浏览全部资源
扫码关注微信
哈尔滨工业大学 计算机网络与信息安全技术研究中心,黑龙江 哈尔滨 150001
[ "王宇航(1987-),男,黑龙江哈尔滨人,哈尔滨工业大学博士生,主要研究方向为移动互联网和信息安全。" ]
[ "张宏莉(1973-),女,吉林榆树人,哈尔滨工业大学教授、博士生导师,主要研究方向为网络与信息安全、网络测量与建模、网络计算、并行处理等。" ]
[ "余翔湛(1973-),男,黑龙江哈尔滨人,哈尔滨工业大学教授,主要研究方向为网络容灾和信息安全。" ]
网络出版日期:2015-09,
纸质出版日期:2015-09-25
移动端阅览
王宇航, 张宏莉, 余翔湛. 移动互联网中的位置隐私保护研究[J]. 通信学报, 2015,36(9):230-243.
Yu-hang WANG, Hong-li ZHANG, Xiang-zhan YU. Research on location privacy in mobile internet[J]. Journal on communications, 2015, 36(9): 230-243.
王宇航, 张宏莉, 余翔湛. 移动互联网中的位置隐私保护研究[J]. 通信学报, 2015,36(9):230-243. DOI: 10.11959/j.issn.1000-436x.2015167.
Yu-hang WANG, Hong-li ZHANG, Xiang-zhan YU. Research on location privacy in mobile internet[J]. Journal on communications, 2015, 36(9): 230-243. DOI: 10.11959/j.issn.1000-436x.2015167.
全面归纳了移动互联网中位置隐私保护的相关研究工作,总结了位置服务和定位服务中的威胁模型。然后,详细介绍了现有基于位置服务的隐私保护技术,分析了其在抗隐私攻击和位置隐私适用性方面的优缺点,并阐述了定位服务中位置隐私问题的本质、威胁和解决方法。最后指出了需要进一步研究的问题。
The related researches on location privacy in mobile internet were surveyed comprehensively
dissertate sepa-rately from the perspective of LBS(location-based services) and location service.First the privacy protection approaches for LBS were detailed
their features in the view of privacy attacks and LBS applicability were researched.Then the es-sence and research boundary of location privacy in location service were demonstrated
its related research progress and policies were introduced.The future research directions are provided in the end.
KIM H , KIM J , LEE Y , et al . An empirical study of the use contexts and usability problems in mobile Internet [A ] . Proceedings of the 35th Hawaii International Conference on System Sciences (HICSS 2002) [C ] . Hawaii , 2002 .
Internet trends 2014 [EB/OL ] . http://www.kpcb.com/internet-trends http://www.kpcb.com/internet-trends , 2014 .
The Unital States' global surveillance recond [EB/OL ] . http://news.xinhuanet.com/201-4-05/26/c_1110865223.htm http://news.xinhuanet.com/201-4-05/26/c_1110865223.htm , 2014 .
DAMIANI M L , CUIJPERS C . Privacy challenges in third-party location services [A ] . IEEE 14th International Conference on Mobile Data Management(MDM 2013) [C ] . Milan,Italy , 2013 .
DUCKHAM M , KULIK L . Location Privacy and Location-Aware Computing [M ] . FL:CRC Press , 2006 .
周傲英 , 杨彬 , 金澈清 , 等 . 基于位置的服务:架构与进展 [J ] . 计算机学报 2011 , 34 ( 7 ): 1155 - 1171 .
ZHOU A Y , YANG B , JIN C Q , et al . Location-based services:archi-tecture and progress [J ] . Chinese Journal of Computers , 2011 , 34 ( 7 ): 1155 - 1171 .
KIDO H , YANAGISAWA Y , SATOH T . An anonymous communica-tion technique using dummies for location-based services [A ] . Pro-ceedings of the International Conference on Pervasive Services(ICPS 2005) [C ] . Santorini,Greece , 2005 . 88 - 97 .
SHANKAR P , GANAPATHY V , IFTODE L . Privately querying location-based services with sybilQuery [A ] . Proceedings of the 11th Inter-national Conference on Ubiquitous Computing(UBICOMP 2009) [C ] . 2009 . 31 - 40 .
HONG J I , LANDAY J A . An architecture for privacy-sensitive ubiq-uitous computing [A ] . Proceedings of the 2nd International Conference on Mobile Systems,Applications,and Services(MOBISYS 2004) [C ] . Boston,Massachusetts,USA , 2004 . 177 - 189 .
ARDAGNA C A , CREMONINI M , DAMIANI E . Location privacy protection through obfuscation-based techniques [A ] . Proceedings of the 21st Annual IFIP WG 11.3 Working Conference on Data and Ap-plications Security [C ] . 2007 . 47 - 60 .
