浏览全部资源
扫码关注微信
1. 中国科学院信息工程研究所信息安全国家重点实验室,北京100093
2. 东莞电子科技大学电子信息工程研究院,广东 东莞 523808
[ "李超(1981-),男,重庆人,博士,中国科学院信息工程研究所博士后,主要研究方向为隐私保护、访问控制。" ]
[ "殷丽华(1973-),女,辽宁朝阳人,博士,中国科学院信息工程研究所副研究员、硕士生导师,主要研究方向为信息安全、安全评估。" ]
[ "耿魁(1989-),男,湖北红安人,博士,中国科学院信息工程研究所助理研究员,主要研究方向为网络安全。" ]
[ "方滨兴(1960-),男,江西万年人,中国工程院院士,东莞电子科技大学教授、博士生导师,主要研究方向为计算机体系结构、计算机网络与信息安全。" ]
网络出版日期:2016-11,
纸质出版日期:2016-11-25
移动端阅览
李超, 殷丽华, 耿魁, 等. 面向移动社交网络内容分享的位置隐私保护方法[J]. 通信学报, 2016,37(11):31-41.
Chao LI, Li-hua YIN, Kui GENG, et al. Location privacy preservation approach towards to content sharing on mobile online social network[J]. Journal on communications, 2016, 37(11): 31-41.
李超, 殷丽华, 耿魁, 等. 面向移动社交网络内容分享的位置隐私保护方法[J]. 通信学报, 2016,37(11):31-41. DOI: 10.11959/j.issn.1000-436x.2016212.
Chao LI, Li-hua YIN, Kui GENG, et al. Location privacy preservation approach towards to content sharing on mobile online social network[J]. Journal on communications, 2016, 37(11): 31-41. DOI: 10.11959/j.issn.1000-436x.2016212.
针对移动社交网络内容分享中内容参与者的位置信息泄露问题,提出一种面向内容分享的位置隐私访问控制模型,细粒度控制分享内容中所涉及用户的敏感位置信息的访问,设计一种针对位置隐私设置的k-匿名算法,保证设置的敏感位置信息在内容分享服务提供商的服务器端不被推测,给出一种基于位置敏感度的位置偏移算法,以平衡隐私与服务质量。最后通过仿真实验验证该方法的有效性。
A privacy access control model for content sharing was presented to fine-grained control users' location infor-mation associated with sharing content in mobile social network. A k-anonymity privacy algorithm for privacy settings was given to protect against inference attack on a content sharing service provider server. To balance the privacy and quality of service
a location shifting method was presented. Finally experimental results demonstrate the validity and practicality of the proposed approach.
ILIA p , POLAKIS I , ATHANASOPOULOS E . Face/Off: preventing privacy leakage from photos in social networks [C ] // The 22nd ACM SIGSAC Conference on Computer and Communications Security . 2015 : 781 - 792 .
NAINI F M , UNNIKRISHNAN J , THIRAN P . Where you are is who you are: user identification by matching statistics [J ] . IEEE Transactions on Information Forensics and Security , 2016 , 11 ( 2 ): 358 - 372 .
DATELINE NBC . Tracing a stalker [EB/OL ] . http://www.nbcnews. com/id/19253352/ns/dateline_nbc-crime_reports/t/tracing-stalker/ http://www.nbcnews. com/id/19253352/ns/dateline_nbc-crime_reports/t/tracing-stalker/ , 2013 .
VOELCKER J . Stalked by satellite: an alarming rise in gps-enabled harassment [J ] . IEEE Spectrum , 2006 , 47 ( 7 ): 15 - 16 .
WEBROOT SOFTWARE . Webroot survey finds geolocation apps prevalent amongst mobile device users, but 55\% concerned about loss of privacy [EB/OL ] . http://pr.webroot.com/threat-research/cons/social-networks-mobile-security-071310.html http://pr.webroot.com/threat-research/cons/social-networks-mobile-security-071310.html , 2010 .
Half of social networkers online concerned about privacy [EB/OL ] . http://maristpoll.marist.edu/714-half-of-social-networkers-online-conc erned-about-privacy/ http://maristpoll.marist.edu/714-half-of-social-networkers-online-conc erned-about-privacy/ , 2010 .
CHOW C Y , MOKBEL M F , LIU X , et al . A peer-to-peer spatial cloaking algorithm for anonymous location-based service [C ] // The 14th Annual ACM International Symposium on Advances in Geographic Information Systems . 2006 : 171 - 178 .
GRUTESER M , GRUNWALD D . Anonymous usage of location-based services through spatial and temporal cloaking [C ] // The 1st International Conference on Mobile Systems, Applications and Services. New York, USA: ACM , 2003 : 31 - 42 .
KALNIS P , GHINITA G , MOURATIDIS K . Preventing location-based identity inference in anonymous spatial queries [J ] . IEEE Transactions on Knowledge and Data Engineering, IEEE , 2007 , 19 ( 12 ): 1719 - 1733 .
