计算机科学 ›› 2021, Vol. 48 ›› Issue (10): 266-271.doi: 10.11896/jsjkx.200900021
魏礼奇, 赵志宏, 白光伟, 沈航
WEI Li-qi, ZHAO Zhi-hong, BAI Guang-wei, SHEN Hang
摘要: 文中提出了一种以用户为中心的位置隐私博弈机制,目的是在满足LBS服务质量的基础上生成对应的保护策略,并减小计算规模和效用损失。该机制以Stackelberg博弈模型为基础,用户在请求LBS服务时,采用位置模糊机制对自身位置进行扰动后发送给LBS服务器,使攻击者难以推测自己的真实位置;攻击者根据已知的一部分背景知识,对匿名区域内用户的保护策略进行推断并调整攻击方式,最小化用户隐私水平。为了解决传统线性规划解法在现实场景中计算复杂度过高、实用性低的问题,文中采用生成对抗网络参与保护策略的生成,并尽可能降低效用代价。实验结果表明,该保护机制在隐私保护水平方面有着良好的表现,在损失一定服务质量的同时明显缩短了保护机制的生成时间。
中图分类号:
[1]SONG C,QU Z,BLUMM N,et al.Limits of predictability in human mobility[J].Science,2010,327(5968):1018-1021. [2]PELLUNGRINI R,PAPPALARDO L,PRATESI F,et al.A data mining approach to assess privacy risk in human mobility data[J].ACM Transactions on Intelligent Systems and Technology,2018,9(3):1-27. [3]YAO D,ZHANG C,HUANG J,et al.Serm:a recurrent model for next location prediction in semantic trajectories[C]//Procceding of ACM Conference on Information and Knowledge,Management (CIKM).2017:2411-2414. [4]ZHENG Y.Trajectory data mining:an overview[J].ACMTransactions on Intelligent Systems and Technology,2015,6(3):1-41. [5]BACKES M,HUMBERT M,PANG J,et al.Walk2friends:Inferring social links from mobility profiles[C]//Procceding of ACM SIGSAC Conference on Computer and Communications,Security (CCS).2017:1943-1957. [6]FAWAZ K,SHIN K G.Location privacy protection for smart-phone users[C]//Procceding of ACM SIGSAC Conference on Computer and Communications Security (CCS).2014:239-250. [7]XU Q,ZHENG R,TAHOUN E.Detecting location fraud in indoor mobile crowdsensing[C]//Procceding of the First ACM Workshop on Mobile Crowdsensing Systems and Applications (Crowd-SenSys).2017:44-49. [8]KONSTANTINIDIS A,CHATZIMILIOUDIS G,ZEINALI-POUR-YAZTI D,et al.Privacy-preserving indoor localization onsmartphones[J].IEEE Transactions on Knowledge & Data Engineering,2015,27(11):3042-3055. [9]ANDRES M E,BORDENABE N E,CHATZIKOKOLAKIS K.Geo-indistinguishability:differential privacy for location-based systems[C]//Procceding of the 20th ACM Conference on Computer and Communications Security (CCS).2013:901-914. [10]YIU M L,JENSEN C S,MOLLER J.Design and analysis of a ranking approach to private location-based services[J].ACM Transactions on Database Systems,2011,36(2):1-42. [11]PERAZZO P,DINI G.A uniformity-based approach to location privacy[J].Computer Communications,2015,64(1):21-32. [12]MARTUCCI L A,ZUCCATO A,FISCHER-HÜBNER S.Identity deployment and management in wireless mesh net-works[C]//IFIP International Summer School on the Future of Identity in the Information Society.Boston,MA:Springer,2007:223-233. [13]SCHAUB F,MA Z,KARGL F.Privacy requirements in vehicular communication systems[C]//2009 International Conference on Computational Science and Engineering.IEEE,2009,3:139-145. [14]KIDO H,YANAGISAWA Y,SATOH T.An anonymous communication technique using dummies for location-based services[C]//Procceding of IEEE International Conference on Pervasive Services (ICPS'05).2005:88-97. [15]SHOKRI R,THEODORAKOPOULOS G,TRONCOSO C.Protecting location privacy:optimal strategy against localization attacks[C]//Procceding of ACM Conference on Computer and Communications Security.2012:617-627. [16]TRIPATHY A,WANG Y,ISHWAR P.Privacy-preserving adversarial networks,CoRR,2017:abs/1712.07008 [OL].http://arxiv.org/abs/1712.07008. [17]BELGHAZI M I,BARATIN A,RAJESHWAR S,et al.Mutual information neural estimation[C]//International Conference on Machine Learning.PMLR,2018:531-540. [18]NOWOZIN S,CSEKE B,TOMIOKA R.f-GAN:training ge-nerative neural samplers using variational divergence minimization[C]//Procceding of the Annual Conference on Neural Information Processing Systems.2016:271-279. [19]GU Y M,BAI G W,SHEN H,et al.Precache Based Privacy Protection Mechanism in Continuous LBS Queries[J].Compu-ter Science,2019,46(5):122-128. |
