期刊文献+

面向RFID的位置隐私保护算法研究 被引量:5

Study on RFID-oriented Location Privacy Protection Algorithm
在线阅读 下载PDF
导出
摘要 随着移动无线技术和物联网的发展,随时随地获得个人或物品的位置信息成为可能,基于位置的隐私保护已成为当今社会中的重要问题。文中以提高隐私保护能力和位置服务效率为目标,对RFID追踪系统中的隐私保护问题进行研究,分析了现有的位置隐私保护方法,通过对已有算法加以改进,设计了一种高效的不依赖于可信服务器的RFID位置隐私保护算法。该算法用hash加密的方法对ID信息进行加密,利用垂直数据划分把时间和位置信息分别存储在不同的物理空间。理论分析和测试实验表明,所设计的算法在保护用户隐私的同时,执行效率更高。 With the development of mobile wireless technology and the Internet of Things, users can achieve location information of indi- viduals and goods in anywhere and anytime. Location-based privacy protection has become an important issue in today's society. In order to enhance the privacy protection capability and the efficiency of location-based services,it studies the privacy protection issues in RFID tracking system, analyzes the existing location privacy protection method, and designs a higher efficient location privacy protection algo- rithm by improving the existing algorithm. The improved algorithm is not dependent on reliable service. It encrypts the ID information with hash encryption method and stores time information and location information in separate physical space with vertical data partitioning method. The theoretical analysis and test results show that the algorithm has the higher efficiency while protecting user privacy.
出处 《计算机技术与发展》 2013年第1期157-160,共4页 Computer Technology and Development
基金 国家"973"重点基础研究发展计划项目(2011CB302903)
关键词 位置隐私 隐私保护 数据库安全 RFID location-based privacy privacy protection database security RFID
  • 相关文献

参考文献12

  • 1王利明,徐明,杨立新.人格权法新论[M].长春:吉林人民出版社,1994.
  • 2潘晓,肖珍,孟小峰.位置隐私研究综述[J].计算机科学与探索,2007,1(3):268-281. 被引量:66
  • 3Sen J. Privacy Preservation Technologies in Intemet of Things [ J ]. Journal BITM Transactions on EECC ,2009,1(4):496- 504.
  • 4魏琼,卢炎生.位置隐私保护技术研究进展[J].计算机科学,2008,35(9):21-25. 被引量:20
  • 5Beresford A R, Stajano F. Location privacy in pervasive computing[ J ]. IEEE Pervasive Computing,2003,2(1) :46-55.
  • 6Gruteser M ,Grunwald D. Anonymous Usage of l.ocation-based and Services through Spatial and Temporal Cloaking [ C ]// Proc. of the 1st International Conference on Mobile Systems, Applications and Services. New York: ACM ,2003 : 163 - 168.
  • 7杨勇,方勇,周安民.秘密同态技术研究及其算法实现[J].计算机工程,2005,31(2):157-159. 被引量:18
  • 8Tan C C,Xie Lei,Li Qun. Privacy Protection for RFID-based Tracking Systems [C]//IEEE International Conference on RFID. [s. l. ] :[s.n. ] ,2010:53-60.
  • 9Yang Z,Zhong S, Deng R H, et al. Privacy-preserving queries on encrypted data[C]//Eurupean Symposium on Research in Computer Security (ESORICS). [ s. l. ] : [ s. n. ] ,2006.
  • 10Rodden T, Friday A, Muller H, et al. A lightweight approach to managing privacy in location-based services [J/OL]. 2002. http://comp, eprints, lancs, ac. uk/1475/1/rodden- light- weightprivacy-2002. pdf.

