信息网络安全 ›› 2015, Vol. 15 ›› Issue (4): 28-35.doi: 10.3969/j.issn.1671-1122.2015.04.005
王勇, 高诗梦, 聂肖, 张俊浩
收稿日期:
2015-03-13
出版日期:
2015-04-10
发布日期:
2018-07-16
作者简介:
作者简介: 王勇(1976-),男,四川,副教授,博士,主要研究方向:网络信息安全;高诗梦(1991-),女,黑龙江,硕士研究生,主要研究方向:网络信息安全;聂肖(1991-),男,安徽,硕士研究生,主要研究方向:网络信息安全;张俊浩(1992-),男,四川,硕士研究生,主要研究方向:网络信息安全。
基金资助:
Yong WANG, Shi-meng GAO, Xiao NIE, Jun-hao ZHANG
Received:
2015-03-13
Online:
2015-04-10
Published:
2018-07-16
摘要:
随着基于位置服务应用的日益流行,其潜在的用户隐私泄露问题也成为制约其发展的一大挑战。用户位置数据的泄露,可能导致与用户生活相关的活动、住址等隐私信息泄露,隐私问题成为位置服务中人们普遍关注的热门话题。尤其是在连续查询场景下,查询间存在着密切的联系,这就使得用户的隐私面临更大的威胁。针对这一问题,文章提出了一种连续查询下的隐私保护算法,称为基于速度的动态匿名算法(V-DCA)。在匿名处理时,考虑了用户的运动特征和趋势,也就是速度和加速度,并且利用历史匿名集合来产生新的匿名集合,在抵御查询跟踪攻击、保护隐私的同时提供了良好的服务质量。文章设计了一种连续查询隐私保护算法——基于速度的动态匿名算法(V-DCA),将用户的速度、加速度作为匿名条件之一,有效地平衡了隐私和服务质量;为了评价匿名算法,分别从隐私保障、服务质量和匿名时间3个方面提出了多个度量指标;通过在真实地图及相同环境下与其他匿名算法进行比较实验,验证了V-DCA在隐私保障、服务质量和响应时间方面的良好表现。
中图分类号:
王勇, 高诗梦, 聂肖, 张俊浩. 基于速度动态差异的位置服务匿名算法[J]. 信息网络安全, 2015, 15(4): 28-35.
Yong WANG, Shi-meng GAO, Xiao NIE, Jun-hao ZHANG. A LBSs Cloaking Algorithm Based on Velocity Dynamic Variation[J]. Netinfo Security, 2015, 15(4): 28-35.
[1] | GRUTESER M, GRUNWALD D.Anonymous Usage of Location-Based Services through Spatial and Temporal Cloaking[C]//Proceedings of MobiSys 2003: The First International Conference on Mobile Systems, Applications, and Service, USA, 2003. |
[2] | CHOW C Y, MOKBEL M F.Enabling Private Continuous Queries for Revealed User Locations[C]//Proceedings of the 10th international conference on Advances in spatial and temporal databases, Springer-Verlag Berlin, Heidelberg, 2007. |
[3] | XU J, DU J, TANG Xet al. Privacy-Conscious Location-Based Queries in Mobile Environments[J]. IEEE Transactions on Parallel and Distributed Systems, 2010, 21(3): 313-326. |
[4] | PAN X, MENG X, XU J.Protecting Location Privacy against Location-Dependent Attack in Mobile Services[J]. Knowledge and Data Engineering, IEEE Transactions on, 2011, 24(8): 1506-1519. |
[5] | GIS Mapping[EB/OL]. . |
[6] | STENNETH L, YU P S.Global Privacy and Transportation Mode Homogeneity Anonymization in Location Based Mobile Systems with Continuous Queries[C]//Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), 2010 6th International Conference on, Chicago, 2010: 1-10. |
[7] | PAN, MENG X, XU J.Distortion-Based Anonymity for Continuous Queries in Location-Based Mobile Services[C]//Proceedings of the 17th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, New York, 2009. |
[8] | PAN X, XIAO Z, MENG X F.Survey of Location Privacy-Preserving[J]. Journal of Computer Science and Frontiers, 2007, 1(3): 268-281. |
[9] | KIDO H, YANAGISAWA Y, SATOH T.Protection of Location Privacy Using Dummies for Location-Based Services[C]//Data Engineering Workshops, 2005, 21st International Conference on, 2005. |
[10] | MOKBEL M F, CHOW C Y, AREF W G.The New Casper: Query Processing for Location Services without Compromising Privacy[C]//Proceedings of the 32nd international conference on Very large data bases, Korea, 2006. |
[11] | PINGLEY A, ZHANG N, FU X W, et al.Protection of Query Privacy for Continuous Location Based Services[C]//INFOCOM, 2011 Proceedings IEEE, Shanghai, 2011. |
[12] | GEDIK B, LIU L.A Customizable k-Anonymity Model for Protecting Location Privacy[C]//ICDCS 2015: International Conference on Distributed Computing Systems, USA, 2005. |
[13] | GEDIK B, LIU L.Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms[J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 20087, (1): 1-18. |
