浏览全部资源
扫码关注微信
1. 哈尔滨工程大学 计算机科学与技术学院,黑龙江 哈尔滨 150001
2. 佳木斯大学 信息电子技术学院,黑龙江 佳木斯 154007
3. 哈尔滨工程大学 国家保密学院,黑龙江 哈尔滨 150001
[ "杨松涛(1972-),男,黑龙江佳木斯人,哈尔滨工程大学博士生,佳木斯大学副教授,主要研究方向为物联网安全、隐私保护。" ]
[ "马春光(1974-),男,黑龙江双鸭山人,哈尔滨工程大学院教授、博士生导师,哈尔滨工程大学国家保密学院副院长,主要研究方向为密码学、信息安全、传感网与物联网。" ]
[ "周长利(1985-),男,黑龙江哈尔滨人,哈尔滨工程大学博士生,主要研究方向为物联网安全、隐私保护。" ]
网络出版日期:2014-08,
纸质出版日期:2014-08-25
移动端阅览
杨松涛, 马春光, 周长利. 面向LBS的隐私保护模型及方案[J]. 通信学报, 2014,35(8):116-124.
Song-tao YANG, Chun-guang MA, Chang-li ZHOU. LBS-oriented location privacy protection model and scheme[J]. Journal on communications, 2014, 35(8): 116-124.
杨松涛, 马春光, 周长利. 面向LBS的隐私保护模型及方案[J]. 通信学报, 2014,35(8):116-124. DOI: 10.3969/j.issn.1000-436x.2014.08.015.
Song-tao YANG, Chun-guang MA, Chang-li ZHOU. LBS-oriented location privacy protection model and scheme[J]. Journal on communications, 2014, 35(8): 116-124. DOI: 10.3969/j.issn.1000-436x.2014.08.015.
首先,提出一种基于中心服务器结构的位置隐私保护模型,然后,针对该模型设计了一种基于伪随机置换的位置隐私保护方案,此方案借鉴k-匿名技术、秘密信息检索技术的设计理念和方法,实现了完美匿名和基于位置的盲查询。最后,证明此方案具备不可追踪性和不可关联性等安全属性,并对方案的效率问题进行了分析。
A location privacy protection model was proposed based on the central server structure
designed a location privacy protection scheme based on pseudo-random permutation for the model. Proposed scheme builds on k-anonymous and secret information retrieval technology design concept and methods
achieves a blind query and perfect anonymous. This scheme has been proven to have untraceability and unlinkability
and the efficiency is analyzed as well.
HARRISON B , DEY A . What have you done with location-based services lately [J ] . IEEE Pervasive Computing , 2009 , 8 ( 4 ): 66 - 70 .
GRUTESER M , GRUNWALD D . Anonymous usage of location-based services through spatial and temporal cloaking [A ] . Proceedings of the 1st International Conference on Mobile Systems, Applications and Ser-vices , A Francisco, California 2003 . 21 - 42 .
BAMBA B , LIU L , PESTI P , et al . Supporting anonymous location queries in mobile environments with privacygrid [A ] . Proceedings of the 17th International Conference on World Wide Web [C ] . Beijing, China , 2008 . 237 - 246 .
LIU F , HUA K A , CAI Y . Query l-diversity in location-based ser-vices [A ] . Proceedings of the 10th International Conference on Mobile Data Management: Systems, Services and Middleware [C ] . 2009 . 436 - 442 .
LEE B , OH J , YU H , et al . Protecting location privacy using location semantics [A ] . Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining [C ] . 2011 . 1289 - 1297 .
KALNIS P , GHINITA G . MOURATIDIS K, et al. Preventing loca-tion-based identity inference in anonymous spatial queries [J ] . IEEE Transactions on Knowledge and Data Engineering , 2007 , 19 ( 12 ): 1719 - 1733 .
PINGLEY A , YU W , ZHANG N , et al . A context-aware scheme for privacy-preserving location-based services [J ] . Computer Networks , 2012 , 56 ( 11 ): 2551 - 2568 .
NI W , ZHENG J , CHONG Z . HilAnchor: location privacy protection in the presence of users' preferences [J ] . Computer Science and Tech-nology , 2012 , 27 ( 2 ): 413 - 427 .
CHOW C , MOKBEL M F , LIU X . A peer to peer spatial cloaking algorithm for anonymous location based services [A ] . Proceedings of the ACM Symposium on Advances in Geographic Information Sys-tems , Arlington, VA 2006 . 171 - 178 .
黄毅 , 霍峥 , 孟小峰 . CoPrivacy:一种用户协作无匿名区域的位置隐私保护方法 [J ] . 计算机学报 , 2011 , 34 ( 10 ): 1976 - 1985 .
HUANG Y , HUO Z , MENG X F . CoPrivacy : a collaborative location privacy-preserving method without cloaking region [J ] . Chinese Jour-nal of Computers , 2011 , 34 ( 10 ): 1976 - 1985 .
HU H B , XU J L . Non-exposure location anonymity [A ] . IEEE 25th International Conference on Data Engineering [C ] . 2009 . 1120 - 1131 .
HASHEM T , KULIK L . “Don't trust anyone”: privacy protection for location-based services [A ] . Pervasive and Mobile Computing , 2011 , 7 ( 1 ): 44 - 59 .
NERGIZ M E , ATZORI M , SAYGIN Y , et al . Towards trajectory anonymization: a generalization-based approach [A ] . Transactions on Data Privacy , 2009 , 2 ( 1 ): 47 - 75 .
MEYEROWITZ J , CHOUDHURY R R . Hiding stars with fireworks:location privacy through camouflage [A ] . Proceedings of the 15th An-nual International Conference on Mobile Computing and Network-ing [C ] . Beijing, China , 2009 . 345 - 356 .
BERESFORD A R , STAJANO F . Location privacy in pervasive com-puting [A ] . IEEE Pervasive Computing , 2003 , 2 ( 1 ): 46 - 55 .
HOH B , GRUTESER M , XIONG H , et al . Preserving privacy in GPS traces via uncertainty-aware path cloaking [A ] . Proceedings of the 14th ACM Conference on Computer and Communications Security [C ] . Alexandria, Virginia, USA , 2007 . 161 - 171 .
GHINITA G , KALNIS P , KHOSHGOZARAN A , et al . Private queries in location-based services: anonymizers are not necessary [A ] . Pro-ceedings of the 2008 ACM SIGMOD International Conference on Management of Data , Vancouver, Canada: ACM , 2008 . 121 - 132 .
KHOSHGOZARA A , SHAHABI C , SHIRANI-MEHR H . Location privacy: going beyond k-anonymity, cloaking and anonymizers [A ] . Knowledge and Information Systems , 2011 , 26 ( 3 ): 435 - 465 .
ASHOURI-TALOUKI M , BARAANI-DASTJERDI A , SELCUK A . GLP: a cryptographic approach for group location privacy [J ] . Com-puter Communications , 2012 , 35 ( 12 ): 1527 - 1533 .
林欣 , 李善平 , 杨朝晖 . LBS 中连续查询攻击算法及匿名性度量 [J ] . 软件学报 , 2009 , 20 ( 4 ): 1058 - 1068 .
LIN X , LI S P , YANG Z H . Attacking algorithms against continuous queries in LBS and anonymity measurement [J ] . Chinese Journal of Software , 2009 , 20 ( 4 ): 1058 - 1068 .
ASONOV D . Querying Databases Privately: a New Approach to Pri-vate Information Retrieval [J ] . Springer , 2004 .
0
浏览量
0
下载量
10
CSCD
关联资源
相关文章
相关作者
相关机构