developing a tour guiding in- fommfion system for tourism servi eeusing mobile GIS and GPS tech- niques [J]. Advances in Information Sciences and Service Sciences, 2011, 3 (6): 49-58.
  • 5Dhar S, Varshney U. Challenges and business models for mobile loca- tion- based services and advertising [ J ]. Communications of the ACM, 2011, 54 (5): 121-128.
  • 6Stutzer A, Frey B S. Recent advances in the economics of individual subjective well-being [J]. Social Research, 2010: 679-714.
  • 7Lee G, Lee W J. Psychological Reactance to Online Re~xrmaendation Sexvices[J]. Information and IVlanag~aent, 2009(8).
  • 8Daeoffe R H. How Consumers Assess the Value of Advertising~J]. Journal of Current Issues ~ Research in Advertising, 1995, 17(1).
  • 9Cronin J J, Brady M K, Hult G T M. Assessing the Effects of Quality, Value, and Customer Satisfaction on ConsumerBehavioral Intentions in Service Envimnmentsl-J-I. Journal of Retailing, 2000,76(2).
  • 10Zeithaml V A. Consumer Perceptions of Price, Quality, and Value: A Means-end lk'bdel and Synthesis of Evidence~-]. The Journal of Marketing, 1988,52(3).

引证文献2

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部