浏览全部资源
扫码关注微信
1. 西安电子科技大学综合业务网理论及关键技术国家重点实验室,陕西 西安 710071
2. 中国科学院信息工程研究所信息安全国家重点实验室,北京 100195
[ "万盛(1987-),男,江苏南通人,西安电子科技大学博士生,主要研究方向为网络安全与隐私保护。" ]
[ "李凤华(1966-),男,湖北浠水人,博士,中国科学院信息工程研究所副总工程师、研究员、博士生导师,主要研究方向为网络与系统安全、隐私计算、可信计算。" ]
[ "牛犇(1984-),男,陕西西安人,博士,中国科学院信息工程研究所助理研究员,主要研究方向为网络安全、隐私计算。" ]
[ "孙哲(1987-),男,安徽安庆人,中国科学院信息工程研究所博士生,主要研究方向为信息安全、隐私保护。" ]
[ "李晖(1968-),男,河南灵宝人,博士,西安电子科技大学教授、博士生导师,主要研究方向为密码学、无线网络安全、云计算安全、信息论与编码理论。" ]
网络出版日期:2016-12,
纸质出版日期:2016-12-25
移动端阅览
万盛, 李凤华, 牛犇, 等. 位置隐私保护技术研究进展[J]. 通信学报, 2016,37(12):124-141.
Sheng WAN, Feng-hua LI, Ben NIU, et al. Research progress on location privacy-preserving techniques[J]. Journal on communications, 2016, 37(12): 124-141.
万盛, 李凤华, 牛犇, 等. 位置隐私保护技术研究进展[J]. 通信学报, 2016,37(12):124-141. DOI: 10.11959/j.issn.1000-436x.2016279.
Sheng WAN, Feng-hua LI, Ben NIU, et al. Research progress on location privacy-preserving techniques[J]. Journal on communications, 2016, 37(12): 124-141. DOI: 10.11959/j.issn.1000-436x.2016279.
日趋流行的基于位置服务(LBS
location-based service)在为人们日常生活带来便利的同时也严重威胁到用户隐私。位置隐私保护技术逐渐成为研究热点,并涌现出大批研究成果。首先介绍位置隐私保护背景知识,包括位置服务应用场景、位置服务体系框架、隐私保护目标和系统构架;接着讨论LBS中的攻击者模型和隐私保护度量指标;然后对4种基于泛化和模糊的LBS隐私保护技术进行深入分析和总结;最后给出了未来LBS隐私保护技术潜在的研究方向。
While providing plenty of convenience for users in daily life
the increasingly popular location-based ser-vice(LBS) posed a serious threat to users' privacy. The research about privacy-preserving techniques for LBS is becoming a hot spot
and there are a large number of research results. First
background information of privacy protection for LBS was introduced
including application scenarios of LBS
the LBS framework
objects of privacy protection and system architectures of privacy protection. Second
adversary models and metrics for privacy protection in LBS was discussed. Third
four types of privacy-preserving techniques based on generalization and obfuscation for LBS were analyzed and summarized thoroughly. Finally
the potential research directions for privacy-preserving techniques for LBS in the future were shown.
王璐 , 孟小峰 . 位置大数据隐私保护研究综述 [J ] . 软件学报 , 2014 , 25 ( 4 ): 693 - 712 .
WANG L , MENG X F . Location privacy preservation in big data era: a survey [J ] . Journal of Software , 2014 , 25 ( 4 ): 693 - 712 .
HOH B , GRUTESER M . Protecting location privacy through path confusion [C ] // 1st IEEE International Conference on Security and Pri-vacy for Emerging Areas in Communications Networks (Secure-Comm'05) . Athens, Greece , 2005 : 194 - 205 .
KRUMM J . Inference attacks on location tracks [C ] // 5th Springer International Conference on Pervasive Computing(PERVASIVE'07) . Toronto, Canada , 2007 : 127 - 143 .
FAWAZ K , SHIN K G . Location privacy protection for smartphone users [C ] // 21st ACM Conference on Computer and Communications Security(CCS'14) . Scottsdale, United States , 2014 : 239 - 250 .
