信息网络安全 ›› 2015, Vol. 15 ›› Issue (10): 24-31.doi: 10.3969/j.issn.1671-1122.2015.10.004

• 技术研究 • 上一篇    下一篇

位置轨迹隐私保护综述

马春光1, 张磊1,2, 杨松涛1,3   

  1. 1.哈尔滨工程大学计算科学与技术学院,黑龙江哈尔滨 150001
    2.佳木斯大学教务处,黑龙江佳木斯 154007
    3.佳木斯大学信息电子技术学院,黑龙江佳木斯 154007
  • 收稿日期:2015-09-07 出版日期:2015-10-01 发布日期:2015-11-04
  • 作者简介:

    作者简介: 马春光(1974-),男,黑龙江,教授,博士,主要研究方向:网络安全;张磊(1982-),男,黑龙江,助理研究员,博士研究生,主要研究方向:隐私保护;杨松涛(1972-),男,黑龙江,副教授,博士,主要研究方向:隐私保护。

  • 基金资助:
    国家自然科学基金[61472097];黑龙江省自然科学基金[F2015022];高等学校博士学科点专项科研基金(博导类)[20132304110017]

Review on Location Trajectory Privacy Protection

MA Chun-guang1, ZHANG Lei1,2, YANG Song-tao1,3   

  1. 1. College of Computer Science and Technology, Harbin Engineering University, Harbin Heilongjiang 150001, China
    2. Office of Academic Affairs, Jiamusi University, Jiamusi Heilongjiang 154007, China
    3. College of Information Science and Electronic Technology, Jiamusi University, Jiamusi Heilongjiang 154007, China
  • Received:2015-09-07 Online:2015-10-01 Published:2015-11-04

摘要:

基于位置服务在为用户的日常生活带来极大便利的同时,又不可避免地导致一定程度上用户隐私信息的泄露。在隐私泄露问题上,当前较为关注的是用户在使用位置服务时位置隐私的泄露。大量的位置数据存在着相互关联进而有形成位置轨迹的可能,而位置轨迹数据含有比单纯的位置数据更为丰富的时空关联,这些关联使得攻击者更容易获取用户的隐私信息。针对这一问题,研究者们提出了大量针对位置轨迹数据的隐私保护方法。在众多的位置轨迹隐私保护方法中,如何找到同类方法,有针对性地进行位置轨迹隐私保护研究成为研究者不得不面对的问题。文章在借鉴已有分类方法的基础上,针对近年来提出的和由原有算法改进而来的位置轨迹隐私保护算法,基于攻击者所掌握的背景知识,从位置轨迹追踪和位置轨迹重构两种攻击方法的角度对这些算法加以分类,总结并分析其优缺点。最后,文章针对当前潜在的数据挖掘攻击技术,提出了研究展望。

关键词: 位置轨迹, 隐私保护, 轨迹追踪, 轨迹重构

Abstract:

Location based service brings great convenience for users in daily life, but at the same time it inevitably leads to a certain degree of users’ private information exposure. On issues of privacy, the focus of current research is protection of users’ location privacy. Due to the relationships between locations, scattered locations could be constituted into location trajectory, and that location trajectory contains more spatio-temporal correlations, with comparison of solo location. The attacker could be more accessible to user’s privacy with the help of these correlations. In order to solve this problem, researchers put forward a lot of methods to protect the location trajectory privacy. But how to find the similar methods for study or imitation has puzzled the researcher, because there is no specific classification. In this article, based on the attack techniques of location trajectory tracking and reconstruction, we propose a new classification. With this classification, we analyze these protection methods and summarize the advantages and disadvantages of them. Finally, we put forward in the research prospects for the potential attacks of data mining technology.

Key words: location trajectory, privacy protection, trajectory tracking, trajectory reconstruction

中图分类号: