计算机科学 ›› 2019, Vol. 46 ›› Issue (5): 122-128.doi: 10.11896/j.issn.1002-137X.2019.05.019

• 信息安全 • 上一篇    下一篇

基于预先缓存的连续查询隐私保护机制

顾一鸣1,2, 白光伟1, 沈航1,3, 胡煜家1,2   

  1. (南京工业大学计算机科学与技术学院 南京211816)1
    (南京大学计算机软件新技术国家重点实验室 南京210093)2
    (南京邮电大学通信与网络技术国家工程研究中心 南京210003)3
  • 收稿日期:2018-04-12 修回日期:2018-07-15 发布日期:2019-05-15
  • 作者简介:顾一鸣(1994-),男,硕士生,主要研究方向为隐私保护,E-mail:Jim_Conley@163.com;白光伟(1961-),男,博士,教授,博士生导师,CCF杰出会员,主要研究方向为无线传感器网络、移动互联网、网络体系结构和协议、网络系统性能分析和评价、多媒体网络服务质量等,E-mail:bai@njtech.edu.cn(通信作者);沈 航(1984-),男,博士,讲师,硕士生导师,CCF会员,主要研究方向为无线网络编码、移动互联网、无线多媒体通信协议等;胡煜家(1993-),男,硕士生,主要研究方向为隐私保护。
  • 基金资助:
    国家自然科学基金项目(61502230,61073197),江苏省自然科学基金项目(BK20150960),江苏省普通高校自然科学研究项目(15KJB520015),南京市科技计划项目(201608009),南京大学计算机软件新技术国家重点实验室资助项目(KFKT2017B21),南京邮电大学通信与网络技术国家工程研究中心资助项目,江苏省六大高峰人才基金资助项目(第八批)资助。

Pre-cache Based Privacy Protection Mechanism in Continuous LBS Queries

GU Yi-ming1,2, BAI Guang-wei1, SHEN Hang1,3, HU Yu-jia1,2   

  1. (College of Computer Science and Technology,Nanjing Tech University,Nanjing 211816,China)1
    (State Key Laboratory for Novel Software Technology (Nanjing University),Nanjing 210093,China)2
    (National Engineering Research Center for Communication and Network Technology (Nanjing University of Posts and Telecommunications),Nanjing 210003,China)3
  • Received:2018-04-12 Revised:2018-07-15 Published:2019-05-15

摘要: 位置数据带来了巨大的经济效益,但位置隐私泄露的问题也随之而来。针对连续R-range查询中遭到的最大移动边界(Maximum Movement Boundary,MMB)攻击问题,提出一种基于预先缓存的隐私保护机制。首先,提出伪随机泛化方法,以在保证位置隐私的基础上控制快照查询的泛化区域;接着,在该泛化查询区域内预测即将到达的路口,利用路口位置计算并预先缓存下一泛化查询区域。预先缓存的方法降低了连续查询间的时间关联,并提高了隐私保护水平。性能分析和实验结果表明,所提隐私保护机制能有效地减少最大移动边界攻击带来的隐私泄露问题。

关键词: 边缘计算, 连续查询, 隐私保护, 最大移动边界攻击

Abstract: Location data bring huge economic benefits,but the problem of leaking location privacy also follows.Aiming at the problem of maximum movement boundary (MMB) attack in continuous R-range queries,this paper proposed a pre-cache based privacy protection mechanism.First,a pseudo-random generalization method is proposed to control the generalized area of the snapshot query on the basis of protecting location privacy.Then,the upcoming intersection is predicted within the generalized query area.The next generalized query area is calculated and pre-cached with the intersection position.Through the pre-caching method,the time correlation between consecutive queries is reduced and the privacy protection level is improved.Performance analysis and experimental results show that the proposed privacy protection mechanism can effectively reduce the privacy leakage caused by the maximum movement boundary attack.