SHIN K G , JU X , CHEN Z , et al . Privacy protection for users of loca-tion-based services [J ] . IEEE Wireless Communications , 2012 , 19 ( 1 ): 30 - 39 .
ZHANG Y , TAN C C , XU F , et al . VProof: lightweight pri-vacy-preserving vehicle location proofs [J ] . IEEE Transactions on Ve-hicular Technology , 2015 , 64 ( 1 ): 378 - 385 .
WANG X , PANDE A , ZHU J , et al . STAMP: enabling pri-vacy-preserving location proofs for mobile users [J ] . IEEE Transac-tions on Networking , 2016 ,PP( 99 ): 1 - 14 .
DICKINSON A , LOCHRIE M , EGGLESTONE P . UKKO: enriching persuasive location based games with environmental sensor data [C ] // 2th ACM Annual Symposium on Computer-Human Interaction in Play(CHI Play'15) . London, United Kingdom , 2015 : 493 - 498 .
周傲英 , 杨彬 , 金澈清 , 等 . 基于位置的服务:架构与进展 [J ] . 计算机学报 , 2011 , 34 ( 7 ): 1155 - 1171 .
ZHOU A Y , YANG B , JIN C Q , et al . Location-based services: archi-tecture and progress [J ] . Journal of Software , 2011 , 34 ( 7 ): 1155 - 1171 .
WERNKE M , SKVORTSOV P , DÜRR F , et al . A classification of location privacy attacks and approaches [J ] . Personal and Ubiquitous Computing , 2014 , 18 ( 1 ): 163 - 175 .
MACHANAVAJJHALA A , KIFER D , GEHRKE J , et al . L-diversity:privacy beyond k-anonymity [J ] . ACM Transactions on Knowledge Discovery from Data , 2007 , 1 ( 1 ): 3 .
CHOW C Y , MOKBEL M F , LIU X . Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments [J ] . GeoInformatica , 2011 , 15 ( 2 ): 351 - 380 .
MOKBEL M F . Privacy in location-based services: state-of the-art and research directions [C ] // 8th IEEE International Conference on Mobile Data Management (MDM'07) . Mannheim, Germany , 2007 : 228 - 228 .
THEODORAKOPOULOS G . The same-origin attack against location privacy [C ] // 14th ACM Workshop on Privacy in the Electronic Soci-ety(WPES'15) . Denver, United States , 2015 : 49 - 53 .
SHOKRI R , THEODORAKOPOULOS G , BOUDEC J Y LE , et al . Quantifying location privacy [C ] // 32nd IEEE Symposium on Security and Privacy(S&P'11) . Berkeley, United States , 2011 : 247 - 262 .
LEE B , OH J , YU H , et al . Protecting location privacy using location semantics [C ] // 17th ACM international conference on Knowledge dis-covery and data mining(SIGKDD'11) . San Diego, United States , 2011 : 1289 - 1297 .
PAN X , XU J , MENG X . Protecting location privacy against loca-tion-dependent attacks in mobile services [J ] . IEEE Transactions on Knowledge and Data Engineering , 2012 , 24 ( 8 ): 1506 - 1519 .
刘海 , 李兴华 , 王二蒙 , 等 . 连续服务请求下基于假位置的用户隐私增强方法 [J ] . 通信学报 , 2016 , 37 ( 7 ): 140 - 150 .
LIU H , LI X H , WANG E M , et al . Privacy enhancing method for dummy based privacy protection with continuous location-based ser-vice queries [J ] . Journal on Communications , 2016 , 37 ( 7 ): 140 - 150 .
潘晓 , 郝兴 , 孟小峰 . 基于位置服务中的连续查询隐私保护研究 [J ] . 计算机研究与发展 , 2010 , 47 ( 1 ): 121 - 129 .
PAN X , HAO X , MENG X F . Primacy prospering towards continuous query in location-based services [J ] . Journal of Computer Research and Development , 2010 , 47 ( 1 ): 121 - 129 .
GRUTESER M , GRUNWALD D . Anonymous usage of loca-tion-based services through spatial and temporal cloaking [C ] // 1st ACM International Conference on Mobile Systems, Applications, and Services(MobiSys'03) . San Francisco, United States , 2003 : 31 - 42 .
SWEENEY L . k-anonymity: a model for protecting privacy [J ] . Inter-national Journal on Uncertainty, Fuzziness and Knowledge-based Sys-tems , 2002 , 10 ( 5 ): 557 - 570 .
CHOW C Y , MOKBEL M F , AREF W G . Casper*: query processing for location services without compromising privacy [J ] . ACM Transac-tions on Database Systems , 2009 , 34 ( 4 ): 1 - 48 .
XU T , CAI Y . Feeling-based location privacy protection for loca-tion-based services [C ] // 16th ACM Conference on Computer and Communications Security(CCS'09) . Chicago, United States , 2009 : 348 - 357 .
GEDIK B , LIU L . Protecting location privacy with personalized k-anonymity: architecture and algorithms [J ] . IEEE Transactions on Mobile Computing , 2008 , 7 ( 1 ): 1 - 18 .
GEDIK B , LIU L . Protecting location privacy with personalized k-anonymity: architecture and algorithms [J ] . IEEE Transactions on Mobile Computing , 2008 , 7 ( 1 ): 1 - 18 .
倪巍伟 , 马中希 , 陈萧 . 面向路网隐私保护连续近邻查询的安全区域构建 [J ] . 计算机学报 , 2016 , 39 ( 3 ): 628 - 642 .
NI W W , MA Z X , CHEN X . Safe region scheme for pri-vacy-preserving continuous recent neighbor query on road networks [J ] . Journal of Computers , 2016 , 39 ( 3 ): 628 - 642 .
NIU B , LI Q H , ZHU X Y , et al . A fine-grained spatial cloaking scheme for privacy-aware users in location-based ser-vices [C ] // 23rd IEEE International Conference on Computer Communication and Networks (ICCCN'14) . Shanghai, China , 2014 : 1 - 8 .
KIDO H , YANGISAWA Y , SATOH T . An anonymous communication technique using dummies for location-based services [C ] // 2nd IEEE International Conference on Pervasive Services(ICPS'05) . Santorini, Greece , 2005 : 88 - 97 .
LU H , JENSEN C S , YIU M L . Pad: privacy-area aware, dummy-based location privacy in mobile services [C ] // 7th ACM International Workshop on Data Engineering for Wireless and Mobile Access( MobiDE'08) . Vancouver, Canada , 2008 : 16 - 23 .
NIU B , ZHU X Y , LI Q H , et al . A novel attack to spatial cloaking schemes in location-based services [J ] . Future Generation Computer Systems , 2015 , 49 ( 1 ): 125 - 132 .
CHOW C Y , MOKBEL M F , LIU X . A peer-to-peer spatial cloaking algorithm for anonymous location-based services [C ] // 14th ACM In-ternational Symposium on Advances in Geographic information Sys-tems(ACM-GIS'06) . Arlington, USA , 2006 : 171 - 178 .
CICEK A E , NERGIZ M E , SAYGIN Y . Ensuring location diversity in privacy-preserving spatio-temporal data publishing [J ] . The VLDB Journal , 2014 , 23 ( 4 ): 609 - 625 .
ZHANG X , XIA Y , BAE H Y . A novel location privacy preservation method for moving object [J ] . International Journal of Security and Its Applications , 2015 , 9 ( 2 ): 1 - 12 .
ZHANG C , HUANG Y . Cloaking locations for anonymous location based services: a hybrid approach [J ] . GeoInformatica , 2009 , 13 ( 2 ): 159 - 182 .
BERESFORD A , STAJANO F . Location privacy in pervasive com-puting [J ] . IEEE Pervasive Computing , 2003 , 2 ( 1 ): 46 - 55 .
NIU B , LI Q H , ZHU X Y , et al . Achieving k-anonymity in pri-vacy-aware location-based services [C ] // 33th IEEE International Con-ference on Computer Communications(INFOCOM'14) . Toronto, Canada , 2014 : 754 - 762 .
NIU B , LI Q H , ZHU X Y , et al . Enhancing privacy through caching in location-based services [C ] // 34th IEEE International Conference on Computer Communications(INFOCOM'15) . Hong Kong, China , 2015 : 1017 - 1025 .
