期刊文献+

基于轨迹聚类的连续查询隐私保护方法 被引量:5

Trajectory-Clustering Based Privacy Protection Method for Continuous Query in LBS
下载PDF
导出
摘要 在LBS连续查询的应用场景下,攻击者易利用查询时间序列、区域位置、移动趋势等背景知识发起有效的攻击,以获取用户的真实位置或轨迹,进而可推断出用户生活习惯等各类隐私信息。针对此,提出了一种基于轨迹聚类的连续查询隐私保护方法。该方法基于邻近用户的信息共享与协作,设计了一种匿名区域构造机制,用户在查询过程中,首先通过被共享缓存获取所需服务结果,如未命中,再向LBS服务器发起查询请求。同时,提出了一种邻近用户位置更新算法,提高用户的协作效率并保证缓存的有效性,对于由命中缓存完成的查询,采用提出的基于密度聚类的兴趣区提取算法,生成高混淆度的假查询扰乱整体查询序列顺序,以此增强轨迹隐私的保护效果。实验结果表明,该方法降低了连续查询中的时间代价,提高了位置混淆程度。 In reality,users usually submit queries continuously to LBS providers,inevitably,some background information,such as time sequence of query,location area,moving trend,is collected and analyzed by the attackers to obtain the real location or trajectory,which will lead to the exposure of user’s habits and other privacy information.In this paper,a trajectory-clustering based privacy protection method is proposed for continuous query application.The core of the method is to design an effective mechanism for constructing anonymous region,on the basis of the collaboration of the neighboring users.During the query process,users firstly retrieve the target results from the shared cache,if it missed,then it launches a query request to the LBS server.Meanwhile,a location updating algorithm for the adjacent users is proposed to improve the collaboration efficiency and guarantee the availability of cache information.Besides,for cache hitting,a region of interest extraction algorithm based on density clustering is utilized to generate fake query with high confusion to disturb the order of the whole query sequence,thereby enhancing the performance of trajectory privacy protection.The experimental results show that the time cost of continuous query is reduced,and the confusion degree is improved at the same time.
作者 吕鑫 赵连成 余记远 谭彬 曾涛 陈娟 LYU Xin;ZHAO Liancheng;YU Jiyuan;TAN Bin;ZENG Tao;CHEN Juan(College of Computer and Information,Hohai University,Nanjing 210098,China;Huaneng Lancang River Hydropower Co.,Ltd.,Kunming 650214,China)
出处 《计算机工程与应用》 CSCD 北大核心 2021年第2期104-112,共9页 Computer Engineering and Applications
基金 国家重点研发计划课题(2018YFC0407105) 河海大学海岸灾害及防护教育部重点实验室开放基金(201905)。
关键词 基于位置的服务(LBS)连续查询 隐私保护 用户协作 轨迹聚类 假查询 Location Based Service(LBS)continuous query privacy protection collaboration trajectory clustering fake query
  • 相关文献

参考文献5

二级参考文献57

  • 1余智欣,黄天戍,杨乃扩,汪阳.一种新型的分布式隐私保护计算模型及其应用[J].西安交通大学学报,2007,41(8):954-958. 被引量:8
  • 2Hong J I,Landay J A.An architecture for privacy-sensitive ubiquitous computing[C] //Proceedings of the 2nd international conference on Mobile systems,applications,and services.New York:ACM,2004:177-189.
  • 3Yiu M L,Jensen C S,Huang X,et al.SpaceTwist Managing the Trade-Offs Among Location Privacy,Query Performance,and Query Accuracy in Mobile Services[C] // IEEE 24th International Conference on Data Engineering.Cancun:ICDE,2008:366-375.
  • 4Gruteser M,Grunwald D.Anonymous Usage of Location-based Services through Spatial and Temporal Cloaking[C] //Proceedings of the 1st international conference on Mobile systems,applications and services.New York:ACM,2003:31-42.
  • 5Chow C Y,Mokbel M F,Aref W G.Casper *:Query processing for location services without compromising privacy[J].ACM Transactions on Database Systems,2009,34 (4):24-48.
  • 6Chow C Y,Mokbel M F.Enabling private continuous queries for revealed user locations[C] //Proceedings of the 10th international conference on Advances in spatial and temporal databases.Berlin Heidelberg:Springer-Verlag,2007:258-273.
  • 7Kalnis P,Ghinita G,Mouratidis K,et al.Preventing LocationBased Identity Inference in Anonymous Spatial Queries[J].IEEE Transactions on Knowledge and Data Engineering,2007,19(12):1719-1733.
  • 8Gedik B,Liu L.Location Privacy in Mobile Systems:A Personalized Anonymization Model[C] // Proceedings of the 25th IEEE International Conference on Distributed Computing Systems.Washington:IEEE,2005:620-629.
  • 9Chow C Y,Mokbel M F,Liu X.A Peer-to-Peer Spatial Cloaking Algorithm for Anonymous Location-based Services[C] //Proceedings of the 14th annual ACM international symposium on Advances in geographic information systems.New York:ACM,2006:171-178.
  • 10Chow C Y,Mokbel M F,Liu X.Spatial Cloaking for Anonymous Location-based Services in Mobile Peer-to-Peer Environment[J].Geoinformatica,2011,15(2):351-380.

共引文献55

同被引文献61

引证文献5

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部