计算机科学 ›› 2016, Vol. 43 ›› Issue (3): 137-144.doi: 10.11896/j.issn.1002-137X.2016.03.027

• 信息安全 • 上一篇    下一篇

路网环境下敏感位置匿名区域的生成方法

戴佳筑,华亮   

  1. 上海大学计算机工程与科学学院 上海200444,上海大学计算机工程与科学学院 上海200444
  • 出版日期:2018-12-01 发布日期:2018-12-01

Method of Anonymous Area Generation for Sensitive Location Protection under Road Networks

DAI Jia-zhu and HUA Liang   

  • Online:2018-12-01 Published:2018-12-01

摘要: 用户的位置信息涉及个人隐私,用户精确的位置信息可能会暴露其爱好、行为等敏感信息,因此,位置信息的匿名显得非常重要。现有的位置隐私保护方法大多是在欧氏空间下基于k-匿名算法生成位置匿名区域。欧氏空间下的k-匿名算法虽然可以在一定程度上解决用户位置信息的匿名保护问题,但是在现实生活中,用户的位置受路网环境影响较大,同时,欧氏空间下的k-匿名算法在生成匿名区域后对该区域是否还处于敏感范围内未做考虑。因此提出了一种路网环境下敏感位置匿名区域的生成方法。该方法基于空间划分,首先按照路网L-差异性要求对路网交叉点生成维诺图单元;接着考虑用户所处位置的敏感度,对用户位置生成匿名区域。实验结果表明,与一般的k-匿名算法生成的匿名区域相比,提出的算法能较好地解决一般k-匿名算法生成的匿名区域仍然处于敏感范围内的问题,从而更好地保护用户的位置隐私。

关键词: 维诺图,匿名区域,路网结构,位置敏感度,位置隐私

Abstract: Location information contains personal privacy,and the precise location information may disclose users’ hobby,behavior and other sensitive information.Therefore,the protection of location information privacy is very important.The existing methods of generating anonymous area for location privacy protection are mostly based on the k-anonymous algorithms under Euclidean space.Though they can anonymize user’s location in a certain extent,in real life,the location is influenced by the road networks environment seriously,at the same time,the k-anonymous algorithms under Euclidean space do not consider whether the generated anonymous area is still within sensitive region.This paper proposed a method of generating anonymous area for sensitive location protection under road networks.The method is based on space partition.Firstly,it generates the Voronoi cell for the node of road networks according to the demands of road networks L-diversity.Then combined with the sensitivity of the user’s location,it generates the anonymous area for user’s location.The experiment results show that compared with the existing k-anonymous algorithms,this algorithm achieves the goal that the generated anonymous area is not within sensitive region,therefore,it provides better protection for location privacy.

Key words: Voronoi,Anonymous area,Road networks structure,Location sensitivity,Location privacy

