计算机科学 ›› 2018, Vol. 45 ›› Issue (10): 142-149.doi: 10.11896/j.issn.1002-137X.2018.10.027
熊婉竹, 李晓宇
XIONG Wan-zhu, LI Xiao-yu
摘要: 为了保证移动节点在使用基于位置的服务时的位置隐私,提出基于匿名路由的移动位置隐私保护方法。该方法将移动网络中的每一个移动节点都当作可以使用的中转节点,采用重路由的方式进行路由选择,第一跳用随机选取的方式选择中转节点,剩下的路径选择通过一定的转发概率来确定下一跳并将其发送给中转节点或LBS服务器。为保证位置信息不被泄露,移动发送节点用目标服务器的公钥对地理位置信息和查询信息进行加密,再利用下一跳的公钥对已加密的内容进行二次加密,并转发给下一跳。同时中转节点收到后,用当前节点的私钥解密,解密时只能解密最外层,再用随机选取的下一跳的公钥加密,重复此过程,直至LBS服务器接收到移动发送节点发来的信息。理论分析和实验结果表明,这种移动位置隐私保护方式可以保证LBS服务器和任何中转节点都不能获取移动发送节点的位置隐私,可以在较低的代价下实现移动发送节点的位置隐私保护。并且在该方案中中转节点可以是移动网络中的任意一个节点,不会因为部分节点故障导致通信失败,因此所提方案的健壮性较好。
中图分类号:
[1]SHIN K G,JU X,CHEN Z,et al.Privacy protection for users of location-based services[J].Wireless Communications IEEE,2012,19(1):30-39. [2]CHAUM D L.Untraceble electronic mail,return addresses,and digital pseudonyms[J].Communications of the ACM,1981,24(2):84-88. [3]SYVERSON P F,GOLDSCHLAG D M,REED M G.Anonymous Connections and Onion Routing[C]∥IEEE Symposium on Security and Privacy.IEEE Computer Society,1997:44. [4]DINGLEDINE R,MATHEWSON N,SYVERSON P.Tor:the second-generation onion router[C]∥Conference on Usenix Security Symposium.USENIX Association,2004:21. [5]RELTER M K,RUBIN A D.Crowds:Anonymity for web Transactions[J].ACM Transactions on Information and System Security,1998,1(1):62-92. [6]PENG Z Y,LI S P.Protecting Location Privacy in Location- based Services in Mobile Environments[J].Journal of Electroni-cs & Information Technology,2011,33(5):1211-1216.(in Chinese) 彭志宇,李善平.移动环境下LBS位置隐私保护[J].电子与信息学报,2011,33(5):1211-1216. [7]SWEENEY L.k-ANONYMITY:A Moedl for Protecting Privacy[J].International Journal of Uncertainty,Fuzziness and Knowledge-Based Systems,2002,10(5):557-570. [8]LUO J,LIAO J G,LI X.LocPriv:a Scheme on Location Privacy Protection Based on Spatial Region Anonymity[J].Smallmicrocomputer Submission,2016,37(6):1273-1278.(in Chinese) 罗健,廖俊国,李雄.LocPriv:一种基于空间区域匿名的位置隐私保护方案[J].小型微型计算机系统,2016,37(6):1273-1278. [9]GKOULALAS-DIVANIS A,KALNIS P,VERYKIOS V S.Providing K-Anonymity in location based services[J].ACM,2010,12(1):3-10. [10]XU H Y,XU J GONG Y J,et al.Algorithms to Generate Location Privacy Protection with Spatial Cloaking[J].Journal of South China University of Technology(Natural Science Edition),2014,42(1):97-103.(in Chinese) 徐红云,许隽,龚羽菁,等.基于空间混淆位置隐私保护的位置隐私区域生成算法[J].华南理工大学学报(自然科学版),2014,42(1):97-103. [11]KHOSHGOZARAN A,SHAHABI C.Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy[C]∥International Conference on Advances in Spatial and Temporal Databases.Springer-Verlag,2007:239-257. [12]LIU X J,CHEN Y F,LI B.Mobile Location Privacy Protection Based on Untrusted Environment[J].Computer Science,2015,42(2):108-113.(in Chinese) 刘学军,陈玉凤,李斌.基于不可信环境的移动位置隐私保护[J].计算机科学,2015,42(2):108-113. [13]HUO Z,MENG X F.A Surey of Trajectory Privacy-Preserving Techniques[J].Chinese Journal of Comuputers,2011,34(10):1820-1830.(in Chinese) 霍峥,孟小峰.轨迹隐私保护技术研究[J].计算机学报,2011,34(10):1820-1830. [14]MENG X F,PAN X.Privacy Preservation based on Location Services[J].Communications of the CCF,2010,6(6):16-23.(in Chinese) 孟晓峰,潘晓.基于位置服务的隐私保护[J].中国计算机协会通讯,2010,6(6):16-23. [15]HUANG X H.Research on Location Privacy Preservation in Location-based Services[D].Chengdu:University of Electronic Science and Technology of China,2016.