二级参考文献79

  • 1潘晓,肖珍,孟小峰.位置隐私研究综述[J].计算机科学与探索,2007,1(3):268-281. 被引量:66
  • 2Chow C, Mokbel M F. Enabling privacy continuous queries for revealed user locations E C ]//Proc of the Int Symposium on Advances in Spatial and Temporal Databases ( SSTD ). Boston: Springer,2007.
  • 3Mokbel M F, Chow C Y, Aref W G. The new casper: qury processing for location services without compromising privacy[C]// Proc of the 32rid International Conference on Very Large Data Bases ( VLDB ). New York: ACM, 2006 : 763 -774.
  • 4Gruteser M, Grunwal D. Anonymous usage of location- based services through spatial and temporal cloaking [ C ]// Proc of the Int Conference on Mobile Systems, Applications, and Services ( MobiSys). New York:ACM ,2003 : 163 - 168.
  • 5Dewri R,Ray I,Ray l,et al. Query m-Invariance: Preven- ting Query Disclosures in Continuous Location-Based Services[ C ]//11th International Conference on Mobile Data Management ( MDM ). Kansas City, Missouri, USA : [ s. n. ] ,2010:95-104.
  • 6Liu F, Hua K A, Cai Y. Query l-Diversity in Location- Based Services[ C],//Proceedings of the 10th International Conference on Mobile Data Management: Systems, Services and Middleware. [ s. l. ] : [ s. n. ] ,2009:436-442.
  • 7Machanavajjhala A, Gehrke J, Kifer D, et al. Diversity: Privacy Beyond k - Anonymity[ C]//Proceedings of the 22nd International Conference on Data Engineering. [ s. l.] : [ s. n. ] ,2006.
  • 8Wang Yiming, Wang Lingyu, Fung B C M. Preserving Privacy for Location-Based Services with Continuous Queries [C]//IEEE International Conference on. [ s. l.]:[ s. n. ], 2009.
  • 9Xu T, Cai Ying. Location Anonymity in Continuous Location- based Services [ C ]//Proc. of Int Symposium on Ad- vances in Geographic Information Systems (GIS). New York: ACM,2007.
  • 10Amoli A S, Kharrazi M, Jalili R. 2PLoc: Preserving Privacy in Location-Based Services [ C ]//IEEE International Conference on Privacy, Security, Risk and Trust (PASSAT10). [s.l.]:[s.n.], 2010.

共引文献210

同被引文献37

  • 1曲贵波,乔爽.PC机与单片机串行通信的实现方法探讨[J].交通科技与经济,2005,7(3):46-47. 被引量:7
  • 2周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:215
  • 3曾丽华,熊璋,张挺.Key值更新随机Hash锁对RFID安全隐私的加强[J].计算机工程,2007,33(3):151-153. 被引量:34
  • 4Deng J, Han R, Mishra S. Countermeasures against traffic a- nalysis attacks in wireless sensor networks [ C ]//Proc of first international conference on security and privacy for emerging areas in communication networks. [ s. 1. ] : IEEE, 2005 : 113 - 126.
  • 5郑文先.无线传感器网络位置隐私路由研究[D].成都:电子科技大学,2012.
  • 6郭娜.一种基于匿名的位置隐私保护方法的研究[D].哈尔滨:哈尔滨工程大学,2012.
  • 7Dutta N, Saxena A, Chellappan S. Defending wireless sensors networks against adversarial location [ C ]//Proc of 11 th inter- national conference on mobile data management. Kansas City, MO, USA : IEEE ,2010:336-341.
  • 8Khoshgozaran A, Shahabi C, Shiran- Mehr H. Location priva- cy:going beyond k-anonymity, cloaking and anonymizers [ J ]. Knowledge and Information Systems, 2011,26 ( 3 ) :435-465.
  • 9Bicakci K, Bagci I E, Tavli B. Life bounds of wireless sensor networks preserving perfect sink unobservability [ J ]. IEEE Communications Letters ,2011,15 ( 2 ) :205-207.
  • 10Luo Xi, Ji Xu, Park Myong- Soon. Location privacy against traffic analysis attacks in wireless sensor networks [ C ]//Proc of international conference on information science and applica- tions. Seoul : IEEE ,2010 : 1-6.

引证文献5

二级引证文献52

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部