浏览全部资源
扫码关注微信
1. 中国科学院 信息工程研究所 信息安全国家重点实验室,北京 100195
2. 西安电子科技大学 综合业务网理论及关键技术国家重点实验室,陕西 西安 710071
3. 北京电子科技学院 信息安全系,北京 100070
[ "李凤华(1966-),男,湖北浠水人,博士,中国科学院信息工程研究所副总工程师、研究员、博士生导师,主要研究方向为网络与系统安全、隐私计算、可信计算。" ]
[ "张翠(1985-),女,江西抚州人,中国科学院信息工程研究所博士生,主要研究方向为网络安全、隐私保护。" ]
[ "牛犇(1984-),男,陕西西安人,博士,中国科学院信息工程研究所助理研究员,主要研究方向为网络安全、隐私计算。" ]
[ "李晖(1968-),男,河南灵宝人,博士,西安电子科技大学教授、博士生导师,主要研究方向为密码学、无线网络安全、云计算安全、信息论与编码理论。" ]
[ "华佳烽(1989-),男,湖北黄冈人,西安电子科技大学博士生,主要研究方向为医疗隐私。" ]
[ "史国振(1974-),男,河南济源人,博士,北京电子科技学院副教授,主要研究方向为信息安全。" ]
网络出版日期:2015-12,
纸质出版日期:2015-12-25
移动端阅览
李凤华, 张翠, 牛犇, 等. 高效的轨迹隐私保护方案[J]. 通信学报, 2015,36(12):114-123.
Feng-hua LI, Cui ZHANG, Ben NIU, et al. Efficient scheme for user's trajectory privacy[J]. Journal on communications, 2015, 36(12): 114-123.
李凤华, 张翠, 牛犇, 等. 高效的轨迹隐私保护方案[J]. 通信学报, 2015,36(12):114-123. DOI: 10.11959/j.issn.1000-436x.2015320.
Feng-hua LI, Cui ZHANG, Ben NIU, et al. Efficient scheme for user's trajectory privacy[J]. Journal on communications, 2015, 36(12): 114-123. DOI: 10.11959/j.issn.1000-436x.2015320.
作为基于位置服务中的一种重要信息,智能终端用户的轨迹隐私保护问题日益受到广大研究者的重视。为解决这一问题,综合考虑了用户所处区域的背景信息、用户行动模式和轨迹相似性等特征,构建了(k−1)条难以被拥有背景信息的敌手所区分的虚假轨迹,从而为移动用户提供k-匿名级别的轨迹隐私保护。相对于现有技术,该方案不依赖于任何可信第三方,能够在保证虚假轨迹与真实轨迹相似性的基础上有效抵御拥有背景信息的敌手的攻击。实验结果表明了方案的有效性和高效性。
As one of the most important information in location-based services (LBS)
the trajectory privacy for smart devices users has gained increasingly popularity over recent years.To address this problem
(k−1) dummy trajectories to achieve trajectory k-anonymity with comprehensively considering side information were generated
user's mobility pattern and the trajectory similarity etc.Without relying on the trusted third party
the scheme could provide trajectory k-anonymity against adversaries with side information by generating (k−1) realistic dummy trajectories.The evaluation results indicate its effectiveness and efficiency.
ZHANG H , XU L , HUANG H , et al . Mining spatial association rules from LBS anonymity data set for improving utilization [A ] . Proceedings of the 21th IEEE International Conference on Geoinformatics [C ] . Kaifeng,China , 2013 . 1 - 6 .
WERNKE M , SKVORTSOV P , DURR F , et al . A classification of location privacy attacks and approaches [J ] . Personal & Ubiquitous Computing , 2014 , 18 ( 1 ): 163 - 175 .
HIDETOSHI K , YANAGISAWA Y , SATOH T . An anonymous communication technique using dummies for location-based services [A ] . Proceedings of International Conference on Pervasive Services [C ] . Santorini,Greece , 2005 . 88 - 97 .
JIA J , ZHANG F . Nonexposure accurate location k-anonymity algorithm in LBS [J ] . The Scientific World Journal , 2014 , 2014 ( 1 ): 619357 - 619357 .
PAN X , MENG X F , XU J L . Distortion-based anonymity for continuous queries in location-based mobile services [A ] . Proceedings of the 17th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems [C ] . New York,USA , 2009 . 256 - 265 .
GAO S , MA J F , SHI W , et al . TRPF:a trajectory privacy-preserving framework for participatory sensing [J ] . IEEE Transactions on Information Forensics and Security , 2013 , 8 ( 6 ): 874 - 887 .
