浏览全部资源
扫码关注微信
1. 湖南科技大学计算机科学与工程学院,湖南 湘潭 411201
2. 湖南大学信息科学与工程学院,湖南 长沙 410082
3. 广州大学计算机科学与教育软件学院,广东 广州 510006
[ "张少波(1979-),男,湖南邵东人,博士,湖南科技大学讲师,主要研究方向为移动社交网络、隐私保护、云计算安全、大数据安全和隐私等。" ]
[ "刘琴(1982-),女,湖南长沙人,博士,湖南大学副教授,主要研究方向为云计算安全、大数据安全与隐私保护等。" ]
[ "王国军(1970-),男,湖南长沙人,广州大学博士生导师、广东省珠江学者特聘教授,主要研究方向为信息安全、可信计算、大数据安全和隐私保护等。" ]
网络出版日期:2018-07,
纸质出版日期:2018-07-25
移动端阅览
张少波, 刘琴, 王国军. 基于位置混淆的轨迹隐私保护方法[J]. 通信学报, 2018,39(7):81-91.
Shaobo ZHANG, Qin LIU, Guojun WANG. Trajectory privacy protection method based on location obfuscation[J]. Journal on communications, 2018, 39(7): 81-91.
张少波, 刘琴, 王国军. 基于位置混淆的轨迹隐私保护方法[J]. 通信学报, 2018,39(7):81-91. DOI: 10.11959/j.issn.1000-436x.2018119.
Shaobo ZHANG, Qin LIU, Guojun WANG. Trajectory privacy protection method based on location obfuscation[J]. Journal on communications, 2018, 39(7): 81-91. DOI: 10.11959/j.issn.1000-436x.2018119.
在用户连续查询过程中,针对第三方匿名器结构中K匿名难以保证用户隐私的问题,提出一种基于位置混淆的轨迹隐私保护方法。首先通过位置预测机制和假位置选择机制获得(G-1)个查询混淆位置,然后将其与用户真实查询位置一起发送到不同匿名器形成匿名域后,再发送到LBS服务器进行查询,最后将获得的查询结果经不同匿名器返回给用户。该方法通过位置混淆来混淆用户的真实查询位置,使攻击者从单匿名器和LBS服务器不能推断出用户的真实轨迹,加强了对用户轨迹的隐私保护,也解决了单匿名器的性能瓶颈问题。安全分析表明了该方法的安全性,实验结果表明,该方法能减少用户与LBS服务器的交互次数以及单匿名器的开销。
In the process of continuous queries
a method of trajectory privacy protection based on location obfuscation was proposed to solve the problem that K-anonymity was difficult to guarantee user privacy in third party architectrue.Firstly
the (G-1) query obfuscation locations through the location prediction was obtained and the dummy location selection mechanism
and then sent them together with the user’s real query location to different anonymizers to form cloaking regions and sent them to the LBS server for queries
and the query results were returned to the user by different anonymizers.In this method
the user’s real query location was confused by the location obfuscation
and the attacker couldn’t deduce the user’s trajectory from a single anonymizer or the LBS server.The method can enhance the privacy of the user’s trajectory and can effectively solve the performance bottleneck in the single anonymizer structure.Security analysis shows the security of the proposed approach
and experiments show this method can reduce the number of interactions between the user and the LBS server and the overhead of the single anonymizer.
YI X , PAULET R , BERTINO E , et al . Practical approximate k nearest neighbor queries with location and query privacy [J ] . IEEE Transactions on Knowledge and Data Engineering , 2016 , 28 ( 6 ): 1546 - 1559 .
PRIMAULT V , BOUTET A , MOKHTAR S B , et al . Adaptive location privacy with ALP [C ] // The 35th Symposium on Reliable Distributed Systems (SRDS) . 2016 : 269 - 278 .
雷凯跃 , 李兴华 , 刘海 , 等 . 轨迹发布中基于时空关联性的假轨迹隐私保护方案 [J ] . 通信学报 , 2016 , 37 ( 12 ): 156 - 164 .
LEI K Y , LI X H , LIU H , et al . Dummy trajectory privacy protection scheme for trajectory publishing based on the spatiotemporal correlation [J ] . Journal on Communications , 2016 , 37 ( 12 ): 156 - 164 .
GRISSA M , YAVUZ A , HAMDAOUI B . Preserving the location privacy of secondary users in cooperative spectrum sensing [J ] . IEEE Transactions on Information Forensics & Security , 2017 , 12 ( 2 ): 418 - 431 .