[1] Huo Zheng,Meng Xiao-feng.A Survey of Trajectory Privacy-Preserving Techniques[J].Chinese Journal of Computers,2011,34(10):1820-1830(in Chinese) 霍峥,孟小峰.轨迹隐私保护技术研究[J].计算机学报,2011,34(10):1820-1830
[2] Sweeney L.K-anonymity:a model for protecting privacy[J].International Journal on Uncertainty,Fuzziness and Knowledge based Systems,2002,10(5):557-570
[3] Gruteser M,Grunwald D.Anonymous usage of location-basedservices through spatial and temporal cloaking[C]∥Proceedings of the 1st International Conference on Mobile Systems,Applications and Services.ACM,2003:31-42
[4] Zhao Ze-mao,Hu Hui-dong,Zhang Fan,et al.A k-anonymousalgorithm in location privacy protection based on circular zoning[J].Journal of Beijing Jiaotong University,2013,7(5):13-18(in Chinese) 赵泽茂,胡慧东,张帆,等.圆形区域划分的k-匿名位置隐私保护方法[J].北京交通大学学报,2013,7(5):13-18
[5] Wang Jia-hui,Cheng Jiu-jun.The location of the P2P modebased on grid amplification anonymous algorithm[J].Computer Science,2014,1(4):90-94(in Chinese) 王嘉慧,程久军.P2P模式下基于网格扩增的位置匿名算法[J].计算机科学,2014,1(4):90-94
[6] Xu J,Tang X,Hu H,et al.Privacy-conscious location based queries in mobile environments[J].IEEE Transactions on Parallel and Distributed Systems,2010,21(3):313-326
[7] Huang Yi,Huo Zheng,Meng Xiao-feng.CoPrivacy:A Collabo-rative Location Privacy-Preserving Method without Cloaking Region[J].Chinese Journal of Computers,2011,34(10):1976-198(in Chinese) 黄毅,霍峥,孟小峰.CoPrivacy:一种用户协作无匿名区域的位置隐私保护方法[J].计算机学报,2011,34(10):1976-198
[8] Machanvajjhala A,Kifer D,Gehrke J,et al.L-diversity:Privacy beyond k-anonymity[J].ACM Transactions on Konwledge Discovery from Data,2007,1(1):3
[9] Wang Ting,Liu Ling.Privacy-aware mobile services over road networks[J].VLDB Endowment,2009,2(1):1042-1053
[10] Xue Jiao,Liu Xiang-yu,Yang Xiao-chun,et al.A Location Privacy Preserving Approach on Road Network[J].Chinese Journal of Computers,2011,4(5):865-878(in Chinese) 薛姣,刘向宇,杨晓春,等.一种面向公路网络的位置隐私保护方法[J].计算机学报,2011,4(5):865-878
[11] Sun Lan,Luo Zhao,Wu Ying-jie,et al.An Algorithm for protection location privacy in road network[J].Journal of Shandong University(Engineering Science),2012,2(5):96-101(in Chinese) 孙岚,罗钊,吴英杰,等.面向路网限制的位置隐私保护算法[J].山东大学学报(工学版),2012,2(5):96-101
[12] Zhao Ping,Ma Chun-guang,Gao Xun-bing,et al.Protecting Location Privacy with Voronoi Diagram over Road Networks[J].Computer Science,2013,40(7):116-120(in Chinese) 赵平,马春光,高训兵,等.路网环境下基于Voronoi图的位置隐私保护方法[J].计算机科学,2013,40(7):116-120
[13] Shun K G,Ju X,Chen Z,et al.Privacy protection for users of location-based services[J].IEEE Communications Society,2012,9(1):30-39
[14] Chow C Y,Mokbel M F,Liu X.A peer-to-peer spatial cloaking algorithm for anonymous location-based service[C]∥Procee-dings of the 14th Annual ACM International Symposium on Advances in Geographic Information Systems.ACM,2006:171-178
[15] Hu H,Xu J.2PASS:Bandwidth-optimized location cloaking for anonymous location-based services[J].IEEE Transactions on Parallel and Distributed Systems,2010,21(10):1458-1472
[16] Wang Lu,Meng Xiao-feng.Location Privacy Preservation in Big Data Era:A Survey[J].Journal of Software,2014,5(4):693-712(in Chinese) 王璐,孟小峰.位置大数据隐私保护研究综述[J].软件学报,2014,5(4):693-712
[17] Brinkhoff T.A framework for generating network based moving objects[J].Geo Informatic,2002,6(2):153-180
[18] Sousa M,Techmer A,Steinhage A,et al.Human tracking andidentification using a sensitive floor and wearable accelerometers[C]∥2013 IEEE International Conference on Pervasive Computing and Communications (PerCom).IEEE,2013:166-171
[19] Gedik B,Liu L.Protecting location privacy with personalizedk-anonymity:Architecture and algorithms[J].IEEE Transactions on Mobile Computing,2008,7(1):1-18
[20] Xu J,Tang X,Hu H,et al.Privacy-conscious location-based queries in mobile environments[J].IEEE Transactions on Parallel and Distributed Systems,2010,21(3):313-326
[21] Pan X,Xu J,Meng X.Protecting location privacy against location-dependent attacks in mobile services[J].IEEE Transactions on Knowledge and Data Engineering,2012,24(8):1506-1519
[22] Zhu Qing,Zhao Tong,Wang Shan.Privacy Preservation Algorithm for Service-Oriented Information Search[J].Chinese Journal of Computers,2010,33(8):1315-1323(in Chinese)朱青,赵桐,王珊.面向查询服务的数据隐私保护算法[J].计算机学报,2010,33(8):1315-1323

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!