浏览全部资源
扫码关注微信
西安电子科技大学网络与信息安全学院,陕西 西安 710071
[ "李维皓(1990-),女,辽宁沈阳人,西安电子科技大学博士生,主要研究方向为社交网络中的隐私保护。" ]
[ "丁晟(1990-),男,陕西西安人,西安电子科技大学博士生,主要研究方向为数据安全与隐私保护。" ]
[ "孟佳洁(1985-),女,河北邯郸人,西安电子科技大学博士生,主要研究方向为流量监测与隐私保护。" ]
[ "李晖(1968-),男,河南灵宝人,博士,西安电子科技大学教授、博士生导师,主要研究方向为密码学、无线网络安全、云计算安全、信息论与编码理论。" ]
网络出版日期:2018-05,
纸质出版日期:2018-05-25
移动端阅览
李维皓, 丁晟, 孟佳洁, 等. 基于位置服务中时空关联的隐私保护方案[J]. 通信学报, 2018,39(5):134-142.
Weihao LI, Sheng DING, Jiajie MENG, et al. Spatio-temporal aware privacy-preserving scheme in LBS[J]. Journal on communications, 2018, 39(5): 134-142.
李维皓, 丁晟, 孟佳洁, 等. 基于位置服务中时空关联的隐私保护方案[J]. 通信学报, 2018,39(5):134-142. DOI: 10.11959/j.issn.1000-436x.2018084.
Weihao LI, Sheng DING, Jiajie MENG, et al. Spatio-temporal aware privacy-preserving scheme in LBS[J]. Journal on communications, 2018, 39(5): 134-142. DOI: 10.11959/j.issn.1000-436x.2018084.
基于位置服务(LBS
location-based service)在为人们的生活带来便捷的同时,对用户的隐私信息带来了不可忽略的威胁。利用时空关联性,提出基于伪位置生成的隐私保护方案,在保护用户位置隐私的同时,考虑到空间和时间之间的关联性,选取与伪位置关联的伪查询内容。时空关联的隐私保护方案包含2个算法,地图分割算法和伪内容生成算法。地图分割算法通过维诺多边形将地图划分为离散的位置单元,保证每一个离散的位置单元互不相邻,伪内容生成算法利用用户在下一时刻将要前往的位置作为前一时刻的查询内容,从而很好地避免了攻击者根据时间和空间的关联性来推测用户的真实信息。最后,通过实验证明所提方案的有效性和安全性。
Location-based service (LBS) brings a lot of conveniences in people’s daily life
but the conveniences are accompanied with the leaking of privacy.A dummy-based location-preserving scheme was proposed
which took the correlation between spatial issues and temporal issues into account.Two algorithms were included in this scheme
map dividing algorithm and dummy contents determining algorithm.The map dividing algorithm divided the map into discrete location cells by Voronoi Diagram to ensure these discrete location cells were not adjacent to each other.The dummy contents determining algorithm replaced the query content in previous moment by the intending location in next moment
which efficiently avoided the adversary inferring mobile users’ sensitive information according to the correlation between spatial issues and temporal issues.The simulation experiments show that the proposed scheme is effective and efficient.
GEDIK B , LIU L . Protecting location privacy with personalized k-anonymity:architecture and algorithms [J ] . IEEE Transactions on Mobile Computing , 2008 , 7 ( 1 ): 1 - 18 .
PINGLY A,YU W , ZHANG N , FU X , et al . Cap:a context-aware privacy protection system for location-based services [C ] // ICDCS . 2009 : 49 - 57 .
LI X,ZHANG C , JUNG T , QIAN J , et al . Graph-based privacy-preserving data publication [C ] // INFOCOM . 2016 .
CHEN Z , HU X , JU X , et al . Lisa:location information scrambler for privacy protection on smartphones [C ] // CNS . 2013 .
ANDRES M , BORDENABE N , CHATZIKOKOLAKIS K , et al . Geo-indistinguishability:differential privacy for location-based systems [C ] // CCS . 2013 .
PERAZZO P , DINI G . A uniformity-based approach to location privacy [J ] . Computer Communications , 2015 , 64 ( 1 ): 21 - 32 .
