信息网络安全 ›› 2015, Vol. 15 ›› Issue (1): 39-44.doi: 10.3969/j.issn.1671-1122.2015.01.007

• 技术研究 • 上一篇    下一篇

基于连续位置服务请求的位置匿名方法的研究

武艳娜1(), 赵泽茂2   

  1. 1. 杭州电子科技大学通信工程学院,浙江杭州310008
    2. 丽水学院工学院,浙江丽水 323000
  • 收稿日期:2014-12-16 出版日期:2015-01-10 发布日期:2015-07-05
  • 作者简介:

    作者简介: 武艳娜(1987-),女,河南,硕士研究生,主要研究方向:信息安全与密码学;赵泽茂(1965-),男,四川,教授,博士,主要研究方向:信息安全与密码学。

  • 基金资助:
    浙江省自然科学基金[Y1100818]

Research on Location Anonymity Method Based on Continuous Location Services Requests

WU Yan-na1(), ZHAO Ze-mao2   

  1. 1. Department of Communication Engineering, Hangzhou Dianzi University, Hangzhou Zhejiang 310008, China
    2. School of Engineering, Lishui University, Lishui Zhejiang 323000, China
  • Received:2014-12-16 Online:2015-01-10 Published:2015-07-05

摘要:

随着无线技术和移动定位技术的蓬勃发展,出现了一种新的研究领域——基于位置的服务(location-based service, LBS)。用户在享受此类服务的时候不得不把自己的精确位置发送给服务提供商,使得用户可能面临位置隐私泄露的危险。位置k-匿名是最常见的位置隐私保护技术之一,通过将用户的精确位置泛化为一个具有k-匿名性质的区域来达到隐私保护的目的。但是在移动用户连续不断发出位置服务请求的场景下,攻击者能够根据用户的历史请求之间的关系推测出用户的隐私。此种状况下,传统的孤立查询的k-匿名模型失效。文章提出了一种更加优化的k-匿名模型, 在满足用户指定匿名度的前提下,利用活动区域内用户的历史位置分布情况寻找出现次数最多且位置分布最密集的k-1个用户组成共同匿名集。实验结果表明,该方法在保证用户要求匿名度的前提下能够有效降低共同匿名区域的面积。

关键词: 基于位置的服务, k-匿名, 历史位置, 活动区域, 共同匿名集

Abstract:

With the vigorous development of the wireless technology and mobile localization technology, a new research field, location-based service (LBS), is opened up. When users are enjoying this kind of service, they will have to send their precise position information to service providers. In other words, they may face the risk of location privacies let out. Location k- anonymity is one of the most common location privacy protection technologies, which achieves the purpose of privacy protection by generalizing the user’s precise position information to be an area with k-anonymity nature. But when the moving user keeps delivering queries of location-based service, the attacker can infer the user’s privacy information according to the user’s history requests. Thus the traditional isolated k- anonymity model is failed. On the premise of meeting the user’s prescribed anonymous degree requirement, this paper puts forward an optimized k-anonymity model, which can use the user’s historical position information in the active region to look for k-1 users who appear most frequently and have the densest position distribution to constitute the common anonymities set. The experimental result shows that the method can effectively reduce the area of the common anonymous region on the premise of guaranteeing the user’s prescribed anonymous degree.

Key words: location-based service, k-anonymity, historical position, active region, common anonymities set

中图分类号: