期刊文献+

基于随机网格的位置隐私保护方法 被引量:5

Location privacy protection method based on random mesh
下载PDF
导出
摘要 针对当前已有的基于位置服务隐私保护技术在用户较少的情况下很难保障用户隐私保护级别的情况,借鉴网格计算和密码学理论,提出了一种改进的位置隐匿方法。该方法利用随机变化的网格区域,在移动节点之间进行简单位置计算并实时进行用户位置更新,通过移动终端和匿名服务器之间的协同计算完成位置隐匿。最后,通过理论分析阐述了该方法所具有轨迹不可追踪性和身份不可关联性等特点。同时,仿真实验进一步表明该方法的计算复杂度和通信复杂度满足位置服务中的即时通信的要求。 In order to cope with the problem of privacy reduction with the decrease of the number of users in the vicinity, an improved location anonymity method based on the concept of grid computing and theory of cryp- tograph is proposed. In this method, a random mesh is used to generalize the location of the user, and the loca- tion updating is obtained by simple calculation between mobile nodes and the location cloak server, and then lo- cation k-anonymity is realized by the collaborative computing between the mobile terminal and the anonymous server. Finally, a theoretical analysis is proposed to illustrate that the method has the following characteristics: trajectory untraceability and identification unlinkability. At the same time, simulation results show that the computational complexity and communication complexity of the proposed method can meet the requirements of real-time communication in location services.
出处 《系统工程与电子技术》 EI CSCD 北大核心 2018年第2期422-426,共5页 Systems Engineering and Electronics
基金 国家自然科学基金(61472097) 黑龙江省自然科学基金(F2015022) 黑龙江省博士后基金(3236310370) 佳木斯大学骨干人才支持计划项目(JMSURCGG2016-003)资助课题
关键词 隐私保护 基于位置服务 位置匿名 随机网格 privacy protection location-based service location anonymous random mesh
  • 相关文献

参考文献7

二级参考文献136

  • 1潘晓,肖珍,孟小峰.位置隐私研究综述[J].计算机科学与探索,2007,1(3):268-281. 被引量:65
  • 2姜传贤,孙星明,易叶青,杨恒伏.基于JADE算法的数据库公开水印算法的研究[J].系统仿真学报,2006,18(7):1781-1784. 被引量:9
  • 3Mokbel M F. Privacy in location-based services: Start-of- the-art and research directions//Proceedings of the Interna tional Conference on Mobile Data Management ( MDM ' 07). Mannheim, Germany, 2007:228.
  • 4Solanas A, Domingo-Ferrer J, Martinez-Balleste A. Location privacy in location-based services: Beyond TTP-based schemes//Proceedings of the International Workshop on PiLBA. Malaga, Spain, 2008, 397.
  • 5Gruteser M, Grunwal D. Anonymous usage of location-based services through spatial and temporal cloaking//Proeeedings of the International Conference on Mobile Systems, Applications, and Services(MobiSys'03). New York, USA, 2003..163-168.
  • 6Gedik B, Liu L. A customizable k-anonymity model for protecting location privacy//Proceedings of the IEEE Interna tional Con{erence on Distributed Computing Systems (ICDCS'05). Columbus, Ohio, USA, 2005:620-629.
  • 7Mokbel M F, Chow C Y, Aref W G. The new casper: Query processing for location services without compromising privacy//Proceedings of the International Conference on Very Large Data Bases (VLDB'06). New York, USA, 2006: 763-774.
  • 8Xiao Z, Meng X, Xu J. Quality-aware privacy protection for location-based services//Proceedings of the International Conference on Database Systems for Advanced Applications (DASFAA'07). Bangkok, Thailand, 2007: 434 446.
  • 9Gedik B, Liu L. Protecting location privacy with personalized k-anonymity: Architecture and algorithms. IEEE Transac tions on Mobile Computing, 2008, 7(1): 1-18.
  • 10Bamba B, Liu L, Pesti P, Wang T. Supporting anonymous location queries in mobile environments with privaeygrid// Proceedings of the International World Wide Web Conference (WWW'08). Beijing, China, 2008.- 237 246.

共引文献1121

同被引文献109

引证文献5

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部