[14] | LIU F, HUA K A, CAI Y.Query l-diversity in Location-Based Services[C]//Mobile Data Management: Systems, Services and Middleware, 2009. MDM '09. Tenth International Conference on, Taipei, 2009. |
[15] | CHOW C Y, MOKBEL M F, LIU X.A Peer-to-Peer Spatial Cloaking Algorithm for Anonymous Location- Based Services[C]//Proceedings of the 14th annual ACM international symposium on Advances in geographic information systems, USA, 2006. |
[16] | GHINITA G, KALNIS P, SKIADOPOULOS S.PRIVE: Anonymous Location-Based Queries in Distributed Mobile Systems[C]//In WWW ' 07: Proceedings of the 16th International Conference on World Wide Web, Canada, 2007. |
[17] | DURR F, SKVORTSOV P, ROTHEMEL K.Position Sharing for Location Privacy in Non-trusted Systems[C]//Pervasive Computing and Communications (PerCom), 2011 IEEE International Conference on, Seattle, WA, 2011. |
[18] | ZHONG S S, WU Y J, LUO Z, et al.A Two-tie Interaction Approach for Generating Cloaked Region in Location-Based Services[C]//Multimedia Information Networking and Security (MINES), 2011 Third International Conference on, SHANGHAI, 2011. |
[19] | YIU M L, JENSEN C, HUANG X, et al.SpaceTwist: Managing the Trade-Offs Among Location Privacy, Query Performance, and Query Accuracy in Mobile Services[C]//Data Engineering, 2008. ICDE 2008, IEEE 24th International Conference on, Cancun, 2008. |
[20] | XU T, CAI Y.Location Anonymity in Continuous Location Based Services[C]//Proceedings of the 15th annual ACM international symposium on Advances in geographic information systems, USA, 2007. |
[21] | WANG Y, WANG L Y, FUNG B.Preserving Privacy for Location-Based Services with Continuous Queries[C]//Communications, 2009, ICC '09, IEEE International Conference on, Dresden, 2009. |
[22] | SHOKRI R, THEODORAKOPOULOS G, BOUDEC J Y L, et al. Quantifying location privacy[C]//Security and Privacy (SP), 2011 IEEE Symposium on, Berkeley, 2011. |
[23] | SHOKRI R, THEODORAKOPOULOS G, DANEZIS G, et al.Quantifying location privacy: The case of sporadic location exposure[C]// 11th International Symposium, PETS 2011, Canada, 2011. |
[24] | CHEN X H, PANG J.Measuring Query Privacy in Location-Based Services[C]//CODASPY, USA, 2012. |
[25] | Thomas Brinkhoff: Network-based Generator of Moving Objects[EB/OL]. . |
[1] | 唐春明, 林旭慧. 隐私保护集合交集计算协议[J]. 信息网络安全, 2020, 20(1): 9-15. |
[2] | 汪金苗, 王国威, 王梅, 朱瑞瑾. 面向雾计算的隐私保护与访问控制方法[J]. 信息网络安全, 2019, 19(9): 41-45. |
[3] | 郝文江, 林云. 互联网企业社会责任现状与启示研究[J]. 信息网络安全, 2019, 19(9): 130-133. |
[4] | 周权, 许舒美, 杨宁滨. 一种基于ABGS的智能电网隐私保护方案[J]. 信息网络安全, 2019, 19(7): 25-30. |
[5] | 李怡霖, 闫峥, 谢皓萌. 车载自组织网络的隐私保护综述[J]. 信息网络安全, 2019, 19(4): 63-72. |
[6] | 傅彦铭, 李振铎. 基于拉普拉斯机制的差分隐私保护k-means++聚类算法研究[J]. 信息网络安全, 2019, 19(2): 43-52. |
[7] | 赵志岩, 吴剑, 康凯. 一种兼顾业务数据安全的隐私保护世系发布方法[J]. 信息网络安全, 2019, 19(12): 29-37. |
[8] | 胡荣磊, 何艳琼, 曾萍, 范晓红. 一种大数据环境下医疗隐私保护方案设计与实现[J]. 信息网络安全, 2018, 18(9): 48-54. |
[9] | 李佩丽, 徐海霞, 马添军, 穆永恒. 区块链技术在网络互助中的应用及用户隐私保护[J]. 信息网络安全, 2018, 18(9): 60-65. |
[10] | 马蓉, 陈秀华, 刘慧, 熊金波. 移动群智感知中用户隐私度量与隐私保护研究[J]. 信息网络安全, 2018, 18(8): 64-72. |
[11] | 赖成喆, 王文娟. 面向车队的安全且具备隐私保护的移动性管理框架[J]. 信息网络安全, 2018, 18(7): 36-46. |
[12] | 王乐, 杨哲荣, 刘容京, 王祥. 基于属性加密算法的可穿戴设备系统隐私保护方法研究[J]. 信息网络安全, 2018, 18(6): 77-84. |
[13] | 张磊, 王斌, 于莉莉. 基于马尔可夫预测的连续查询隐私保护方法[J]. 信息网络安全, 2018, 18(5): 12-12. |
[14] | 张磊, 王斌, 于莉莉. 基于Hash函数的属性泛化隐私保护方案[J]. 信息网络安全, 2018, 18(3): 14-25. |
[15] | 李梁, 张应辉, 邓恺鑫, 张甜甜. 5G智能电网中具有隐私保护的电力注入系统[J]. 信息网络安全, 2018, 18(12): 87-92. |
阅读次数 | ||||||
全文 |
|
|||||
摘要 |
|
|||||