期刊文献+

基于位置服务中的连续查询隐私保护研究 被引量:66

Privacy Preserving Towards Continuous Query in Location-Based Services
在线阅读 下载PDF
导出
摘要 近年来,伴随着移动计算技术和无限设备的蓬勃发展,位置服务中的隐私保护研究受到了学术界的广泛关注,提出了很多匿名算法以保护移动用户的隐私信息.但是现有方法均针对snapshot查询,不能适用于连续查询.如果将现有的静态匿名算法直接应用于连续查询,将会产生隐私泄露、匿名服务器工作代价大等问题.针对这些问题,提出了δp-隐私模型和δq-质量模型来均衡隐私保护与服务质量的矛盾,并基于此提出了一种贪心匿名算法.该算法不仅适用于snapshot查询,也适用于连续查询.实验结果证明了算法的有效性. With advances in wireless communication and mobile positioning technologies,location-based mobile services have been gaining increasingly popularity in recent years. Privacy preservation,including location privacy and query privacy,has recently received considerable attention for location-based mobile services. A lot of location cloaking approaches have been proposed for protecting the location privacy of mobile users. However,they mostly focus on anonymizing snapshot queries based on proximity of locations at query issued time. Therefore,most of them are ill-suited for continuous queries. In view of the privacy disclosure (including location and query privacy) and poor quality of service under continuous query anonymization,a δ_p-privacy model and a δ_q-distortion model are proposed to balance the tradeoff between privacy preserving and quality of service. Meanwhile a temporal distortion model is proposed to measure the location information loss during a time interval,and it is mapped to a temporal similar distance between two queries. Finally,a greedy cloaking algorithm (GCA) is proposed,which is applicable to both anonymizing snapshot queries and continuous queries. Average cloaking success rate,cloaking time,processing time and anonymization cost for successful requests are evaluated with increasing privacy level (k). Experimental results validate the efficiency and effectiveness of the proposed algorithm.
出处 《计算机研究与发展》 EI CSCD 北大核心 2010年第1期121-129,共9页 Journal of Computer Research and Development
基金 国家自然科学基金项目(60833005 60573091) 国家"八六三"高技术研究发展计划基金项目(2007AA01Z155 2009AA011904) 高等学校博士学科点专项科研基金项目(200800020002)
关键词 隐私 连续查询 服务质量 基于位置服务 移动计算 privacy continuous query quality of service LBS mobile computing
  • 相关文献

参考文献10

  • 1潘晓,肖珍,孟小峰.位置隐私研究综述[J].计算机科学与探索,2007,1(3):268-281. 被引量:66
  • 2Mokbel M F, Chow C Y, Aref W G. The new Casper: Query processing for location services without compromising privacy [C] //Proc of the 32nd Int Conf on Very Large Data Bases (VLDB). New York: ACM, 2006:763-774.
  • 3Chow C, Mokbel M F. Enabling privacy continuous queries for revealed user locations [C]//LNCS 4605 : Proc of the Int Syrup on Advances in Spatial and Temporal Databases (SSTD). Berlin: Springer, 2007.
  • 4Gruteser M, Grunwal D. Anonymous usage of location-based services through spatial and temporal cloaking [C] //Proe of the Int Conf on Mobile Systems, Applications, and Services (MobiSys). New York: ACM, 2003:163-168.
  • 5Xiao Zhen, Xu Jianliang, Meng Xiaofeng. P-sensitivity: A semantic privacy-protection model for location-based services [C] //Proc of the 2nd Int Workshop on PriVacy-Aware Location-Based Mobile Services(PALMS). Piscataway, NJ: IEEE, 2008:47-54.
  • 6Bamba B, Liu L. Supporting anonymous location queries in mobile environments with privacy grid [C] //Proc of Int Conf on World Wide Web (WWW). New York: ACM, 2008: 237-246.
  • 7Kido H, Yanagisawa Y, Satoh T. Protection of location privacy using dummies for location-based services [C]//Proc of the 26th Int Conf on the Physics of Semiconductors (ICPS). Piseataway, NJ: IEEE, 2005: 1248-1248.
  • 8Ghinita G, Kalnis P, Khoshgozaran A, et al. Private queries in location based services: Anonymizers are not necessary [C] //Proe of ACM SIGMOD 2008. New York: ACM, 2008.
  • 9Xu T, Cai Y. Location anonymity in continuous location based services [C]//Proc of Int Symp on Advances in Geographic Information Systems(GIS). New York: ACM, 2007.
  • 10Brinkhoff T. A framework for generating network-based moving objects [J]. An Int Journal on Advances of Computer Science for Geographic Information Systems (Geolnformatica), 2002, 6(2): 153-180.

二级参考文献10

  • 1Atallah M J,Frikken K B.Privacy-preserving location-dependent query processing[].Proceeding of the IEEE/ACS International Conference on Pervasive Services(ICPS’).2004
  • 2Cheng R,Kalashnikov D V,Prabhakar S.Evaluating probabilistic queries over imprecise data[].Proceeding of ACM International Conference on Management of Data(SIGMOD’).2003
  • 3Machanavajjhala A,Gehrke J,et al.L-diversity:priva-cy beyond k-anonymity[].Proceedings ofnd Interna-tional Conference on Data Engineering(ICDE’).2006
  • 4Mokbel M F.Privacy in location-based services:start-of-the-art and research directions[].Proceeding ofth In-ternational Conference on Mobile Data Management(MDM’).2007
  • 5Man accused of stalking ex-girlfriend with GPS. http://www.foxnews.com/story/0,2933,131487,00.html . 2004
  • 6Authorities:GPS system used to stalk woman. http://www.usatoday.com/tech/news/2002-12-30-gps-stalker_x.htm . 2002
  • 7Sciannamea M.Companies increasingly use GPS-enable cell phones to track employees. http://wifi.weblogsinc.com/2004/09/24/companies-increasingly-use-gps-enabled-cell-phones-to-track/ . 2004
  • 8Gedik B,Liu L.Protecting location privacy with person-alized k-anonymity:architecture and algorithms[].IEEE Transactions on Mobile Computing.
  • 9Hong J I,Landay J A.An architecture for privacy-sen-sitive ubiquitous computing[].Proceedings of the Inter-national Conference on Mobile SystemsApplicationsand Services(MobiSys’).2004
  • 10Bettini C,Wang X S,Jajodia S.Protecting privacy a-gainst location-based personal identification[].Proceeding of the VLDB Workshop on Secure Data Management(SDM’).2005

共引文献65

同被引文献749

引证文献66

二级引证文献568

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部