计算机科学 ›› 2013, Vol. 40 ›› Issue (7): 116-120.

• 信息安全 • 上一篇    下一篇

路网环境下基于Voronoi图的位置隐私保护方法

赵平,马春光,高训兵,朱蔚   

  1. 哈尔滨工程大学计算机科学与技术学院 哈尔滨150001;中国人民解放军91446部队 涿州072750;哈尔滨工程大学计算机科学与技术学院 哈尔滨150001;哈尔滨工程大学计算机科学与技术学院 哈尔滨150001;中国人民解放军91619部队 秦皇岛066000
  • 出版日期:2018-11-16 发布日期:2018-11-16
  • 基金资助:
    本文受国家自然科学基金(61170241),博士后科研人员落户黑龙江科研启动资助

Protecting Location Privacy with Voronoi Diagram over Road Networks

ZHAO Ping,MA Chun-guang,GAO Xun-bing and ZHU Wei   

  • Online:2018-11-16 Published:2018-11-16

摘要: 位置隐私泄露已经成为限制LBS应用普及的主要因素,而现有的位置隐私保护方法大都没有考虑移动用户所处的环境背景——道路网络。针对此问题,提出了一种基于路网环境的位置隐私保护方法,该方法主要包含3个部分:(1)利用Voronoi图原理构造路网V图,以满足用户路段多样性要求;(2)提出一种新的隐私模型——Vk-隐私模型,其兼顾匿名集内所有用户的隐私需求,并有效保证服务质量;(3)基于Vk-隐私模型提出一种新的位置匿名算法,它对同一V区内的多个用户进行共同匿名处理,以提高匿名效率和安全性。方法充分考虑了道路网络的结构特点,兼顾了用户的隐私需求与服务质量。通过理论分析论证了方法的抗推断攻击特性,并通过实验验证了方法的可行性。

关键词: 基于位置的服务,位置隐私,道路网络,Voronoi图 中图法分类号TP309文献标识码A

Abstract: Location privacy disclosure has become main constraint of LBS applications,while most existing location privacyprotection methods do not consider the background of mobile users——the road network.A location privacy protection method over road networks was presented.This method consists of three phases.First,in order to meet the requirement of segment l-diversity,the road-network Voronoi diagram is constructed based on the structure of the road network.Second,VK-privacy model is put forward.It satisfies all the users’ privacy requirement in the cloaking set and effectively insures the QoS of LBS.Finally,a clocking algorithm based on VK-privacy model is presented,which improves processing efficiency and safety by cloaking multiple users in the same V-region together.The method takes full account of the structure characteristics of road networks and leverages users’ privacy requirement and QoS of LBS.The robustness against inference attacksof the method was proved through theoretical analysis,and the feasibility of the method was proved by the experimental data.

Key words: LBS,Location privacy,Road network,Voronoi diagram

[1] Freudiger J,Shokri R,Hubaux J-P.Evaluating the Privacy Risk of Location-Based Services[A]∥15th International Conference on Financial Cryptography and Data Security[C].Gros Islet,St.Lucia,2012:31-46
[2] Cvrcek D,Kumpost M,Matyas V,et al.A study on the value of location privacy[A]∥WPES ’06:Proceedings of the 5th ACM workshop on Privacy in electronic society[C].New York,USA:ACM,2006:109-118
[3] Gruteser M,Grunwald D.Anonymous usage of location-based servicesthrough spatial and temporal cloaking[A]∥Proceedings of the 1st International Conference on Mobile Systems,Applicatio-ns and Services[C].San Francisco,USA:ACM,2003:163-168
[4] Sweeney L.k-anonymity:a model for protecting privacy[J].International Journal on Uncertainty,Fuzziness and Knowledge-based Systems,2002,10(5):557-570
[5] Mokbel M F,Chow C Y.Casper*:query processing for location services without compromising privacy[J].ACM Transactions on Data Systems,2009,34(4):24-48
[6] Machanavajjhala A,Kifer D,Gehrke J,et al.l-diversity:Privacy beyond k-anonymity[J].ACM Transactions on Knowledge Discovery from Data,2007,1(1):3
[7] Gedik B,Liu L.Protecting location privacy with personalized k-anonymity:Architecture and algorithms[A]∥IEEE Transactions on Mobile Computing[C].California,USA,2008:1-18
[8] Shin K G,Ju X,Chen Z,et al.Privacy protection for users of location-based services[J].IEEE Communications Society,2012,19(1):30-39
[9] Kalnis P,Ghinita G,Mouratidis K,et al.Preventing location-based identity inference in anonymous spatial queries[J].Knowledge and Data Engineering,2007,19(12):1719-1733
[10] Wang Ting,Liu Ling.Privacy-aware mobile services over road networks[J].VLDB Endowment,2009,2(1):1042-1053
[11] 徐建,徐明,林欣.路网限制环境中基于匿名蜂窝的位置隐私保护[J].浙江大学学报,2011,5(3):429-434
[12] 薛姣,刘向宇,杨晓春.一种面向公路网络的位置隐私保护方法[J].计算机学报,2011,4(5):865-878
[13] 魏琼,卢炎生.位置隐私保护技术研究进展[J].计算机科学,2008,5(9):21-25
[14] Wu Xiao-jun,Luo Xue-fang.The Algorithm for Creating Weighted Voronoi Diagrams based on Cellular Automata[A]∥The 6th World Congress on Intelligent Control and Automation[C].Dalian China:Luo Xue-fang,2006:4630-4633
[15] Brinkhoff T.Network-based generator of moving objects[A]∥Proceedings of the 12th International Conference on Scientific and Statistical Database Management[C].Oldenburg,Germany,2000:253-255

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!