浏览全部资源
扫码关注微信
西安电子科技大学网络与信息安全学院,陕西 西安 710071
[ "刘海(1984-),男,贵州贵阳人,西安电子科技大学博士生,主要研究方向为隐私保护和理性密码协议。" ]
[ "李兴华(1978-),男,河南南阳人,博士,西安电子科技大学教授、博士生导师,主要研究方向为隐私保护、网络与信息安全。" ]
[ "王二蒙(1990-),女,陕西渭南人,西安电子科技大学硕士生,主要研究方向为位置隐私保护。" ]
[ "马建峰(1963-),男,陕西西安人,博士,西安电子科技大学教授、博士生导师,主要研究方向为信道编码、网络与信息安全、密码学。" ]
网络出版日期:2016-07,
纸质出版日期:2016-07-25
移动端阅览
刘海, 李兴华, 王二蒙, 等. 连续服务请求下基于假位置的用户隐私增强方法[J]. 通信学报, 2016,37(7):140-150.
Hai LIU, Xing-hua LI, Er-meng WANG, et al. Privacy enhancing method for dummy-based privacy protection with continuous location-based service queries[J]. Journal of communications, 2016, 37(7): 140-150.
刘海, 李兴华, 王二蒙, 等. 连续服务请求下基于假位置的用户隐私增强方法[J]. 通信学报, 2016,37(7):140-150. DOI: 10.11959/j.issn.1000-436x.2016142.
Hai LIU, Xing-hua LI, Er-meng WANG, et al. Privacy enhancing method for dummy-based privacy protection with continuous location-based service queries[J]. Journal of communications, 2016, 37(7): 140-150. DOI: 10.11959/j.issn.1000-436x.2016142.
基于假位置的隐私保护方案在为用户提供准确位置服务查询结果的同时,还无需第三方和共享密钥。然而,当用户连续请求位置服务时,由于现有保护单次查询的假位置方案未考虑相邻位置集合间的时空关系,使攻击者能推断出假位置,降低用户的位置隐私保护等级。针对上述问题,采用现有假位置方案生成候选假位置,并通过连续合理性检查和单次隐私增强对其进行筛选,提出一个适用于连续请求的假位置隐私保护增强方法。安全性分析表明,所提方法能保证连续请求中形成的移动路径在时空上不可区分,有效保护连续请求中的用户位置隐私。大量实验表明,所提方法在不增加用户计算开销的同时,与采用的候选假位置生成方案相比,还能提高用户单次查询的隐私保护等级。
Without need for the third party and sharing key
the dummy-based privacy protection scheme enabled users to obtain the precise query result in location-based services. However
in continuous queries
since the existing dummy-based privacy protection schemes ignored the spatio-temporal relevance of the submitted neighbor location sets
the ad-versary could infer dummies
making that the protection degree of users' location privacy was reduced. To solve this problem
a dummy-based privacy protection enhancing method toward continuous queries was proposed. In the proposal
the candidate dummies were first generated by the existing dummy-based schemes
and could be filtered through the check of continuous reasonability and single privacy enhancement. Security analysis shows that
in the proposed method
the formed movement paths are indistinguishable in time and space
so that protecting the user's location privacy effectively in continuous queries. Moreover
extensive experiments indicate that its computation cost is limited
and compared with the scheme adopted to generate candidate dummies
the user's privacy protection is also enhanced in snapshot query.
KRUMM J . A survey of computational location privacy [J ] . Personal and Ubiquitous Computing , 2009 , 13 ( 6 ): 391 - 399 .
TIWARI S , KAUSHIK S , JAGWANI P , et al . A survey on LBS: sys-tem architecture, trends and broad research areas [C ] // LNCS 7108: The 7th International Conference on Databases in Network Information Systems .Heidelberg:Springer. c 2011 : 223 - 241 .
王璐 , 孟小峰 . 位置大数据隐私保护研究综述 [J ] . 软件学报 , 2014 , 25 ( 4 ): 693 - 712 .
WANG L , MENG X F . Location privacy preservation in big data era: a survey [J ] . Journal of Software , 2014 , 25 ( 4 ): 693 - 712 .
王宇航 , 张宏莉 , 余翔湛 . 移动互联网中的位置隐私保护研究 [J ] . 通信学报 , 2015 , 36 ( 9 ): 2015167 .
WANG Y H, , ZHANG H L , YU X Z . Research on location privacy in mobile Internet [J ] . Journal on Communications , 2015 , 36 ( 9 ): 2015167 .
KIDO H , YANAGISAWA Y , SATOH T . An anonymous communica-tion technique using dummies for location-based services [C ] // The International Conference on Pervasive Services 2005 . Washington ,IEEE, c 2005 : 88 - 97 .
KIDO H , YANAGISAWA Y , SATOH T . Protection of location privacy using dummies for location-based services [C ] // The 21st International Conference on Data Engineering Workshops . Washington ,IEEE, c 2005 : 1248 .
