计算机科学 ›› 2015, Vol. 42 ›› Issue (4): 101-105.doi: 10.11896/j.issn.1002-137X.2015.04.019
刘树波,李艳敏,刘梦君
LIU Shu-bo, LI Yan-min and LIU Meng-jun
摘要: 在基于位置服务系统中,为用户提供高质量服务的同时如何很好地保护用户的隐私(身份、行踪以及偏好等)仍然是一个挑战。针对这一挑战,提出了基于密文检索的位置服务用户隐私保护方案。在本方案中,位置服务提供商将其服务数据以及数据向量索引以密文的形式外包给云端,移动用户通过密文查询请求向云端查询所需服务,云端通过用户的查询以及服务数据索引计算出匹配度高的服务数据并返回给用户,整个交互过程都是以密文形式进行,云端以及外界得不到任何明文信息。本方案不依赖集中匿名器和用户协作,最后通过理论以及实验分析表明,本方案以低的计算开销有效地保护了用户的身份、位置以及查询偏好隐私。
[1] Leitner M,Curtis .A first step towards a framework for presenting the location of confidential point data on maps-results of an empirical perceptual study[J].International Journal of Geographical Information Science,2006,20(7):813-822 [2] Shankar P,Ganapathy V,Iftode L.Privately querying location-based services with Sybilquery[C]∥Proceedings of the 11th International Conference on Ubiquitous Computing (UbiComp,ACM).2009:31-40 [3] Chang Wei,Wu Jie,Tan Chiu-Chiang .Enhancing mobile social network privacy[C]∥Proceedings of the IEEE Global Communications Conference (Globecom).2011:1-5 [4] Wei Wei,Xu Feng-yuan,Li Qun.Flexible Privacy-preserving location sharing in mobile online social networks[C]∥Procee-dings of the 31st IEEE International Conference on Computer Communications (INFOCOM).2012:2616-2620 [5] Gedik B,Liu Ling.Location privacy in mobile systems:A per-sonalized anonymization model[C]∥Proceedings of the 25th IEEE International Conference on Distributed Computing Systems (ICDCS).2005:620-629 [6] Chow Chi-Yin,Mokbel M F,Walid G.The new Casper:Query processing for location services without compromising privacy[C]∥Proceedings of the 32nd International Conference on Ver Large Data Base.2006:763-774 [7] Chow Chi-Yin,Mokbel M F,He Tian.A privacy-preserving location monitoring system for wireless sensor networks[J].IEEE Transactions on Mobile Computing,2010:94-107 [8] Chow Chi-Yin,Mokbel M F,Leong V.On Efficient and Scalable Support of Continuous Queries in Mobile Peer-to-Peer Environments[J].IEEE Transactions on Mobile Computing,2011,10(10):1473-1487 [9] Beresford A R,Stajano F.Location privacy in pervasive computing[J].IEEE Pervasive Computing,2003,2(1):46-55 [10] Pfitzmann A,Kohntopp M.Anonymity,unobservability,andpseudonymity-a proposal for terminology[C]∥Designing privacy enhancing technologies.2001:1-9 [11] Dingledine R,Mathewson N,Syverson P.Tor:The second-generation onion router[C]∥Proceedings of the 13th USENIX Security Symposium (Security’04).2004:303-320 [12] Chow Chi-Yin,Mokbel M F,Liu Xuan.A peer-to-peer spatialcloaking algorithm for anonymous location-based services[C]∥Proc of the 14th ACM International Symposium on Advances in Geographic Information Systerms.NewYork:ACM Press,2006:171-178 [13] Mokbel M F,Chow Chi-Yin,Aref W G.The new casper:aprivacy-aware location-based database server.http://www-users.cs.umn.edu [14] Ghinita G,Kalnis P,Skiadopoulos S.A mobile peer-to-peer system for anomymous location-based queries[C]∥Proc.of the 10th International Symposium on Advances in Spatial and Temporal Databases.Berlin:Springer-Verlag,2007:519-523 [15] Kalnis P,Ghinita G,Mouratidis K,et al.Preventing location- based identity inference in anonymous spatial queries[C]∥IEEE Trans.Knowl.Data Eng..2007:1719-1733 [16] Lu Rong-xing,Lin Xiao-dong,Shi Zhi-guo,et al.PLAM:A privacy-preserving framework for local-area mobile social networks[C]∥Proceedings of the 33st IEEE International Confe-rence on Computer Communications.2014 [17] Niu Ben,Li Qing-hua,Zhu Xiao-yan,et al.Achieving k-anonymity in Privacy-Aware Location-Based Services[C]∥Proceedings of the 33st IEEE International Conference on Computer Communications.2014 [18] Shao Jun,Lu Rong-xing,Lin Xiao-dong.FINE:A fine-grained privacy-preserving location-based service framework for mobile devices[C]∥Proceedings of the 33st IEEE International Conference on Computer Communications.2014 [19] Blaze M,Bleumer G,Strauss M.Divertible protocols and atomic proxy cryptography[C]∥Proceedings of Eurocrypt.1998,1403:127-144 [20] Wong W K,Cheung D W,Kao B.Secure knn computation on encrypted databases[C]∥Proceedings of the 35th SIGMOD International Conference on Management of Data.2009:139-152 [21] Cao N,Wang C,Li M,et al.Privacy-preserving Multi-keyword ranked search over encrypted cloud data[C]∥IEEE INFOCOM.2011:829-837 |
No related articles found! |
|