张学军 , 桂小林 , 伍忠东 . 位置服务隐私保护研究综述 [J ] . 软件学报 , 2015 , 26 ( 9 ): 2373 - 2395 .
ZHANG X J , GUI X L , WU Z D . Privacy preservation for location-based services:a survey [J ] . Journal of Software , 2015 , 26 ( 9 ): 2373 - 2395 .
万盛 , 李凤华 , 牛犇 , 等 . 位置隐私保护技术研究进展 [J ] . 通信学报 , 2016 , 37 ( 12 ): 1 - 18 .
WAN S , LI F H , NIU B , et al . Research progress on location privacy-preserving techniques [J ] . Journal on Communications , 2016 , 37 ( 12 ): 1 - 18 .
ARDAGNA C A , CREMONINI M , VIMERCATI S D C D , et al . An obfuscation-based approach for protecting location privacy [J ] . IEEE Transactions on Dependable & Secure Computing , 2010 , 8 ( 1 ): 13 - 27 .
霍峥 , 孟小峰 , 黄毅 . PrivateChechIn:一种移动社交网络中的轨迹隐私保护方法与进展 [J ] . 计算机学报 , 2013 , 36 ( 4 ): 716 - 726 .
HUO Z , MENG X F , HUANG Y . PrivateChechIn:trajectory privacy-preserving for chech-in services in MSNS [J ] . Chinese Journal of Computers , 2013 , 36 ( 4 ): 716 - 726 .
CHOW C Y , MOKBEL M F , LIU X . A peer-to-peer spatial cloaking algorithm for anonymous location-based service [C ] // The 14th annual ACM International Symposium on Advances in Geographic Information Systems . 2006 : 171 - 178 .
SHOKRI R , THEODORAKOPOULOS G , PAPADIMITRATOS P , et al . Hiding in the mobile crowd:location privacy through collaboration [J ] . IEEE Transactions on Dependable and Secure Computing , 2014 , 11 ( 3 ): 266 - 279 .
PENG T , LIU Q , MENG D , et al . Collaborative trajectory privacy preserving scheme in location-based services [J ] . Information Sciences , 2017 , 387 : 165 - 179 .
ZHANG Y , TONG W , ZHONG S . On designing satisfaction- ratio-aware truthful incentive mechanisms for k-anonymity location privacy [J ] . IEEE Transactions on Information Forensics and Security , 2016 , 11 ( 11 ): 2528 - 2541 .
GEDIK B , LIU L . Protecting location privacy with personalized k-anonymous:architectrue and algorithms [J ] . IEEE Transaction on Mobile Computing , 2008 , 7 ( 1 ): 1 - 18 .
HWANG R H , HSUEH Y L , CHUNG H W . A novel time-obfuscated algorithm for trajectory privacy protection [J ] . IEEE Transactions on Services Computing , 2014 , 7 ( 2 ): 126 - 139 .
LIAO D , LI H , SUN G , et al . Protecting user trajectory in location-based services [C ] // IEEE Global Communications Conference (GLOBECOM) . 2015 : 1 - 6 .
周长利 , 马春光 , 杨松涛 . 路网环境下保护 LBS 位置隐私的连续KNN查询方法 [J ] . 计算机研究与发展 , 2015 , 52 ( 11 ): 2628 - 2644 .
ZHOU C L , MA C G , YANG S T . Location privacy-preserving method for LBS continuous KNN query in road networks [J ] . Journal of Computer Research and Development , 2015 , 52 ( 11 ): 2628 - 2644 .
PENG T , LIU Q , WANG G J . Enhanced location privacy preserving scheme in location-based services [J ] . IEEE Systems Journal , 2017 , 11 ( 1 ): 219 - 230 .
GAO S , MA J F , SHI W S , et al . TrPF:a trajectory privacy-preserving framework for participatory sensing [J ] . IEEE Transactions on Information Forensics and Security , 2013 , 8 ( 6 ): 874 - 887 .
JEUNG H Y , SHEN H T , LIU Q , et al . A hybrid prediction model for moving objects [C ] // The 24th International Conference on Data Engineering . 2008 : 70 - 79 .
NIU B , ZHANG Z Y , LI X Q , et al . Privacy-area aware dummy generation algorithms for location-based services [C ] // The International Conference on Communications . 2014 : 957 - 962 .
BRINKHOFF T . Generating traffic data [J ] . Bulletin of the Technical Committee Data Engineering , 2003 , 26 ( 2 ): 19 - 25 .
0
浏览量
1388
下载量
7
CSCD
关联资源
相关文章
相关作者
相关机构