NIU B , ZHU X Y , LI W H , et al . EPcloak: an efficient and pri-vacy-preserving spatial cloaking scheme for LBSs [C ] // 11th IEEE In-ternational Conference on Mobile Ad Hoc and Sensor Sys-tems(MASS'14) . Philadelphia, United States , 2014 : 398 - 406 .
PALANISAMY B , LIU L . Attack-resilient mix-zones over road net-works: architecture and algorithms [J ] . IEEE Transactions on Mobile Computing , 2015 , 14 ( 3 ): 495 - 508 .
彭长根 , 丁红发 , 朱义杰 , 等 . 隐私保护的信息熵模型及其度量方法 [J ] . 软件学报 , 2016 , 27 ( 8 ): 1891 - 1903 .
PENG C G , DING H F , ZHU Y J , et al . Information entropy models and privacy metrics methods for privacy protection [J ] . Journal of Software , 2016 , 27 ( 8 ): 1891 - 1903 .
SHOKRI R , FREUDIGER J , JADLIWALA M , et al . A distor-tion-based metric for location privacy [C ] // 8th ACM Workshop on Pri-vacy in the Electronic Society(WPES'09) . Chicago, United States , 2009 : 21 - 30 .
DWORK C , LEI J . Differential privacy and robust statistics [C ] // 41st Annual ACM Symposium on Theory of Computing(STOC'09) . Be-thesda, United States , 2009 : 371 - 380 .
ANDRES M E , BORDENABE N E , CHATZIKOKOLAKIS K , et al . Geo-indistinguishability: differential privacy for location-based sys-tems [C ] // 20th ACM Conference on Computer and Communications Security(CCS'13) . Berlin, Germany , 2013 : 901 - 914 .
XIAO Y , XIONG L . Protecting locations with differential privacy under temporal correlations [C ] // 22nd ACM Conference on Computer and Communications Security(CCS'15) . Denver, United States , 2015 : 1298 - 1309 .
IETF . Geographic location/privacy (geopriv) [EB/OL ] . http://datatracker.ietf.org/wg/geopriv/charter/ http://datatracker.ietf.org/wg/geopriv/charter/ .
World Wide Web Consortium(W3C) . Platform for privacy prefer-ences(P3P) project [EB/OL ] . http://www.w3.org/P3P http://www.w3.org/P3P .
PAULET R , KAOSAR M G , YI X , et al . Privacy-preserving and con-tent-protecting location based queries [J ] . IEEE Transactions on Knowledge and Data Engineering , 2014 , 26 ( 5 ): 1200 - 1210 .
GHINITA G , KALNIS P , KHOSHGOZARAN A , et al . Private queries in location based services: anonymizers are not necessary [C ] // 27th ACM Conference on Management of Data(SIGMOD'08) . Vancouver, Canada , 2008 : 121 - 132 .
YI X , PAULET R , BERTINO E , et al . Practical approximate k nearest neighbor queries with location and query privacy [J ] . IEEE Transac-tions on Knowledge and Data Engineering , 2016 ,PP( 99 ): 1 - 14 .
KALNIS P , GHINITA G , MOURATIDIS K , et al . Preventing loca-tion-based identity inference in anonymous spatial queries [J ] . IEEE Transactions on Knowledge and Data Engineering , 2007 , 19 ( 12 ): 1719 - 1733 .
NGO H , KIM J . Location privacy via differential private perturbation of cloaking area [C ] // 28th IEEE Computer Security Foundations Sym-posium(CSF'15) . Verona, Italy , 2015 : 63 - 74 .
YIU M L , JENSEN C S , MØLLER J , et al . Design and analysis of a ranking approach to private location-based services [J ] . ACM Transac-tions on Database Systems , 2011 , 36 ( 2 ): 1 - 42 .
PERAZZO P , DINI G . A uniformity-based approach to location pri-vacy [J ] . Computer Communications , 2015 , 64 ( 1 ): 21 - 32 .
ARDAGNA C A , CREMONINI M , DE CAPITANI DI VIMERCATI S , et al . An obfuscation-based approach for protecting location pri-vacy [J ] . IEEE Transactions on Dependable and Secure Computing , 2011 , 8 ( 1 ): 13 - 27 .