[1] | 鲁晨阳, 邓苏, 马武彬, 吴亚辉, 周浩浩. 基于分层抽样优化的面向异构客户端的联邦学习 Federated Learning Based on Stratified Sampling Optimization for Heterogeneous Clients 计算机科学, 2022, 49(9): 183-193. https://doi.org/10.11896/jsjkx.220500263 |
[2] | 冷典典, 杜鹏, 陈建廷, 向阳. 面向自动化集装箱码头的AGV行驶时间估计 Automated Container Terminal Oriented Travel Time Estimation of AGV 计算机科学, 2022, 49(9): 208-214. https://doi.org/10.11896/jsjkx.210700028 |
[3] | 宁晗阳, 马苗, 杨波, 刘士昌. 密码学智能化研究进展与分析 Research Progress and Analysis on Intelligent Cryptology 计算机科学, 2022, 49(9): 288-296. https://doi.org/10.11896/jsjkx.220300053 |
[4] | 汤凌韬, 王迪, 张鲁飞, 刘盛云. 基于安全多方计算和差分隐私的联邦学习方案 Federated Learning Scheme Based on Secure Multi-party Computation and Differential Privacy 计算机科学, 2022, 49(9): 297-305. https://doi.org/10.11896/jsjkx.210800108 |
[5] | 吕由, 吴文渊. 隐私保护线性回归方案与应用 Privacy-preserving Linear Regression Scheme and Its Application 计算机科学, 2022, 49(9): 318-325. https://doi.org/10.11896/jsjkx.220300190 |
[6] | 姜洋洋, 宋丽华, 邢长友, 张国敏, 曾庆伟. 蜜罐博弈中信念驱动的攻防策略优化机制 Belief Driven Attack and Defense Policy Optimization Mechanism in Honeypot Game 计算机科学, 2022, 49(9): 333-339. https://doi.org/10.11896/jsjkx.220400011 |
[7] | 张佳, 董守斌. 基于评论方面级用户偏好迁移的跨领域推荐算法 Cross-domain Recommendation Based on Review Aspect-level User Preference Transfer 计算机科学, 2022, 49(9): 41-47. https://doi.org/10.11896/jsjkx.220200131 |
[8] | 李瑶, 李涛, 李埼钒, 梁家瑞, Ibegbu Nnamdi JULIAN, 陈俊杰, 郭浩. 基于多尺度的稀疏脑功能超网络构建及多特征融合分类研究 Construction and Multi-feature Fusion Classification Research Based on Multi-scale Sparse Brain Functional Hyper-network 计算机科学, 2022, 49(8): 257-266. https://doi.org/10.11896/jsjkx.210600094 |
[9] | 张光华, 高天娇, 陈振国, 于乃文. 基于N-Gram静态分析技术的恶意软件分类研究 Study on Malware Classification Based on N-Gram Static Analysis Technology 计算机科学, 2022, 49(8): 336-343. https://doi.org/10.11896/jsjkx.210900203 |
[10] | 何强, 尹震宇, 黄敏, 王兴伟, 王源田, 崔硕, 赵勇. 基于大数据的进化网络影响力分析研究综述 Survey of Influence Analysis of Evolutionary Network Based on Big Data 计算机科学, 2022, 49(8): 1-11. https://doi.org/10.11896/jsjkx.210700240 |
[11] | 孙奇, 吉根林, 张杰. 基于非局部注意力生成对抗网络的视频异常事件检测方法 Non-local Attention Based Generative Adversarial Network for Video Abnormal Event Detection 计算机科学, 2022, 49(8): 172-177. https://doi.org/10.11896/jsjkx.210600061 |
[12] | 戴朝霞, 李锦欣, 张向东, 徐旭, 梅林, 张亮. 基于DNGAN的磁共振图像超分辨率重建算法 Super-resolution Reconstruction of MRI Based on DNGAN 计算机科学, 2022, 49(7): 113-119. https://doi.org/10.11896/jsjkx.210600105 |
[13] | 陈明鑫, 张钧波, 李天瑞. 联邦学习攻防研究综述 Survey on Attacks and Defenses in Federated Learning 计算机科学, 2022, 49(7): 310-323. https://doi.org/10.11896/jsjkx.211000079 |
[14] | 李亚茹, 张宇来, 王佳晨. 面向超参数估计的贝叶斯优化方法综述 Survey on Bayesian Optimization Methods for Hyper-parameter Tuning 计算机科学, 2022, 49(6A): 86-92. https://doi.org/10.11896/jsjkx.210300208 |
[15] | 赵璐, 袁立明, 郝琨. 多示例学习算法综述 Review of Multi-instance Learning Algorithms 计算机科学, 2022, 49(6A): 93-99. https://doi.org/10.11896/jsjkx.210500047 |
|