计算机科学 ›› 2016, Vol. 43 ›› Issue (3): 137-144.doi: 10.11896/j.issn.1002-137X.2016.03.027
戴佳筑,华亮
DAI Jia-zhu and HUA Liang
摘要: 用户的位置信息涉及个人隐私,用户精确的位置信息可能会暴露其爱好、行为等敏感信息,因此,位置信息的匿名显得非常重要。现有的位置隐私保护方法大多是在欧氏空间下基于k-匿名算法生成位置匿名区域。欧氏空间下的k-匿名算法虽然可以在一定程度上解决用户位置信息的匿名保护问题,但是在现实生活中,用户的位置受路网环境影响较大,同时,欧氏空间下的k-匿名算法在生成匿名区域后对该区域是否还处于敏感范围内未做考虑。因此提出了一种路网环境下敏感位置匿名区域的生成方法。该方法基于空间划分,首先按照路网L-差异性要求对路网交叉点生成维诺图单元;接着考虑用户所处位置的敏感度,对用户位置生成匿名区域。实验结果表明,与一般的k-匿名算法生成的匿名区域相比,提出的算法能较好地解决一般k-匿名算法生成的匿名区域仍然处于敏感范围内的问题,从而更好地保护用户的位置隐私。
[1] Huo Zheng,Meng Xiao-feng.A Survey of Trajectory Privacy-Preserving Techniques[J].Chinese Journal of Computers,2011,34(10):1820-1830(in Chinese) 霍峥,孟小峰.轨迹隐私保护技术研究[J].计算机学报,2011,34(10):1820-1830 [2] Sweeney L.K-anonymity:a model for protecting privacy[J].International Journal on Uncertainty,Fuzziness and Knowledge based Systems,2002,10(5):557-570 [3] Gruteser M,Grunwald D.Anonymous usage of location-basedservices through spatial and temporal cloaking[C]∥Proceedings of the 1st International Conference on Mobile Systems,Applications and Services.ACM,2003:31-42 [4] Zhao Ze-mao,Hu Hui-dong,Zhang Fan,et al.A k-anonymousalgorithm in location privacy protection based on circular zoning[J].Journal of Beijing Jiaotong University,2013,7(5):13-18(in Chinese) 赵泽茂,胡慧东,张帆,等.圆形区域划分的k-匿名位置隐私保护方法[J].北京交通大学学报,2013,7(5):13-18 [5] Wang Jia-hui,Cheng Jiu-jun.The location of the P2P modebased on grid amplification anonymous algorithm[J].Computer Science,2014,1(4):90-94(in Chinese) 王嘉慧,程久军.P2P模式下基于网格扩增的位置匿名算法[J].计算机科学,2014,1(4):90-94 [6] Xu J,Tang X,Hu H,et al.Privacy-conscious location based queries in mobile environments[J].IEEE Transactions on Parallel and Distributed Systems,2010,21(3):313-326 [7] Huang Yi,Huo Zheng,Meng Xiao-feng.CoPrivacy:A Collabo-rative Location Privacy-Preserving Method without Cloaking Region[J].Chinese Journal of Computers,2011,34(10):1976-198(in Chinese) 黄毅,霍峥,孟小峰.CoPrivacy:一种用户协作无匿名区域的位置隐私保护方法[J].计算机学报,2011,34(10):1976-198 [8] Machanvajjhala A,Kifer D,Gehrke J,et al.L-diversity:Privacy beyond k-anonymity[J].ACM Transactions on Konwledge Discovery from Data,2007,1(1):3 [9] Wang Ting,Liu Ling.Privacy-aware mobile services over road networks[J].VLDB Endowment,2009,2(1):1042-1053 [10] Xue Jiao,Liu Xiang-yu,Yang Xiao-chun,et al.A Location Privacy Preserving Approach on Road Network[J].Chinese Journal of Computers,2011,4(5):865-878(in Chinese) 薛姣,刘向宇,杨晓春,等.一种面向公路网络的位置隐私保护方法[J].计算机学报,2011,4(5):865-878 [11] Sun Lan,Luo Zhao,Wu Ying-jie,et al.An Algorithm for protection location privacy in road network[J].Journal of Shandong University(Engineering Science),2012,2(5):96-101(in Chinese) 孙岚,罗钊,吴英杰,等.面向路网限制的位置隐私保护算法[J].山东大学学报(工学版),2012,2(5):96-101 [12] Zhao Ping,Ma Chun-guang,Gao Xun-bing,et al.Protecting Location Privacy with Voronoi Diagram over Road Networks[J].Computer Science,2013,40(7):116-120(in Chinese) 赵平,马春光,高训兵,等.路网环境下基于Voronoi图的位置隐私保护方法[J].计算机科学,2013,40(7):116-120 [13] Shun K G,Ju X,Chen Z,et al.Privacy protection for users of location-based services[J].IEEE Communications Society,2012,9(1):30-39 [14] Chow C Y,Mokbel M F,Liu X.A peer-to-peer spatial cloaking algorithm for anonymous location-based service[C]∥Procee-dings of the 14th Annual ACM International Symposium on Advances in Geographic Information Systems.ACM,2006:171-178 [15] Hu H,Xu J.2PASS:Bandwidth-optimized location cloaking for anonymous location-based services[J].IEEE Transactions on Parallel and Distributed Systems,2010,21(10):1458-1472 [16] Wang Lu,Meng Xiao-feng.Location Privacy Preservation in Big Data Era:A Survey[J].Journal of Software,2014,5(4):693-712(in Chinese) 王璐,孟小峰.位置大数据隐私保护研究综述[J].软件学报,2014,5(4):693-712 [17] Brinkhoff T.A framework for generating network based moving objects[J].Geo Informatic,2002,6(2):153-180 [18] Sousa M,Techmer A,Steinhage A,et al.Human tracking andidentification using a sensitive floor and wearable accelerometers[C]∥2013 IEEE International Conference on Pervasive Computing and Communications (PerCom).IEEE,2013:166-171 [19] Gedik B,Liu L.Protecting location privacy with personalizedk-anonymity:Architecture and algorithms[J].IEEE Transactions on Mobile Computing,2008,7(1):1-18 [20] Xu J,Tang X,Hu H,et al.Privacy-conscious location-based queries in mobile environments[J].IEEE Transactions on Parallel and Distributed Systems,2010,21(3):313-326 [21] Pan X,Xu J,Meng X.Protecting location privacy against location-dependent attacks in mobile services[J].IEEE Transactions on Knowledge and Data Engineering,2012,24(8):1506-1519 [22] Zhu Qing,Zhao Tong,Wang Shan.Privacy Preservation Algorithm for Service-Oriented Information Search[J].Chinese Journal of Computers,2010,33(8):1315-1323(in Chinese)朱青,赵桐,王珊.面向查询服务的数据隐私保护算法[J].计算机学报,2010,33(8):1315-1323 |
No related articles found! |
|