Key words: Continuous queries, Edge computing, Maximum movement boundary attack, Privacy protection

中图分类号: 

  • TP309.2
[1]NIU B,LI Q,ZHU X,et al.Achieving k-anonymity in privacy-aware location-based services[C]∥INFOCOM,2014 Proceedings IEEE.IEEE,2014:754-762.
[2]NIU B,ZHANG Z,LI X,et al.Privacy-area aware dummy gene-ration algorithms for location-based services[C]∥2014 IEEE International Conference on Communications (ICC).IEEE,2014:957-962.
[3]SUN Y,ZHANG B,ZHAO B,et al.Mix-zones optimal deployment for protecting location privacy in VANET[J].Peer-to-Peer Networking and Applications,2015,8(6):1108-1121.
[4]CICEK A E,NERGIZ M E,SAYGIN Y.Ensuring location diversity in privacy-preserving spatio-temporal data publishing[J].The VLDB Journal,2014,23(4):609-625.
[5]ZHANG X,XIA Y,BAE H Y.A novel location privacy preservation method for moving object[J].International Journal of Security and ItsApplications,2015,9(2):1-12.
[6]SHI W S,SUN H,CAO J,et al.Edge Computing:An Emerging Computing Model for Internet of Everything Era[J].Journal of Computing Research and Development,2017,54(5):907-924.(in Chinese)施巍松,孙辉,曹杰,等.边缘计算:万物互联时代新型计算模型[J].计算机研究与发展,2017,54(5):907-924.
[7]WAN S,LI F H,NIU B,et al.Research progress on locationprivacy-preserving techniques[J].Journal of Communications,2017,37(12):124-141.(in Chinese)万盛,李凤华,牛犇,等.位置隐私保护技术研究进展[J].通信学报,2017,37(12):124-141.
[8]YANG X,ZHU Y,HU Q.Improved location privacy protection method based on SpaceTwist[J].Journal of Hebei University (Natural Science Edition),2017,37(3):287-293.
[9]NIU B,ZHU X,LI W,et al.Epcloak:An efficient and privacy-preserving spatial cloaking scheme for lbss[C]∥2014 IEEE 11th International Conference on Mobile Ad Hoc and Sensor Systems (MASS).IEEE,2014:398-406.
[10]KIM Y K,HOSSAIN A,HOSSAIN A A,et al.Hilbert-orderbased spatial cloaking algorithm in road network[J].Concurrency and Computation:Practice and Experience,2013,25(1):143-158.
[11]CHOW C Y,MOKBEL M F.Enabling private continuous queries for revealed user locations[C]∥International Symposium on Spatial and Temporal Databases.Berlin:Springer,2007:258-275.
[12]ZHOU C L,MA C G,YANG S T.Location privacy-preserving method for LBS continuous KNN query in road networks[J].Journal of Computer Research and Development,2014,49(7):1001-1016.(in Chinese)周长利,马春光,杨松涛.路网环境下保护 LBS 位置隐私的连续 KNN 查询方法[J].Journal of Computer Research and Development,2014,49(7):1001-1016.
[13]CHENG R,ZHANG Y,BERTINO E,et al.Preserving user location privacy in mobile data management infrastructures[C]∥International Workshop on Privacy Enhancing Technologies.Berlin:Springer,2006:393-412.
[14]GHINITA G,SILVESTRI C,SILVESTRI C,et al.Preventingvelocity-based linkage attacks in location-aware applications[C]∥ACM Sigspatial International Conference on Advances in Geographic Information Systems.ACM,2009:246-255.
[15]HASHEM T,KULIK L,ZHANG R.Countering overlappingrectangle privacy attack for moving knnqueries[J].Information Systems,2013,38(3):430-453.