(in Chinese) 黄勋辉.基于位置服务的位置隐私保护研究[D].成都:电子科技大学,2016. [16]SEN S,WANG J.Analyzing peer-to-peer traffic across large networks[J].IEEE/ACM Transactions on Networking,2004,12(2):219-232. [17]REITER M K.Crowds:anonymity for Web transactions[J]. Acm Transactions on Information & System Security,1998,1(1):66-92. [18]DIAZ C,CLAESSENS J,PRENEEL B.APES:Anonymity and Privacy in Electronic Services[J].Datenschutz Und Datensicherheit,2005,27(3):143-145. |
[1] | 王磊, 李晓宇. 基于随机洋葱路由的LBS移动隐私保护方案 LBS Mobile Privacy Protection Scheme Based on Random Onion Routing 计算机科学, 2022, 49(9): 347-354. https://doi.org/10.11896/jsjkx.210800077 |
[2] | 周连兵, 周湘贞, 崔学荣. 基于双重二维混沌映射的压缩图像加密方案 Compressed Image Encryption Scheme Based on Dual Two Dimensional Chaotic Map 计算机科学, 2022, 49(8): 344-349. https://doi.org/10.11896/jsjkx.210700235 |
[3] | 李瑭, 秦小麟, 迟贺宇, 费珂. 面向多无人系统的安全协同模型 Secure Coordination Model for Multiple Unmanned Systems 计算机科学, 2022, 49(7): 332-339. https://doi.org/10.11896/jsjkx.210600107 |
[4] | 张振超, 刘亚丽, 殷新春. 适用于物联网环境的无证书广义签密方案 New Certificateless Generalized Signcryption Scheme for Internet of Things Environment 计算机科学, 2022, 49(3): 329-337. https://doi.org/10.11896/jsjkx.201200256 |
[5] | 陈海彪, 黄声勇, 蔡洁锐. 一个基于智能电网的跨层路由的信任评估协议 Trust Evaluation Protocol for Cross-layer Routing Based on Smart Grid 计算机科学, 2021, 48(6A): 491-497. https://doi.org/10.11896/jsjkx.201000169 |
[6] | 姜昊堃, 董学东, 张成. 改进的具有前向安全性的无证书代理盲签名方案 Improved Certificateless Proxy Blind Signature Scheme with Forward Security 计算机科学, 2021, 48(6A): 529-532. https://doi.org/10.11896/jsjkx.200700049 |
[7] | 石铁柱, 钱俊彦, 潘海玉. 模糊安全性和活性 Fuzzy Safety and Liveness Properties 计算机科学, 2021, 48(4): 31-36. https://doi.org/10.11896/jsjkx.200500036 |
[8] | 叶胜男, 陈建华. 一个强安全的无证书签名方案的分析和改进 Security Analysis and Improvement of Strongly Secure Certificateless Digital Signature Scheme 计算机科学, 2021, 48(10): 272-277. https://doi.org/10.11896/jsjkx.201200117 |
[9] | 蒲泓全, 崔喆, 刘霆, 饶金涛. 安全性电子投票方案研究综述 Comprehensive Review of Secure Electronic Voting Schemes 计算机科学, 2020, 47(9): 275-282. https://doi.org/10.11896/jsjkx.190900125 |
[10] | 董奇颖, 单轩, 贾春福. 口令Zipf分布对相关安全协议的影响分析 Impact of Zipf's Law on Password-related Security Protocols 计算机科学, 2020, 47(11): 42-47. https://doi.org/10.11896/jsjkx.200500144 |
[11] | 蔡泳, 钱俊彦, 潘海玉. 基于度量线性时态逻辑的近似安全性 Approximate Safety Properties in Metric Linear Temporal Logic 计算机科学, 2020, 47(10): 309-314. https://doi.org/10.11896/jsjkx.191000175 |
[12] | 孙宝华, 胡楠, 李东洋. 基于神经网络和NLP的软件需求安全分析研究 Analysis Research of Software Requirement Safety Based on Neural Network and NLP 计算机科学, 2019, 46(6A): 348-352. |
[13] | 徐丙凤, 何高峰, 张黎宁. 基于状态事件故障树的信息物理融合系统风险建模 Risk Modeling for Cyber-physical Systems Based on State/Event Fault Trees 计算机科学, 2019, 46(5): 105-110. https://doi.org/10.11896/j.issn.1002-137X.2019.05.016 |
[14] | 柴林鹏, 张斌. 一种抗不诚实第三方攻击的一次性公钥方案 One-off Public Key Scheme for Preventing Dishonest Third Party Attacking 计算机科学, 2018, 45(7): 139-142. https://doi.org/10.11896/j.issn.1002-137X.2018.07.023 |
[15] | 吴伟坚,陈世国,李丹. 二重keeloq算法在智能门禁系统中的应用研究 Application of Dual Keeloq Algorithm in Intelligent Access Control System 计算机科学, 2018, 45(6A): 573-575. |
|