XU T , CAI Y . Exploring historical location data for anonymity preservation in location-based services [A ] . Proceedings of the 27th IEEE International Conference on Computer Communications 2008 [C ] . Phoenix,USA , 2008 . 1220 - 1228 .
HWANG R H , HSUEH Y L . A novel time-obfuscated algorithm for trajectory privacy protection [J ] . IEEE Transactions on Services Computing , 2014 , 7 ( 22 ): 126 - 139 .
PALANISAMY B , LIU L . Attack-resilient mix-zones over road networks:architecture and algorithms [J ] . IEEE Transactions on Mobile Computing , 2015 , 14 ( 3 ): 495 - 508 .
YANG N , CAO Y , LIU Q , et al . A novel personalized TTP-free location privacy preserving method [J ] . International Journal of Security &Its Applications , 2014 , 8 ( 2 ): 387 .
CHOW C Y , MOKBEL M F , LIU X . Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments [J ] . Geoinformatica , 2011 , 15 ( 2 ): 351 - 380 .
NIU B , ZHU X Y , LI W H , et al . A personalized two-tier cloaking scheme for privacy-aware location-based services [A ] . Proceedings of International Conference on Computing,Networking and Communications [C ] . Garden Grove,USA , 2015 . 94 - 98 .
YOU T H , PENG W C , LEE W C . Protecting moving trajectories with dummies [A ] . Proceedings of IEEE 14th International Conference on Mobile Data Management [C ] . Mannheim,Germany , 2007 . 278 - 282 .
DONG K , GU T , TAO X , et al . Jointcache:collaborative path confusion through lightweight P2P communication [A ] . Proceedings of IEEE International Conference on Pervasive Computing and Communications Workshops [C ] . San Diego,USA , 2013 . 352 - 355 .
PALANISAMY B , LIU L . Road network mix-zones for anonymous location based services [A ] . Proceedings of the 29th International Conference on Data Engineering [C ] . Brisbane,Australia , 2013 . 1300 - 1303 .
HOH B , GRUSTESER M . Protecting location privacy through path confusion [A ] . Security and Privacy for Emerging Areas in Communications Networks [C ] . Athens,Greece , 2005 . 345 - 356 .
WU X , SUN G . A novel dummy-based mechanism to protect privacy on trajectories [A ] . Proceedings of IEEE International Conference on Data Mining series [C ] . Shenzhen,China , 2014 . 1120 - 1125 .
NIU B , LI Q H , ZHU X Y , et al . Achieving k-anonymity in privacy-aware location-based service [A ] . Proceedings of the 33rd IEEE International Conference on Computer Communications [C ] . Toronto,Canada , 2014 . 754 - 762 .
PINGLEY A . Protection of query privacy for continuous location based services [A ] . Proceedings of the 30th IEEE International Conference on Computer Communications 2011 [C ] . Shanghai,China , 2011 . 1710 - 1718 .
HARA T , YAMAMOTO A , ARASEL Y , et al . Location anonymization using real car trace data for location based services [A ] . Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication [C ] . Siem Reap,Cambodia , 2014 . 1 - 8 .
SHARMA V , SHEN C . Evaluation of an entropy-based k-anonymity model for location based services [A ] . Proceedings of International Conference on Computing,Networking and Communications [C ] . Garden Grove,USA , 2015 . 374 - 378 .
SHOKRI R , THEODORAKOPOULOS G , BOUDEC J Y L , et al . Quantifying location privacy [A ] . Proceedings of the 32nd IEEE Symposium on Security & Privacy [C ] . Claremont Resort,USA , 2011 . 247 - 262 .
FREUDIGER J . When Whereabouts is no Longer Thereabouts:Location Privacy in Wireless Networks [D ] . PhD thesis EPFL , 2011 .
FREUDIGER J , SHOKRI R , HUBAUX J P . Evaluating the Privacy risk of Location-based Services [M ] . Financial Cryptography and Data Security . Springer Berlin Heidelberg , 2012 . 31 - 46 .
NIU B , LI Q H , ZHU X Y , et al . Enhancing privacy through caching in location-based services [A ] . Proceedings of the 34rd IEEE International Conference on Computer Communications [C ] . Hong Kong,China , 2015 . 1017 - 1025 .
FREJINGER E . Route Choice Analysis:Data,Models,Algorithms and Applications [D ] . PhD thesis EPFL , 2008 .
KATO R , IWATA M , HARA T , et al . A dummy-based anonymization method based on user trajectory with pauses [A ] . Proceedings of the 20th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems [C ] . Redondo Beach,USA , 2012 . 249 - 258 .
0
浏览量
1308
下载量
11
CSCD
关联资源
相关文章
相关作者
相关机构