计算机科学 ›› 2013, Vol. 40 ›› Issue (7): 116-120.
赵平,马春光,高训兵,朱蔚
ZHAO Ping,MA Chun-guang,GAO Xun-bing and ZHU Wei
摘要: 位置隐私泄露已经成为限制LBS应用普及的主要因素,而现有的位置隐私保护方法大都没有考虑移动用户所处的环境背景——道路网络。针对此问题,提出了一种基于路网环境的位置隐私保护方法,该方法主要包含3个部分:(1)利用Voronoi图原理构造路网V图,以满足用户路段多样性要求;(2)提出一种新的隐私模型——Vk-隐私模型,其兼顾匿名集内所有用户的隐私需求,并有效保证服务质量;(3)基于Vk-隐私模型提出一种新的位置匿名算法,它对同一V区内的多个用户进行共同匿名处理,以提高匿名效率和安全性。方法充分考虑了道路网络的结构特点,兼顾了用户的隐私需求与服务质量。通过理论分析论证了方法的抗推断攻击特性,并通过实验验证了方法的可行性。
[1] Freudiger J,Shokri R,Hubaux J-P.Evaluating the Privacy Risk of Location-Based Services[A]∥15th International Conference on Financial Cryptography and Data Security[C].Gros Islet,St.Lucia,2012:31-46 [2] Cvrcek D,Kumpost M,Matyas V,et al.A study on the value of location privacy[A]∥WPES ’06:Proceedings of the 5th ACM workshop on Privacy in electronic society[C].New York,USA:ACM,2006:109-118 [3] Gruteser M,Grunwald D.Anonymous usage of location-based servicesthrough spatial and temporal cloaking[A]∥Proceedings of the 1st International Conference on Mobile Systems,Applicatio-ns and Services[C].San Francisco,USA:ACM,2003:163-168 [4] Sweeney L.k-anonymity:a model for protecting privacy[J].International Journal on Uncertainty,Fuzziness and Knowledge-based Systems,2002,10(5):557-570 [5] Mokbel M F,Chow C Y.Casper*:query processing for location services without compromising privacy[J].ACM Transactions on Data Systems,2009,34(4):24-48 [6] Machanavajjhala A,Kifer D,Gehrke J,et al.l-diversity:Privacy beyond k-anonymity[J].ACM Transactions on Knowledge Discovery from Data,2007,1(1):3 [7] Gedik B,Liu L.Protecting location privacy with personalized k-anonymity:Architecture and algorithms[A]∥IEEE Transactions on Mobile Computing[C].California,USA,2008:1-18 [8] Shin K G,Ju X,Chen Z,et al.Privacy protection for users of location-based services[J].IEEE Communications Society,2012,19(1):30-39 [9] Kalnis P,Ghinita G,Mouratidis K,et al.Preventing location-based identity inference in anonymous spatial queries[J].Knowledge and Data Engineering,2007,19(12):1719-1733 [10] Wang Ting,Liu Ling.Privacy-aware mobile services over road networks[J].VLDB Endowment,2009,2(1):1042-1053 [11] 徐建,徐明,林欣.路网限制环境中基于匿名蜂窝的位置隐私保护[J].浙江大学学报,2011,5(3):429-434 [12] 薛姣,刘向宇,杨晓春.一种面向公路网络的位置隐私保护方法[J].计算机学报,2011,4(5):865-878 [13] 魏琼,卢炎生.位置隐私保护技术研究进展[J].计算机科学,2008,5(9):21-25 [14] Wu Xiao-jun,Luo Xue-fang.The Algorithm for Creating Weighted Voronoi Diagrams based on Cellular Automata[A]∥The 6th World Congress on Intelligent Control and Automation[C].Dalian China:Luo Xue-fang,2006:4630-4633 [15] Brinkhoff T.Network-based generator of moving objects[A]∥Proceedings of the 12th International Conference on Scientific and Statistical Database Management[C].Oldenburg,Germany,2000:253-255 |
No related articles found! |
|