期刊文献+

基于网格覆盖的社交网络位置数据的保护方法 被引量:3

Novel method based on grid overlap to safeguard social network' location data
下载PDF
导出
摘要 社交网络中用户的位置数据被公开或共享给第三方时,存在潜在的隐私信息泄露的问题。在对该问题研究的基础上,提出了一种新型位置数据隐私保护方法。该方法主要包括动态网格覆盖和基于随机游走的位置再分配两个数据处理阶段。第一阶段将用户真实位置隐匿于加密的网格覆盖区域内,从而有效地保护了真实位置数据;第二阶段则在有效的网格覆盖区域内为用户再分配加密的位置标志坐标,从而增强位置数据的可用性。通过设置匿名成功率、匿名数据可用率、数据处理效率三个评测参数,分别进行了多次模拟对比实验。结果表明,该方法不仅能够在位置数据的隐私保护与可用性两方面之间取得较好的平衡,而且具有较好的位置数据保护处理效率。 There are potential problems of privacy leaks when the location data are disclosed or shared with third parties. On the basis of these problems, this paper proposed a novel privacy preserving method to safeguard location data. It mainly comprised two steps of data processing, dynamic grid overlay and location reassigned strategy based on random walk. The first stage mapped the users' actual location into the encrypted grid area, which effectively protected users' actual location data. The second stage, it rellocated location markup coordinates to users, which enhanced the availability of location data. Simulation experiments had been carried out according to three evaluation parameters, the anonymous success rate, the anonymous data availability rate and the data processing efficiency. The results show that this novel method can get a good balance between the privacy protection and the availability of location data. And furthermore, it has preferable processing efficiency of protecting location data.
出处 《计算机应用研究》 CSCD 北大核心 2016年第7期2157-2161,共5页 Application Research of Computers
基金 国家自然科学基金资助项目(90612003) 山东省自然科学基金资助项目(ZR2013FM008) 济南市高校院所自主创新项目(2010010072)
关键词 动态网格覆盖 社交网络 位置数据 dynamic grid overlap social network location data
  • 相关文献

参考文献15

  • 1Mascetti S,Bettini C,Freni D,et al.Privacy-aware proximity based services[C]//Proc of the 10th International Conference on Mobile Data Management:Systems,Services and Middleware.2009:31-40.
  • 2刘向宇,王斌,杨晓春.社会网络数据发布隐私保护技术综述[J].软件学报,2014,25(3):576-590. 被引量:76
  • 3De Montjoye Y A,Hidalgo C A,Verleysen M,et al.Unique in the crowd:the privacy bounds of human mobility[J].Scientific Reports,2013,3(3):1376.
  • 4Hazas M,Krumm J,Strang T.Location-and context-awareness[C]//Lecture Note in Computer Science.2006:116-133.
  • 5王璐,孟小峰.位置大数据隐私保护研究综述[J].软件学报,2014,25(4):693-712. 被引量:152
  • 6Gedik B,Liu Ling.Protecting location privacy with personalized k-anonymity:architecture and algorithms[J].IEEE Trans on Mobile Computing,2008,7(1):1-18.
  • 7Beresford A R,Stajano F.Location privacy in pervasive computing[J].IEEE Pervasive Computing,2003,2(1):46-55.
  • 8Duri S,Gruteser M,LIU Xuan,et al.Framework for security and privacy in automotive telematics[C]//Proc of the 2nd International Workshop on Mobile Commerce.New York:ACM Press,2002:25-32.
  • 9Gruteser M,Grunwald D.Anonymous usage of location-based services through spatial and temporal cloaking[C]//Proc of the 1st International Conference on Mobile Systems,Applications and Services.New York:ACM Press,2003:31-42.
  • 10Chow C Y,Mokbel M F,Aref W G.Casper*:query processing for location services without compromising privacy[J].ACM Trans on Database Systems,2009,34(4):1-45.

二级参考文献21

  • 1Gruteser M, Grunwald D. Anonymous usage of location-based services through spatial and temporal cloaking//Pro-ceedings of the International Conference on Mobile Systems.Applications, and Services (MobiSys,03). San Fransisco,USA, 2003; 31-42.
  • 2Pan X, Xu J,Meng X. Protecting location privacy againstlocation-dependent attacks in mobile services. IEEE Transac-tions on Knowledge and Data Engineering, 2012, 24 (8):1506-1519.
  • 3Mokbel M F, Chow C Y,Aref W G. The newcasper:Queryprocessing for location services without compromising privacy//Proceedings of the 32nd Conference of Very Large Databases(VLDB 2006). Seoul, 2006:763-774.
  • 4Bamba B,Liu L. Supporting anonymous location queries inmobile environments with privacy grid//Proceedings of the17th International Conference on World Wide Web (WWW2008). Beijing, 2008; 237-246.
  • 5Krumm J. A survey of computational location privacy.Personal and Ubiquitous Computing, 2009,13(6):391-399.
  • 6Huo Z, Meng X, Hu H,Huang Y. You can walk alone:Trajectory privacy-preserving through significant stays pro-tection//Proceedings of the 17th International Conference onDatabase Systems for Advanced Applications (DASFAA,12).Busan, Korea,2012:351-366.
  • 7You T H, Peng W C,Lee W C. Protecting moving trajecto-ries with dummies//Proceedings of the 8th InternationalConference on Mobile Data Management (MDM,07). Mann-heim, Germany, 2007 ; 278-282.
  • 8Terrovitis M, Mamoulis N. Privacy preserving in the publi-cation of trajectories//Proceedings of the 9th InternationalConference on Mobile Data Management (MDM,08). Bei-jing, China, 2008:65-72.
  • 9Gruteser M, Liu X. Protecting privacy in continuous locationtracking applications. IEEE Security and Privacy, 2004,2(2):28-34.
  • 10Abul O,Bonchi F, Nanni M. Never walk alone:Uncertaintyfor anonymity in moving object databases//Proceedings ofthe 24th International Conference on Data Engineering(ICDE’08). Cancun,Mexico,2008 ; 376-385.

共引文献285

同被引文献24

引证文献3

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部