全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...
-  2018 

基于缓存候选结果集的轨迹隐私保护方法
A Trajectory Privacy Preserving Method Based on Caching Candidate Result Set

DOI: 10.3969/j.issn.1001-0548.2018.03.020

Keywords: 缓存,k-匿名,基于位置服务,Markov模型,轨迹隐私

Full-Text   Cite this paper   Add to My Lib

Abstract:

在基于位置服务的连续范围查询过程中,针对相交区域需要重复查询的问题,提出一种基于缓存候选结果集的轨迹隐私保护方法。该方法采用二级缓存机制,分别在用户端和匿名器中缓存用户查询得到的候选结果集,供用户移动轨迹上的后续查询点使用,以减少用户与服务器之间的交互,降低用户信息暴露给服务器的风险。同时通过基于Markov模型的移动位置预测方法进行k-匿名,提高缓存的命中率。安全分析表明该方法能有效保护用户的轨迹隐私。实验结果显示该方法能减小服务器的计算和通信开销。

References

[1]  PRIMAULT V, BOUTET A, MOKHTAR S B, et al. Adaptive location privacy with ALP[C]//Proceedings of the 35th Symposium on Reliable Distributed Systems (SRDS). New Jersey, USA:IEEE, 2016:269-278.
[2]  YI X, PAULET R, BERTINO E, et al. Practical approximate k nearest neighbor queries with location and query privacy[J]. IEEE Transactions on Knowledge and Data Engineering, 2016, 28(6):1546-1559.
[3]  张少波, 刘琴, 王国军. 基于网格标识匹配的位置隐私保护方法[J]. 电子与信息学报, 2016, 38(9):2173-2179. ZHANG Shao-bo, LIU Qin, WANG Guo-jun. The method of location privacy protection based on grid identifier matching[J]. Journal of Electronics & Information Technology, 2016, 38(9):2173-2179.
[4]  SHOKRI R, THEODORAKOPOULOS G, PAPADIMITRATOS P, et al. Hiding in the mobile crowd:Location privacy through collaboration[J]. IEEE transactions on Dependable and Secure Computing, 2014, 11(3):266-279.
[5]  CORSER G P, FU H R, BANIHANI A. Evaluating location privacy in vehicular communications and applications[J]. IEEE Transactions on Intelligent Transportation Systems, 2016, 17(9):2658-2667.
[6]  ZHENG V, ZHENG Y, XIE X, et al. Collaborative location and activity recommendations with GPS history data[C]//Proceeding of the 19th International Conference on World Wide Web. New York, USA:ACM, 2010:1029-1038.
[7]  周长利, 马春光, 杨松涛. 路网环境下保护LBS位置隐私的连续KNN查询方法[J]. 计算机研究与发展, 2015, 52(11):2628-2644. ZHOU Chang-li, MA Chun-guang, YANG Song-tao. Location privacy-preserving method for LBS continuous KNN query in road networks[J]. Journal of Computer Research and Development, 2015, 52(11):2628-2644.
[8]  ZHANG Y, TONG W, ZHONG S. On designing satisfaction-ratio-aware truthful incentive mechanisms for k-anonymity location privacy[J]. IEEE Transactions on Information Forensics and Security, 2016, 11(11):2528-2541.
[9]  NIU B, LI Q, ZHU X, et al. Enhancing privacy through caching in location-based services[C]//Proceeding of the IEEE INFOCOM 2015. New Jersey, USA:IEEE, 2015:1017-1025.
[10]  XIAO C, CHEN Z, WANG X, et al. DeCache:a decentralized two-level cache for mobile location privacy protection[C]//Proceedings of the Sixth International Conference on Ubiquitous and Future Networks(ICUFN). New Jersey, USA:IEEE, 2014:81-86.
[11]  CHEN M, LIU Y, YU X. NLPMM:a next location predictor with Markov modeling[C]//Proceeding of the 18th Pacific-Asia Conference on Knowledge Discovery and Data Mining. New York, USA:Springer, 2014:186-197.
[12]  李雯, 夏士雄, 刘峰, 等. 基于运动趋势的移动对象位置预测[J]. 通信学报, 2014, 35(2):46-53. LI Wen, XIA Shi-xiong, LIU Feng, et al. Location prediction algorithm based on movement tendency[J]. Journal of Communications, 2014, 35(2):46-53.
[13]  张学军, 桂小林, 伍忠东. 位置服务隐私保护研究综述[J]. 软件学报, 2015, 26(9):2373-2395. ZHANG Xue-jun, GUI Xiao-lin, WU Zhong-dong. Privacy preservation for location-based services:a survey[J]. Journal of Software, 2015, 26(9):2373-2395.
[14]  CHOW C Y, MOKBEL M F, LIU Xuan. A peer-to-peer spatial cloaking algorithm for anonymous location-based service[C]//Proceedings of the 14th Annual ACM International Symposium on Advances in Geographic Information Systems. New York, USA:ACM, 2006:171-178.
[15]  GEDIK B, LIU L. Protecting location privacy with personalized k-anonymous:Architecture and algorithms[J]. IEEE Transaction on Mobile Computing, 2008, 7(1):1-18.
[16]  霍峥, 孟小峰, 黄毅. PrivateChechIn:一种移动社交网络中的轨迹隐私保护方法与进展[J]. 计算机学报, 2013, 36(4):716-726. HUO Zheng, MENG Xiao-feng, Huang Yi. PrivateChechIn:Trajectory privacy-preserving for chech-in services in MSNS[J]. Chinese journal of computers, 2013, 36(4):716-726.
[17]  HWANG R H, HSUEH Y L, CHUNG H W. A novel time-obfuscated algorithm for trajectory privacy protection[J]. IEEE Transactions on Services Computing, 2014, 7(2):126-139.
[18]  BRINKHOFF T. Generating traffic data[J]. Bulletin of the Technical Committee Data Engineering, 2003, 26(2):19-25.

Full-Text

Contact Us

[email protected]

QQ:3279437679

WhatsApp +8615387084133