Nothing Special   »   [go: up one dir, main page]

计算机科学 ›› 2015, Vol. 42 ›› Issue (2): 108-113.doi: 10.11896/j.issn.1002-137X.2015.02.023

• 信息安全 • 上一篇    下一篇

基于不可信环境的移动位置隐私保护

刘学军,陈玉凤,李斌   

  1. 南京工业大学电子与信息学院 南京211800,南京工业大学电子与信息学院 南京211800,南京工业大学电子与信息学院 南京211800
  • 出版日期:2018-11-14 发布日期:2018-11-14
  • 基金资助:
    本文受国家自然科学基金(61073197),江苏省科技支撑计划(SBE201077457)资助

Mobile Location Privacy Protection Based on Untrusted Environment

LIU Xue-jun, CHEN Yu-feng and LI Bin   

  • Online:2018-11-14 Published:2018-11-14

摘要: 近年来,随着移动计算和位置设备的发展,位置隐私保护受到学术界的广泛关注,人们提出很多匿名算法来保护用户的隐私信息。但是现有的方法要么不适用于移动环境,要么没有考虑现实不可信环境。针对这些问题提出了基于博弈论的动态规划匿名算法Dynamic_p。此方法是在已有的可解决不可信环境下的位置隐私保护Privacy_1[8]方法基础上提出的,通过将匿名组先组建成匿名树,然后从下到上,子节点与父节点博弈算出锚点。层层递归,最后算出整个匿名组的锚点。用户通过使用锚点代替实际位置来发起位置近邻查询,通过概率统计选出候选位置,最后通过位置计算算出最终的理想位置点。仿真实验表明,此方法在位置匿名方法上有更好的处理效率,并且能应用于移动的不可信环境中。

关键词: 移动计算,位置服务,隐私保护,博弈,动态规划

Abstract: With the development of mobile computing and location equipment technologies,location privacy protection receives extensive attention from academia in recent years.A lot of anonymity algorithm has been put forward to protect users’ privacy information.However,the existing methods is either not suitable for mobile environment,or do not consider the untrusted environment.In light of these problems,this paper put forward Dynamic_p which is dynamic planning anonymity algorithm based on game theory.This method is proposed on the basic of Privacy_1[8] solving the privacy protection in the suspect environment.First it turns anonymous group into anonymous tree,and then child node cooperates with the parent node to calculate the anchor through game from the tree’s bottom to top,finally it calculates the entire anchors of anonymous group through layers of recursive.After that,users initiate location neighbor query through using anchor of anonymous group instead of actual location,then select candidate locations by probability statistics,finally calculate the final ideal location through computation.Simulation results show that this method has better performance,and can be applied to mobile untrusted environment.

Key words: Mobile computing,Location services,Privacy protection,Game,Dynamic planning

[1] Mokbel M F,Chow C Y,Aref W G.The new Casper:Queryprocessing for location services without compromising privacy[C]∥Proc of the 32nd Int Conf on Very Large Data Bases(VLDB).New York:ACM,2006:763-774
[2] Chow C,Mokbel M F.Enabling privacy continuous queries for revealed user locations[C]∥LNCS 4605:Proc of the Int Symp on Advances in Spatial and Temporal Databases(SSTD).Berlin:Springer,2007
[3] Gruteser M,Grunwal D.Anonymous usage of location-basedservices through spatial and temporal cloaking[C]∥Proc of the Int Conf on Mobile Systems,Applications,and Services(MobiSys).New York:ACM,2003:163-168
[4] Xiao Zhen,Xu Jian-liang,Meng Xiao-feng.P-sensitivity:A se-mantic privacy-protection model for location-based services[C]∥Proc of the 2nd Int Workshop on Privacy-Aware Location-Based Mobile Services(PALMS).Piscataway,NJ:IEEE,2008:47-54
[5] 林欣,李善平,杨朝晖.LBS中连续查询攻击算法及匿名性度量[J].软件学报,2009(4):1058-1068
[6] 彭志宇,李善平.移动环境下LBS位置隐私保护[J].电子与信息学报,2011(5):1211-1216 (下转第141页)(上接第113页)
[7] 潘晓,郝兴,孟小峰.基于位置服务中的连续查询隐私保护研究[J].计算机研究与发展,2010,7(1):121-129
[8] 陈玉凤,刘学军,李斌.基于博弈论的用户相互协作的位置隐私保护方法[J].计算机科学,2013,40(10):92-97
[9] 黄毅,霍峥,孟小峰.CoPrivacy:一种用户协作无匿名区域的位置隐私保护方法[J].计算机学报,2011,34(10):1976-1985
[10] 潘晓,肖珍,孟小峰.移动位置隐私保护[J].计算机科学与探索,2007(10):268-281
[11] Bamba B,Liu L.Supporting anonymous location queries in mobile environments with privacy grid[C]∥Proc of Int Conf on World Wide Web(WWW).New York:ACM,2008:237-246
[12] Brinkhoff T.A framework for generating network based moving objects[J].GeoInformatica,2002,6(2):153-180

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!