DUCKHAM M , KULIK L . A formal model of obfuscation and nego-tiation for location privacy [A ] . Proceedings of the 3rd International Conference on Pervasive Computing(PERVASIVE 2005) [C ] . Munich,Germany , 2005 . 152 - 170 .
HU H B , XU J L . 2PASS bandwidth-optimized location cloaking for anonymous location-based services [J ] . IEEE Transactions on Parallel and Distributed Systems , 2010 , 21 ( 10 ): 1458 - 1472 .
GRUTESER M , GRUNWALD D . Anonymous usage of loca-tion-based services through spatial and temporal cloaking [A ] . Pro-ceedings of the 1st International Conference on Mobile Systems,Ap-plications and Services (MOBISYS 2003) [C ] . San Francisco,Califor-nia , 2003 . 31 - 42 .
MOKBEL M F , CHOW C Y , AREF W G . The new casper:query processing for location services without compromising privacy [A ] . International Conference on Very Large Data Bases (VLDB 2006) [C ] . Seoul,South Korea , 2006 . 763 - 774 .
GEDIK B , LIU L . Location privacy in mobile systems:a personalized anonymization model [A ] . Proceedings of the 25th IEEE International Conference on Distributed Computing Systems (ICDCS 2005) [C ] . Columbus,OH,USA , 2005 . 620 - 629 .
ZHANG C Y , HUANG Y . Cloaking locations for anonymous location based services:a hybrid approach [J ] . Geoinformatica , 2009 , 13 ( 2 ): 159 - 182 .
PAN X , MENG X F , XU J L . Distortion-based anonymity for continu-ous queries in location-based mobile services [A ] . Proceedings of the ACM SIGSPATIAL International Conference on Advances in Ge-ographic Information Systems(GIS 2009) [C ] . Seattle,Washington , 2009 . 256 - 265 .
BERESFORD A R , STAJANO F . Location privacy in pervasive com-puting [J ] . IEEE Pervasive Computing , 2003 , 2 ( 1 ): 46 - 55 .
BERESFORD A R , STAJANO F . Mix zones:user privacy in loca-tion-aware services [A ] . Proceedings of the 2nd IEEE Annual Confer-ence on Pervasive Computing and Communications Workshops [C ] . 2004 . 127 - 131 .
PALANISAMYB , LIU L . MobiMix:protecting location privacy with mix-zones over road networks [A ] . IEEE 27th International Conference on Data Engineering (ICDE 2011) [C ] . 2011 . 494 - 505 .
JANG M Y , CHANG J W . A new cloaking method based on weighted adjacency graph for preserving user location privacy in LBS [J ] . Com-puter Science and its Applications , 2012 , 203 : 129 - 138 .
GHINITA G , KALNIS P , SKIADOPOULOS S . Mobihide:a mobile peer to peer system for anonymous location-based queries [A ] . Pro-ceedings of the 10th International Conference on Advances in Spatial and Temporal Databases (SSTD 2007) [C ] . Boston,MA,USA , 2007 . 221 - 238 .
WERNKE M , SKVORTSOV P , DURR F , et al . A classification of location privacy attacks and approaches [J ] . Personal and Ubiquitous Computing , 2012 , 18 ( 1 ): 163 - 175 .
CHOW C Y , MOKBEL M F . Trajectory privacy in location-based services and data publication [J ] . SIGKDD Explorations , 2011 , 13 ( 1 ): 19 - 29 .
MASCETTI S , FRENI D , BETTINI C , et al . Privacy in geo-social networks:proximity notification with untrusted service providers and curious buddies [J ] . The VLDB Journal , 2011 , 20 ( 4 ): 541 - 566 .
LI X Y , JUNG T . Search me if you can:privacy-preserving location query service [A ] . Proceedings of the INFOCOM 2013 [C ] . Turin,Italy , 2013 . 2760 - 2768 .
MARIAS G F , DELAKOURIDIS C , KAZATZOPOULOS L , et al . Location privacy through secret sharing techniques [A ] . Sixth IEEE In-ternational Symposium on a World of Wireless Mobile and Multimedia Networks(WOWMOM 2005) [C ] . Taormina,Italy , 2005 . 614 - 620 .
WERNKE M , DURR F , ROTHERMEL K . PShare:position sharing for location privacy based on multi-secret sharing [A ] . Proceedings of the 10th IEEE International Conference on Pervasive Computing and Com-munications (PERCOM 2012) [C ] . Lugano,Switzerland , 2012 . 153 - 161 .
