浏览全部资源
扫码关注微信
1. 西安电子科技大学通信工程学院,陕西 西安 710071
2. 西安电子科技大学网络与信息安全学院,陕西 西安 710071
[ "李璐璐(1990-),女,山西晋城人,西安电子科技大学硕士生,主要研究方向为信息安全、隐私保护。" ]
[ "华佳烽(1989-),男,湖北黄冈人,西安电子科技大学博士生,主要研究方向为信息安全、隐私保护。" ]
[ "万盛(1987-),男,江苏南通人,西安电子科技大学博士生,主要研究方向为网络安全与隐私保护。" ]
[ "朱辉(1981-),男,河南周口人,博士,西安电子科技大学教授、博士生导师,主要研究方向为数据安全及隐私保护、虚拟化技术与云计算安全、安全信息系统。" ]
[ "李凤华(1966-),男,湖北浠水人,博士,中国科学院信息工程研究所副总工程师、研究员、博士生导师,主要研究方向为网络与系统安全、隐私计算、信息保护。" ]
网络出版日期:2017-06,
纸质出版日期:2017-06-25
移动端阅览
李璐璐, 华佳烽, 万盛, 等. 基于高效信息缓存的位置隐私保护方案[J]. 通信学报, 2017,38(6):148-157.
Lu-lu LI, Jia-feng HUA, Sheng WAN, et al. Achieving efficient location privacy protection based on cache[J]. Journal on communications, 2017, 38(6): 148-157.
李璐璐, 华佳烽, 万盛, 等. 基于高效信息缓存的位置隐私保护方案[J]. 通信学报, 2017,38(6):148-157. DOI: 10.11959/j.issn.1000-436x.2017129.
Lu-lu LI, Jia-feng HUA, Sheng WAN, et al. Achieving efficient location privacy protection based on cache[J]. Journal on communications, 2017, 38(6): 148-157. DOI: 10.11959/j.issn.1000-436x.2017129.
随着移动互联网的高速发展与智能终端的迅速普及,基于位置的服务(LBS
location-based service)已在导航、社交等领域得到广泛应用。但由于个人位置信息的敏感性,移动对象位置相关的数据隐私保护已经成为LBS中的研究热点。综合考虑用户所处区域背景信息的开放性特征,引入信息缓存机制,提出一种虚假位置选择算法,有效减少用户与不可信服务器间的交互次数,并结合k-匿名技术实现了用户位置信息的高效隐私保护。相对于现有技术,该方案不依赖任何可信第三方,可实现抵御拥有背景信息攻击者的推理攻击。实验结果证明了所提方案的有效性和高效性。
With the development of mobile Internet and the popularization of intelligent terminals
location based services(LBS) has been widespread in navigation
social network and other fields.Due to the sensitivity of personal location information
data privacy protection related to location of mobile objects has become the hotspots of research.Considering the openness of the background information
and based on the information cache mechanism
a dummy selection algorithm was proposed to reduce the number of interactions between the user and the untrusted server and combine the k-anonymity to achieve efficient location privacy.Without relying on trusted third party
the scheme can prevent the attackers owned background information from inference attack
and the detail simulation results indicate its effectiveness and efficiency.
GRUSTER M , GRUNWALD D . Anonymous usage of location-based services through spatial and temporal cloaking [C ] // International Conference on Mobile Systems . 2013 : 31 - 42 .
MOKBEL M F , CHOW C Y , AREF W G . The new casper:query processing for location services without compromising privacy [C ] // The 32nd International Conference on Very Large Data Bases . Seoul,South Korea , 2006 : 763 - 774 .
XU T , CAI Y . Feeling-based location privacy protection for location-based services [C ] // ACM Conference on Computer &Communications Security(CCS) . 2009 : 348 - 357 .
CHOW C , MOKEL M F , LIU X . A peer to peer spatial cloaking algorithm for anonymous location based service [C ] // The 14th ACM International Symposium on Geographic Information Systems . 2006 : 171 - 178 .
PAVEL S , FRANK D , KURT R . Map-aware position sharing for location privacy in non-trusted systems [C ] // The 10th International Conference Pervasive Computing . Newcastle England , 2012 : 388 - 405 .
徐建 , 黄孝喜 , 郭鸣 , 等 . 动态 P2P 网络中基于匿名链的位置隐私保护 [J ] . 浙江大学学报(工学版) , 2012 , 46 ( 4 ): 712 - 718 .
XU J , HUANG X X , GUO M , et al . Location privacy through an anonymous chain in dynamic P2P network [J ] . Journal of Zhejiang University(Engineering Science) , 2012 , 46 ( 4 ): 712 - 718 .
CHENG R , ZHANG Y , BERTINO E , et al . Preserving user location privacy in mobile data management infrastructures [C ] // Privacy Enhancing Technology Workshop (PET’ 06) . Cambridge,United Kingdom , 2006 : 393 - 412 .
ANDERSEN M S , KJAERGAARD M B . Towards a new classification of location privacy methods in pervasive computing [J ] . Social Informatics and Telecommunications Engineering , 2012 , 104 : 150 - 161 .
TRONG N P , TRAN K D . A novel trajectory privacy-preserving future time index structure in moving object databases [C ] // The 3th International Conference on Computer and Computational Intelligence . 2012 : 124 - 134 .