GEDIK B , LIU L . Protecting location privacy with personalized k-anonymity: architecture and algorithms [J ] . IEEE Transactions on Mobile Computing, IEEE , 2008 , 7 ( 1 ): 1 - 18 .
HU H , XU J , ON S T . Privacy-aware location data publishing [J ] . ACM Transactions on Database Systems (TODS), ACM , 2010 , 35 ( 3 ): 1 - 40 .
李凤华 , 李晖 , 贾焰 . 隐私计算研究范畴及发展趋势 [J ] . 通信学报 , 2016 , 37 ( 4 ): 1 - 11 .
KRUMM J . A survey of computational location privacy [J ] . Personal and Ubiquitous Computing, London, UK, UK: Springer-Verlag , 2009 , 13 ( 6 ): 391 - 399 .
BETTINI C , WANG X , JAJODIA S . Protecting privacy against location-based personal identification [J ] . Secure Data Management , 2005 , 3674 : 185 - 199 .
CHOW C Y , MOKBEL M F . Trajectory privacy in location-based services and data publication [C ] // SIGKDD 2011 , 19 - 29 .
DUCKHAM M , KULIK L . A formal model of obfuscation and negotiation for location privacy [J ] . Pervasive Computing , 2005 , 3468 : 152 - 170 .
DAMIANI M L . Privacy enhancing techniques for the protection of mobility patterns in LBS: research issues and trends [C ] // European Data Protection: Coming of Age. Springer , 2013 : 223 - 239 .
DAMIANI M , BERTINO E , SILVESTRI C . Protecting location privacy through semantics-aware obfuscation techniques [C ] // IFIPTM , 2008 : 231 - 245 .
KLEMPERER P , LIANG Y , MAZUREK M . Tag, you can see it!:using tags for access control in photo sharing [C ] // The SIGCHI Conference on Human Factors in Computing Systems . 2012 : 377 - 386 .
XU K , GUO Y , GUO L . My privacy my decision: control of photo sharing on online social networks [J ] . IEEE Transactions on Dependable and Secure Computing , 2015 ,( 99 ): 1 .
WISHART R , CORAPI D , MARINOVIC S . Collaborative privacy policy authoring in a social networking context [C ] // Policies for Distributed Systems and Networks. 2010 IEEE International Symposium . 2010 : 1 - 8 .
WANG Y , ZHAI E , LUA E K . ISAC: Intimacy based access control for social network sites [C ] // Ubiquitous Intelligence & Computing and 9th International Conference on Autonomic & Trusted Computing (UIC/ATC) . 2012 : 517 - 524 .
FONG P W L . Relationship-based access control: protection model and policy language [C ] // The First ACM Conference on Data and Application Security and Privacy . 2011 : 191 - 202 .
CARMINATI B , FERRARI E , PEREGO A . Enforcing access control in web-based social networks [J ] . ACM Transactions on Information and System Security (TISSEC) , 2009 , 13 ( 1 ): 6 .
GATES C . Access control requirements for web 2.0 security and privacy [J ] . IEEE Web , 2007 , 2 .
HOUGHTON D J , JOINSON A N . Privacy, social network sites, and social relations [J ] . Journal of Technology in Human Services, Taylor& Francis , 2010 , 28 ( 1-2 ): 74 - 94 .
JOSHI J B , BERTINO E , LATIF U . A generalized temporal role-based access control model [J ] . IEEE Transactions on Knowledge and Data Engineering , 2005 , 17 ( 1 ): 4 - 23 .
GREENE K , DERLEGA V J , MATHEWS A . Self-disclosure in personal relationships [M ] . The Cambridge Handbook of Personal Relationships , 2006 : 409 - 427 .
WIESE J , KELLEY P G , CRANOR L F . Are you close with me? are you nearby?: investigating social groups, closeness, and willingness to share [C ] // The 13th international conference on Ubiquitous computing . 2011 : 197 - 206 .
SUCH J M , ROVATSOS M . Privacy policy negotiation in social media [J ] . ACM Trans Auton Adapt Syst, New York, NY, USA: ACM , 2016 , 11 ( 1 ): 4:1 - 4:29 .
SWEENEY L . k-anonymity: a model for protecting privacy [J ] . International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems , 2002 , 10 ( 7 ): 557 - 570 .
LIU Y , WEI W , SUN A . Exploiting geographical neighborhood characteristics for location recommendation [C ] // The 23rd ACM International Conference on Conference on Information and Knowledge Management - CIKM '14 . 2014 : 739 - 748 .
Real datasets for spatial databaes: road networks and points of Internet [EB/OL ] . http://www.cs.fsu.edu/~lifeifei/SpatialDataset.html http://www.cs.fsu.edu/~lifeifei/SpatialDataset.html .
0
浏览量
889
下载量
1
CSCD
关联资源
相关文章
相关作者
相关机构