NIU B , LI Q , ZHU X , et al . Achieving k-anonymity in privacy-aware location-based services [C ] // INFOCOM . 2014 .
NIU B , LI Q , ZHU X , et al . Enhancing privacy through caching in location-based services [C ] // INFOCOM . 2015 .
SHOKRI R , THEODORAKOPOULOS G , PAPADIMITRATIS P , et al . Hiding in the mobile crowd:Location privacy through collaboration [J ] . IEEE Transactions on Dependable and Secure Computing , 2014 , 11 ( 3 ): 266 - 279 .
黄毅 , 霍峥 , 孟小峰 . CoPrivacy:一种用户协作无匿名区域的位置隐私保护方法 [J ] . 计算机学报 , 2011 , 34 ( 10 ): 1976 - 1985 .
HUANG Y , HUO Z , MENG X F . CoPrivacy:a collaborative location privacy-preserving method without cloaking region [J ] . Chinese Journal of Comuputers , 2011 , 34 ( 10 ): 1976 - 1985 .
YI X , PAULET R , BERTINO E , et al . Practical approximate K nearest neighbor queries with location and query privacy [J ] . IEEE Transactions on Knowledge and Data Engineering , 2016 , PP ( 99 ): 1 - 14 .
PAULET R , KAOSAR M , YI X , et al . Privacy-preserving and content-protecting location based queries [J ] . IEEE Transactions on Knowledge and Data Engineering , 2014 , 26 ( 5 ): 1200 - 1210 .
CHOW C , MOKBEL M , LIU X . Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments [J ] . GeoInformatica , 2011 , 15 ( 2 ): 351 - 380 .
MOKEL M , CHOW C , AREF W . The new casper:query processing for location services without compromising privacy [J ] . The IEEE VLDB Journal , 2006 .
ZHANG X , XIA Y , BAE H . A novel location privacy preservation method for moving object [J ] . International Journal of Security and Its Applications , 2015 , 9 ( 2 ): 1 - 12 .
BERESFORD A , STAJANO F . Location privacy in pervasive computing [J ] . IEEE Pervasive Computing , 2003 , 2 ( 1 ): 46 - 55 .
PALANISAMY B , LIU L . Attack-resilient mix-zones over road networks:architecture and algorithms [J ] . IEEE Transactions on Mobile Computing , 2015 , 14 ( 3 ): 495 - 508 .
MEYEROWITZ J , CHOUDHURY R . Hiding stars with fireworks:location privacy through camouflage [C ] // MobiCom . 2009 .
XU T , CAI T . Feeling-based location privacy protection for location-based services [C ] // CCS . 2009 .
MONTAZERI Z , HOUMANSADR A , PISHRO H . Achieving perfect location privacy in wireless devices using anonymization [J ] . IEEE Transactions on Information Forensics and Security , 2017 , PP ( 99 ): 1 .
WANG X , PANDE A , ZHU J , et al . Stamp:enabling privacy-preserving location proofs for mobile users [J ] . IEEE/ACM Transactions on Networking , 2016 , 24 ( 6 ): 3276 - 3289 .
FAWAZ K , SHIN K . Location privacy protection for smartphone users [C ] // CCS . 2014 .
SHOKRI R , THEODORAKOPOULOS G , TRONCOSO C , et al . Protecting location privacy:optimal strategy against localization attacks [C ] // CCS . 2012 .
GOTE M , NATH S , GEHRKE J . Maskit:privately releasing user context streams for personalized mobile applications [C ] // SIGMOD . 2012 .
SHOKRI R , THEODORAKOPOULOS G , BOUDEC J , et al . Hubaux.Quantifying location privacy [C ] // SP . 2011 .
ZHENG Y , XIE X , MA W . Geolife:a collaborative social networking service among user,location and trajectory [C ] // Data Eng.Bull . 2010 .
CHO E , MYERS S , LESKOVEC J . Friendship and mobility:user movement in location-based social networks [C ] // KDD . 2011 .
PINGLEY A , ZHANG N , FU X , et al . Protection of query privacy for continuous location based services [C ] // INFOCOM . 2011 .
NIU B , ZHU X , LI W , et al . A personalized two-tier cloaking scheme for privacy aware location-based services [C ] // ICNC . 2015 .
0
浏览量
1402
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构