期刊文献+

差分扰动的均衡增量近邻查询位置隐私保护方法 被引量:6

Homogeneous Incremental Nearest Neighbor Query Method Based on Differential Perturbation for Location Privacy Protection
在线阅读 下载PDF
导出
摘要 基于k-匿名的位置隐私保护方法已被广泛研究,但该方法需要可信第三方且无法防止有背景信息对手的攻击,容易泄露位置隐私.针对这一难题,提出一种差分扰动的均衡增量近邻查询位置隐私保护方法.向用户的真实位置添加可控的拉普拉斯噪声,生成干扰位置,并将其作为锚点发送给位置服务商.采用均衡增量近邻查询算法,解决Space Twist算法中兴趣点围绕真实位置分布不均匀的问题,提高查询准确度.实验结果表明,在考虑数据通信量的情况下,该方法比Space Twist方法在查询相似度和响应时间上均具有较高优势,实现了隐私保护度与服务质量的平衡. Location privacy protection method based on the k-anonymous has been widely studied,but it requires a trusted third party and can not prevent attacks from background information adversaries,making it easy to leak location privacy. In order to solve this problem,this paper proposed a homogeneous incremental nearest neighbor query method based on differential perturbation for location privacy protection,adding controllable Laplacian noise to the user's real location to generate an perturbation location and send it to the service provider. The homogeneous incremental neighbor query algorithm is used to address the problem that points of interest are found around the real position inhomogeneously in the SpaceTwist algorithm,which improves the query accuracy. The experimental results show that,under the condition of considering the data traffic,this method has a higher advantage than SpaceTwist method in query similarity and response time and achieves the balance between privacy protection and service quality.
作者 胡德敏 詹涵 HU De-min;ZHAN Han(School of Optical-Electrical and Computer Engineering,University of Shanghai for Science and Technology, Shanghai 200093, Chin)
出处 《小型微型计算机系统》 CSCD 北大核心 2018年第7期1482-1486,共5页 Journal of Chinese Computer Systems
基金 国家自然科学基金项目(61170277 61472256)资助 上海市教委科研创新重点项目(12zz17)资助 上海市一流学科建设项目(S1201YLXK)资助
关键词 背景信息 差分隐私 位置隐私 增量近邻查询 background information differential privacy location privacy incremental nearest neighbor query
  • 相关文献

参考文献4

二级参考文献55

  • 1Kido H, Yanagisawa Y, Satoh T. An anonymous communication technique using dummies for location-based services[C]//Inter- national Conference on Pervasive Services, 2005 ( ICPS' 05 ). 1EEE, 2005 : 88-97.
  • 2Gruteser M, Grunwald D. Anonymous usage of location based services through spatial and temporal eloaking[C]//Proceedings of the 1st International Conference on Mobile Systems, Applica- tions and Services. ACM, 2003 : 31-42.
  • 3Gedik B, Liu L. Protecting location privacy with personalized k- anonymity:Architecture and algorithms[J]. IEEE Transactions on Mobile Computing, 2008,7 ( 1 ) : 1-18.
  • 4Mokbel M F, Chow C Y, Aref W G. The new Casper: query pro- cessing for location services without compromising privaey[C]// Proceedings of the 32nd International Conference on Very Large Data Bases. VLDB Endowment, 2006 : 763-774.
  • 5Yiu M L,Jensen C S, Huang X, et al. Spacetwist: Managing the trade-offs among location privacy, query performance, and query accuracy in mobile services[C]//IEEE 24th International Con- ference on Data Engineering, 2008 (ICDE 2008). tEEE, 2008 : 366-375.
  • 6Pan X, Xu J, Meng X. Protecting location privacy against loca- tion-dependent attacks in mobile services[J]. IEEE Transactions on Knowledge and Data Engineering,2012,24(8) : 1506-1519.
  • 7Li Qian-mu, Zhang Hong. Information Security Risk Assessment Technology of Cyberspace: a Review[J]. Information- an Inter- national Interdisciplinary Journal, 2012,15 ( 11 ) : 4677-4684.
  • 8Brinkhoff T. A framework for generating network-based moving objects[J]. GeoInformatica, 2002,6 (2): 153-180.
  • 9Li Qian mu, Hou Jun,Qi Yong, et al. The Rule Engineer Model on the high-speed processing of Disaster Warning Information [J]. Disaster Advances,2012,5(4) :432-437.
  • 10Shin K G,Ju X,Chen Z, e:t al. Privacy protection for users of lo- cation-based services [J ]. Wireless Communications, IEEE, 2012,19(1):30-39.

共引文献59

同被引文献29

引证文献6

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部