计算机科学 ›› 2015, Vol. 42 ›› Issue (3): 158-161.doi: 10.11896/j.issn.1002-137X.2015.03.033
王鹏飞,李千目,朱保平
WANG Peng-fei, LI Qian-mu and ZHU Bao-ping
摘要: 随着基于位置的服务在人们日常生活中日益普及,个人的位置隐私正面临着严重的威胁。基于增量近邻查询思想,结合反映人口分布的路网环境,提出了一种新的位置隐私保护方法。该方法通过P2P系统结构摆脱了传统中心服务器结构的局限,解决了单点脆弱性问题,同时可以保证在P2P系统结构中代理用户非可信情况下用户的隐私安全。最后,在路网密度不同的模拟数据集上对提出的方法进行了实验,结果验证了该方法的有效性。
[1] 周傲英,杨彬,金澈清,等.基于位置的服务:架构与进展[J].计算机学报,2011,34(7):1155-1171 [2] Kido H,Yanagisawa Y,Satoh T.An anonymous communication technique using dummies for location-based services[C]∥International Conference on Pervasive Services,2005(ICPS’05).IEEE,2005:88-97 [3] Gruteser M,Grunwald D.Anonymous usage of location-based services through spatial and temporal cloaking[C]∥Proceedings of the 1st International Conference on Mobile Systems,Applications and Services.ACM,2003:31-42 [4] Gedik B,Liu L.Protecting location privacy with personalized k-anonymity:Architecture and algorithms[J].IEEE Transactions on Mobile Computing,2008,7(1):1-18 [5] Mokbel M F,Chow C Y,Aref W G.The new Casper:query processing for location services without compromising privacy[C]∥Proceedings of the 32nd International Conference on Very Large Data Bases.VLDB Endowment,2006:763-774 [6] 黄毅,霍峥,孟小峰.CoPrivacy:一种用户协作无匿名区域的位置隐私保护方法[J].计算机学报,2011,34(10):1976-1985 [7] Li Qian-mu,Li Jia.Rough Outlier Detection Based Security Risk Analysis Methodology[J].China Communications,2012,5(7):14-21 [8] Yiu M L,Jensen C S,Huang X,et al.Spacetwist:Managing the trade-offs among location privacy,query performance,and query accuracy in mobile services[C]∥IEEE 24th International Conference on Data Engineering,2008(ICDE 2008).IEEE,2008:366-375 [9] Pan X,Xu J,Meng X.Protecting location privacy against loca-tion-dependent attacks in mobile services[J].IEEE Transactions on Knowledge and Data Engineering,2012,24(8):1506-1519 [10] Li Qian-mu,Zhang Hong.Information Security Risk Assessment Technology of Cyberspace:a Review[J].Information- an International Interdisciplinary Journal,2012,15(11):4677-4684 [11] Brinkhoff T.A framework for generating network-based moving objects[J].GeoInformatica,2002,6(2):153-180 [12] Li Qian-mu,Hou Jun,Qi Yong,et al.The Rule Engineer Model on the high-speed processing of Disaster Warning Information[J].Disaster Advances,2012,5(4):432-437 [13] Shin K G,Ju X,Chen Z,et al.Privacy protection for users of location-based services[J].Wireless Communications,IEEE,2012,19(1):30-39 [14] Li Qianmu.Mulitiple QoS Constraints Finding Paths Algorithm in TMN[J].Information-an International Interdisciplinary Journal,2011,14(3):731-738 [15] Li Qian-mu,Hou Jun,Qi Yong.A classification matching and conflict resolution method on meteorological disaster monitoring information[J].Disaster Advances,2013,6(1):415-421 [16] 蔡朝晖,张健沛,杨静.一种基于多态关联挖掘的位置服务优化查询方法[J].计算机科学,2014,41(1):286-289 |
No related articles found! |
|