DÜRR F , SKVORTSOV P , ROTHERMEL K . Position sharing for location privacy in non-trusted systems [C ] // 9th IEEE International Conference on Pervasive Computing and Communica-tions(PerCom'11) . Seattle, United States , 2011 : 189 - 196 .
PINGLEY A , YU W , ZHANG N , et al . Cap: a context-aware privacy protection system for location-based services [C ] // 29th IEEE Interna-tional Conference on Distributed Computing Systems(ICDCS'09) . Montreal, Canada , 2009 : 49 - 57 .
周长利 , 马春光 , 杨松涛 . 基于敏感位置多样性的LBS位置隐私保护方法研究 [J ] . 通信学报 , 2015 , 36 ( 4 ): 14 - 25 .
ZHOU C L , MA C G , YANG S T . Research of LBS privacy preserving based on sensitive location diversity [J ] . Journal on Communications , 2015 , 36 ( 4 ): 14 - 25 .
SHOKRI R , THEODORAKOPOULOS G , TRONCOSO C , et al . Protecting location privacy: optimal strategy against localization at-tacks [C ] // 19th ACM Conference on Computer and Communications Security(CCS'12) . Raleigh, United States , 2012 : 617 - 627 .
BORDENABE N E , CHATZIKOKOLAKIS K , PALAMIDESSI C . Optimal geo-indistinguishable mechanisms for location privacy [C ] // 21st ACM Conference on Computer and Communications Secu-rity(CCS'14) . Scottsdale, United States , 2014 : 251 - 262 .
倪巍伟 , 陈萧 , 马中希 . 支持偏好调控的路网隐私保护k近邻查询方法 [J ] . 计算机学报 , 2015 , 38 ( 4 ): 884 - 896 .
NI W W , CHENG X , MA Z X . Location privacy preserving k-nearest neighbor query method on road network in presence of user's prefer-ence [J ] . Chinese Journal of Computers , 2015 , 38 ( 4 ): 884 - 896 .
PINGLEY A , ZHANG N , FU X , et al . Protection of query privacy for continuous location based services [C ] // 30th IEEE International Con-ference on Computer Communications (INFOCOM'11) . Shanghai, China , 2011 : 1710 - 1718 .
MA C Y T , YAU D K Y , YIP N K , et al . Privacy vulnerability of pub-lished anonymous mobility traces [J ] . IEEE Transactions on Network-ing , 2013 , 21 ( 3 ): 720 - 733 .
LIU X , LIU K , GUO L , et al . A game-theoretic approach for achieving k-anonymity in location based services [C ] // 32nd IEEE International Conference on Computer Communications(INFOCOM'13) . Turin, It-aly , 2013 : 2985 - 2993 .
MANWEILER J , SCUDELLARI R , COX L P . Smile: encounter-based trust for mobile social services [C ] // 16th ACM Conference on Com-puter and Communications Security(CCS'09) . Chicago, United States , 2009 : 246 - 255 .
SHOKRI R , THEODORAKOPOULOS G , PAPADIMITRATOS P , et al . Hiding in the mobile crowd: location privacy through collaboration [J ] . IEEE Transactions on Dependable and Secure Computing , 2014 , 11 ( 3 ): 266 - 279 .
黄毅 , 霍峥 , 孟小峰 . CoPrivacy:一种用户协作无匿名区域的位置隐私保护方法 [J ] . 计算机学报 , 2011 , 34 ( 10 ): 1976 - 1985 .
HUANG Y , HUO Z , MENG X F . CoPrivacy: a collaborative cocation privacy-preserving method without clocking region [J ] . Chinese Jour-nal of Computers , 2011 , 34 ( 10 ): 1976 - 1985 .
李凤华 , 李晖 , 贾焰 , 等 . 隐私计算研究范畴及发展趋势 [J ] . 通信学报 , 2016 , 37 ( 4 ): 1 - 11 .
LI F H , LI H , JIA Y , et al . Privacy computing: concept, connotation and its research trend [J ] . Journal on Communications , 2016 , 37 ( 4 ): 1 - 11 .
0
浏览量
3433
下载量
21
CSCD
关联资源
相关文章
相关作者
相关机构