KRUMM J . Inference attacks on location tracks [A ] . Proceedings of the 5th International Conference on Pervasive Computing (PERVA-SIVE 2007) [C ] . Toronto,Canada , 2007 . 127 - 143 .
GHINITA G , DAMIANI M L , SILVESTRI C , et al . Preventing veloc-ity-based linkage attacks in location-aware applications [A ] . Pro-ceedings of the 17th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems (GIS 2009) [C ] . Seattle,Washington,USA , 2009 . 246 - 255 .
MOKBEL M F . Privacy in location-based services:state of the art and research directions [A ] . Proceedings of the 8th International Confer-ence on Mobile Data Management(MDM 2007) [C ] . Mannheim,Ger-many , 2007 . 228 .
MACHANAVAJJHALA A , KIFER D , GEHRKE J , et al . L-diversity:privacy beyond k-anonymity [J ] . ACM Transactions on Knowledge Discovery from Data , 2007 , 1 ( 1 ): 3 .
TSAI J Y , KELLEY P G , CRANOR L F , et al . Location-sharing tech-nologies:privacy risks and controls [A ] . TPRC 2009 [C ] . 2009 .
Location API [EB/OL ] . http://developer.android.com/google/play-se-rvices/location.html http://developer.android.com/google/play-se-rvices/location.html .
Privacy policiey [EB/OL ] . http://www.google.com/intl/en/policies/pr-ivacy/#infosecurity http://www.google.com/intl/en/policies/pr-ivacy/#infosecurity .
LAMARCA A , HIGHTOWER J , SMITH I , et al . Self-mapping in 802.11 location systems [A ] . Proceedings of the 7th International Con-ference on Ubiqutous Computing(UBICOMP 2005) [C ] . Tokyo,Japan , 2005 . 87 - 104 .
LATEGAHN J , KUENEMUND F , ROEHRIG C . Mobile robot local-ization using WLAN,odometry and gyroscope data [J ] . International Journal of Computing , 2010 , 9 ( 1 ): 22 - 30 .
FICCO M , PALMIERI F , CASTIGLIONE A . Hybrid indoor and outdoor location services for new generation mobile terminals [J ] . Per-sonal and Ubiquitous Computing , 2014 , 18 ( 2 ): 271 - 285 .
KUHN M G . An asymmetric security mechanism for navigation sig-nals [A ] . Proceedings of the 6th International Conference on Informa-tion Hiding(IH 2004) [C ] . Toronto,Canada , 2004 . 239 - 252 .
TIPPENHAUER N O , RASMUSSEN K B , POPPER C , et al . Attacks on public WLAN-based positioning systems [A ] . Proceedings of the 7th International Conference on Mobile Systems,Applications,and Services(MOBISYS 2009) [C ] . Kraków,Poland , 2009 . 29 - 40 .
Android location SDK [EB/OL ] . http://developer.baidu.com/map/geosd-k.htm http://developer.baidu.com/map/geosd-k.htm .
Configure access points with google location services [EB/OL ] . https://support.google.com/maps https://support.google.com/maps .
PENG Z T , KAJI K , KAWAGUCHI N . Privacy protection in WiFi-based location estimation [A ] . Seventh International Conference on Mobile Computing and Ubiquitous Networking(ICMU 2014) [C ] . Singapore , 2014 . 62 - 67 .
王璐 , 孟小峰 . 位置大数据隐私保护研究综述 [J ] . 软件学报 2014 , 25 ( 4 ): 693 - 712 .
WANG L , MENG X F . Location privacy preservation in big data era:a survey [J ] . Journal of Software , 2014 , 25 ( 4 ): 693 - 712 .
GHINITA G , KALNIS P , KHOSHGOZARAN A , et al . Private queries in location based services:anonymizers are not necessary [A ] . Proceedings of the ACM SIGMOD International Conference on Management of Data (SIGMOD 2008) [C ] . Vancouver,Canada , 2008 . 121 - 132 .
WANG H , WANG Z Y , SHEN G B , et al . Wheelloc:enabling con-tinuous location service on mobile phone for outdoor scenarios [A ] . Proceedings of the INFOCOM 2013 [C ] . Turin,Italy , 2013 . 2733 - 2741 .
About POLS [EB/OL ] . http://pols.sourceforge.net/ http://pols.sourceforge.net/ .
LI B H , QUADER I J , DEMPSTER A G . On outdoor positioning with WiFi [J ] . Journal of Global Positioning Systems , 2008 , 7 ( 1 ): 18 - 26 .
0
浏览量
1107
下载量
1
CSCD
关联资源
相关文章
相关作者
相关机构