魏志强 , 康密军 , 贾东宁 , 等 . 普适计算隐私保护策略研究 [J ] . 计算机学报 , 2010 , 33 ( 1 ): 128 - 138 .
WEI Z Q , KANG M J , JIA D N , et al . Research on privacy protection policy for pervasive computing [J ] . Chinese Journal of Computers , 2010 , 33 ( 1 ): 128 - 138 .
YI X , PAULET R , BERTINO E , et al . Practical approximate k nearest neighbor queries with location and query privacy [J ] . IEEE Transactions on Knowledge and Data Engineering , 2016 ,( 99 ): 1 - 14 .
PAULET R , KAOSAR M G , YI X , et al . Privacy-preserving and content-protecting location based queries [J ] . IEEE Transactions on Knowledge and Data Engineering , 2014 , 26 ( 5 ): 1200 - 1210 .
GHINITA G , KALNIS P , KHOSHGOZARAN A , et al . Privacy queries in location based services:anonymizers are not necessary [C ] // The 27th ACM Conference on Management of Data(SIGMOD’08) . 2008 : 121 - 132 .
HU H , LU R X , HUANG C , et al . An efficient privacy-preserving location based services query scheme in outsourced cloud [J ] . IEEE Transactions on Vehicular Technology , 2016 , 65 ( 9 ): 7729 - 7739 .
ZHU H , LIU F , LI H . Efficient and privacy-preserving polygons spatial query framework for location-based services [J ] . IEEE Internet of Things Journal , 2015 ,( 99 ): 1 - 1 .
毛典辉 , 曹健 , 蔡强 , 等 . 情景感知的位置隐私保护方法研究进展 [J ] . 通信学报 , 2013 , 34 ( Z1 ): 230 - 234 .
MAO D H , CAO J , CAI Q , et al . Survey of the context-aware location privacy-preserving techniques [J ] . Journal on Communications , 2013 , 34 ( Z1 ): 230 - 234 .
GRUTESER M , GRUNWALD D . Anonymous usage of location-based services through spatial and temporal cloaking [C ] // The 1st International Conference on Mobile Systems Applications and Services . USA , 2003 : 31 - 42
YIU M L , JENSEN C S , HUANG X , et al . SpaceTwist:managing the trade-offs among location privacy,query performance,and query accuracy in mobile services [C ] // The IEEE International Conference on Data Engineering . 2008 : 366 - 375 .
CHOW C Y , MOKBEL M F , LIU X . A peer-to-peer spatial cloaking algorithm for anonymous location-based services [C ] // The 14th ACM International Symposium on Advances in Geographic Information Systems(ACM-GIS’06) . 2006 : 171 - 178 .
KIDO H , YANGISAWA Y , SATOH T . An anonymous communication technique using dummies for location-based services [C ] // The 2nd IEEE International Conference on Pervasive Services(ICPS'05) . 2005 : 88 - 97 .
NIU B , LI Q H , ZHU X Y , et al . Achieving k-anonymity in privacy-aware location-based services [C ] // The IEEE 33th International Conference on Computer Communications (INFOCOM’14) . 2014 : 754 - 762 .
霍峥 , 孟小峰 , 黄毅 . PrivateCheckIn:一种移动社交网络中的轨迹隐私保护方法 [J ] . 计算机学报 , 2013 , 36 ( 4 ): 716 - 726 .
HUO Z , MENG X F , HUANG Y . PrivateCheckIn:trajectory privacy-preserving for check-in services in MSNS [J ] . Chinese Journal of Computers , 2013 , 36 ( 4 ): 716 - 726 .
AMINI S , LINDQVIST J , HONG J , et al . Cache:caching location-enhanced content to improve user privacy [J ] . ACM Sigmobile Computing &Communication Review , 2010 , 14 ( 3 ): 19 - 21 .
SHOKRI R , THEODORAKOPOULOS G , PAPADIMITRATOS P , et al . Hiding in the mobile crowd:location privacy through collaboration [J ] . IEEE Transactions on Dependable and Secure Computing , 2013 , 11 ( 3 ): 266 - 279 .
ZHU X Y , CHI H T , NIU B , et al . Mobicache:when k-anonymity meets cache [C ] // IEEE Global Communication Conference (GLOBECOM) . 2013 : 820 - 825 .
NIU B , ZHU X Y , LI W H , et al . EPcloak:an efficient and privacy-preserving spatial cloaking scheme for LBSs [C ] // The 11th IEEE International Conference on Mobile Ad Hoc and Sensor Systems(MASS’14) . 2014 : 398 - 406 .
NIU B , LI Q H , ZHU X Y , et al . Enhancing privacy through caching in location-based services [C ] // The IEEE 34th International Conference on Computer Communications (INFOCOM’15) . 2015 : 1017 - 1025 .
西格兰·托比 . 集体智慧编程 [M ] . 北京 : 电子工业出版社 , 2009 : 89 - 91 .
SEGRAN T . Programming collective intelligence [M ] . Beijing : Publishing House of Electronics IndustryPress , 2009 : 89 - 91 .
0
浏览量
975
下载量
7
CSCD
关联资源
相关文章
相关作者
相关机构