GRUTESER M , GRUNWALD . Anonymous usage of location-based services through spatial and temporal cloaking [C ] // The 1st Interna-tional Conference on Mobile, Systems, Applications and Services . New York ,ACM, c 2003 : 31 - 42 .
TALUKDER N , AHAMED S I . Preventing multiquery attack in location-based services [C ] // The 3rd ACM Conference on Wireless Network Security . New York ,ACM, c 2010 : 25 - 36 .
BERSFORD A R , STAJANO F . Mix zones: user privacy in loca-tion-aware services [C ] // The 2nd IEEE Annual Conference on Perva-sive Computing and Communications Workshops . Washington ,IEEE, c 2004 : 127 - 131 .
GAO S , MA J F , SHI W S , et al . TrPF: a trajectory privacy-preserving framework for participatory sensing [J ] . IEEE Transactions on Information Forensics and Security , 2013 , 8 ( 6 ): 874 - 887 .
ARDAGNA C , CREMONINI M , DAMIANI E , et al . Location privacy protection through obfuscation-based techniques [C ] // The 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security ,Berlin: Springer. c 2007 : 47 - 60 .
DAMIANI M L , BERTINO E , SILVESTRI . The probe framework for the personalized cloaking of private locations [J ] . Transactions on Data Privacy , 2010 , 3 ( 2 ): 123 - 148 .
GHINITA G , KALNIS P , KHOSHGOZARAN A , et al . Private queries in location based services: anonymizers are not necessary [C ] // The 2008 ACM SIGMOD International Conference on Management of Data . New York ,ACM, c 2008 : 121 - 132 .
MASCETTI S , FRENI D , BETTINI C , et al . Privacy in geo-social networks: proximity notification with untrusted service providers and curious buddies [J ] . VLDB Journal , 2011 , 20 ( 4 ): 541 - 566 .
LU H , JENSEN C S , YIU M L . Pad: privacy-area aware, dummy based location privacy in mobile services [C ] // The Seventh ACM International Workshop on Data Engineering for Wireless and Mobile Access . New York ,ACM, c 2008 : 16 - 23 .
NIU B , LI Q , ZHU X et al . Achieving k-anonymity in privacy-aware loca-tion-based services [C ] // The 33rd Annual IEEE International Conference on Computer Communications . Washington ,IEEE, c 2014 : 754 - 762 .
NIU B , ZHANG Z Y , LI X Q , et al . Privacy-area aware dummy gen-eration algorithms for location-based services [C ] // The 2014 IEEE In-ternational Conference on Communication . Washington ,IEEE, c 2014 : 957 - 962 .
NIU B , LI Q , ZHU X , et al . Enhancing privacy through caching in location-based services [C ] // The 34th Annual IEEE International Con-ference on Computer Communications . Washington ,IEEE, c 2015 : 1017 - 1025 .
XU T , CAI Y . Exploring historical location data for anonymity preser-vation in location-based services [C ] // The 27th Conference on Com-puter Communications . Washington ,IEEE, c 2008 : 13 - 18 .
XU T , CAI Y . Feeling-based location privacy protection for loca-tion-based services [C ] // The 16th ACM Conference on Computer and Communications Security . New York ,ACM, c 2009 : 348 - 357 .
CHOW C Y , MOKBEL M . Enabling private continuous queries for revealed user locations [C ] // The 10th International Symposium on Spa-tial and Temporal Databases . Berlin ,Springer, c 2007 : 258 - 275 .
潘晓 , 郝兴 , 孟小峰 . 基于位置服务中的连续查询隐私保护研究 [J ] . 计算机研究与发展 , 2010 , 47 ( 1 ): 121 - 129 .
PAN X , HAO X , MENG X F . Privacy preserving towards continuous query in location-based services [J ] . Journal of Computer Research and Development , 2010 , 47 ( 1 ): 121 - 129 .
WANG Y , XU D B , HE X , et al . L2P2: location-aware location pri-vacy protection for location-based services [C ] // The 31st Annual IEEE International Conference on Computer Communication . Washington ,IEEE, c 2012 : 1996 - 2004 .
LI X H , WANG E M , YANG W D , et al . DALP: a demand-aware location privacy protection scheme in continuous location-based services [J ] . Concurrency and Computation:Practice and Experience , 2016 , 28 ( 4 ): 1219 - 1236 .
SCHLEGEL R , CHOW C Y , HUANG Q , et al . User-defined privacy grid system for continuous location-based services [J ] . IEEE Transactions on Mobile Computing , 2015 , 14 ( 10 ): 2158 - 2172 .
BRINKOFFff T . A framework for generating network-based moving objects [J ] . Geo Informatica , 2002 , 6 ( 2 ): 153 - 180 .
0
浏览量
1035
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构