[16]NGUYEN N,HAN S,SHIN M.URALP:unreachable region aware location privacy against maximum movement boundary attack[J].International Journal of Distributed Sensor Networks,2015,11(8):246216.
[1] 鲁晨阳, 邓苏, 马武彬, 吴亚辉, 周浩浩.
基于分层抽样优化的面向异构客户端的联邦学习
Federated Learning Based on Stratified Sampling Optimization for Heterogeneous Clients
计算机科学, 2022, 49(9): 183-193. https://doi.org/10.11896/jsjkx.220500263
[2] 孙慧婷, 范艳芳, 马孟晓, 陈若愚, 蔡英.
VEC中基于动态定价的车辆协同计算卸载方案
Dynamic Pricing-based Vehicle Collaborative Computation Offloading Scheme in VEC
计算机科学, 2022, 49(9): 242-248. https://doi.org/10.11896/jsjkx.210700166
[3] 汤凌韬, 王迪, 张鲁飞, 刘盛云.
基于安全多方计算和差分隐私的联邦学习方案
Federated Learning Scheme Based on Secure Multi-party Computation and Differential Privacy
计算机科学, 2022, 49(9): 297-305. https://doi.org/10.11896/jsjkx.210800108
[4] 吕由, 吴文渊.
隐私保护线性回归方案与应用
Privacy-preserving Linear Regression Scheme and Its Application
计算机科学, 2022, 49(9): 318-325. https://doi.org/10.11896/jsjkx.220300190
[5] 于滨, 李学华, 潘春雨, 李娜.
基于深度强化学习的边云协同资源分配算法
Edge-Cloud Collaborative Resource Allocation Algorithm Based on Deep Reinforcement Learning
计算机科学, 2022, 49(7): 248-253. https://doi.org/10.11896/jsjkx.210400219
[6] 李梦菲, 毛莺池, 屠子健, 王瑄, 徐淑芳.
基于深度确定性策略梯度的服务器可靠性任务卸载策略
Server-reliability Task Offloading Strategy Based on Deep Deterministic Policy Gradient
计算机科学, 2022, 49(7): 271-279. https://doi.org/10.11896/jsjkx.210600040
[7] 王健.
基于隐私保护的反向传播神经网络学习算法
Back-propagation Neural Network Learning Algorithm Based on Privacy Preserving
计算机科学, 2022, 49(6A): 575-580. https://doi.org/10.11896/jsjkx.211100155
[8] 方韬, 杨旸, 陈佳馨.
D2D辅助移动边缘计算下的卸载策略优化
Optimization of Offloading Decisions in D2D-assisted MEC Networks
计算机科学, 2022, 49(6A): 601-605. https://doi.org/10.11896/jsjkx.210200114
[9] 刘漳辉, 郑鸿强, 张建山, 陈哲毅.
多无人机使能移动边缘计算系统中的计算卸载与部署优化
Computation Offloading and Deployment Optimization in Multi-UAV-Enabled Mobile Edge Computing Systems
计算机科学, 2022, 49(6A): 619-627. https://doi.org/10.11896/jsjkx.210600165
[10] 袁昊男, 王瑞锦, 郑博文, 吴邦彦.
基于Fabric的电子病历跨链可信共享系统设计与实现
Design and Implementation of Cross-chain Trusted EMR Sharing System Based on Fabric
计算机科学, 2022, 49(6A): 490-495. https://doi.org/10.11896/jsjkx.210500063
[11] 谢万城, 李斌, 代玥玥.
空中智能反射面辅助边缘计算中基于PPO的任务卸载方案
PPO Based Task Offloading Scheme in Aerial Reconfigurable Intelligent Surface-assisted Edge Computing
计算机科学, 2022, 49(6): 3-11. https://doi.org/10.11896/jsjkx.220100249
[12] 周天清, 岳亚莉.
超密集物联网络中多任务多步计算卸载算法研究
Multi-Task and Multi-Step Computation Offloading in Ultra-dense IoT Networks
计算机科学, 2022, 49(6): 12-18. https://doi.org/10.11896/jsjkx.211200147
[13] 李利, 何欣, 韩志杰.
群智感知的隐私保护研究综述
Review of Privacy-preserving Mechanisms in Crowdsensing
计算机科学, 2022, 49(5): 303-310. https://doi.org/10.11896/jsjkx.210400077
[14] 彭冬阳, 王睿, 胡谷雨, 祖家琛, 王田丰.
视频缓存策略中QoE和能量效率的公平联合优化
Fair Joint Optimization of QoE and Energy Efficiency in Caching Strategy for Videos
计算机科学, 2022, 49(4): 312-320. https://doi.org/10.11896/jsjkx.210800027
[15] 王美珊, 姚兰, 高福祥, 徐军灿.
面向医疗集值数据的差分隐私保护技术研究
Study on Differential Privacy Protection for Medical Set-Valued Data
计算机科学, 2022, 49(4): 362-368. https://doi.org/10.11896/jsjkx.210300032
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!