高级搜索

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

基于网格标识匹配的位置隐私保护方法

张少波 刘琴 王国军

张少波, 刘琴, 王国军. 基于网格标识匹配的位置隐私保护方法[J]. 电子与信息学报, 2016, 38(9): 2173-2179. doi: 10.11999/JEIT160350
引用本文: 张少波, 刘琴, 王国军. 基于网格标识匹配的位置隐私保护方法[J]. 电子与信息学报, 2016, 38(9): 2173-2179. doi: 10.11999/JEIT160350
ZHANG Shaobo, LIU Qin, WANG Guojun. The Method of Location Privacy Protection Based on Grid Identifier Matching[J]. Journal of Electronics & Information Technology, 2016, 38(9): 2173-2179. doi: 10.11999/JEIT160350
Citation: ZHANG Shaobo, LIU Qin, WANG Guojun. The Method of Location Privacy Protection Based on Grid Identifier Matching[J]. Journal of Electronics & Information Technology, 2016, 38(9): 2173-2179. doi: 10.11999/JEIT160350

基于网格标识匹配的位置隐私保护方法

doi: 10.11999/JEIT160350
基金项目: 

国家自然科学基金(61472451, 61272151, 61402161),中南大学中央高校基本科研业务费专项资金(2016zzts058)

The Method of Location Privacy Protection Based on Grid Identifier Matching

Funds: 

The National Natural Science Foundation of China (61472451, 61272151, 61402161), The Fundamental Research Funds for the Central Universities of Central South University (2016zzts058)

  • 摘要: 在基于位置的服务中,基于可信第三方模型是当前位置隐私保护中的主要模型,但该模型存在一定的隐私泄露风险。该文提出一种基于网格标识匹配(GIM)的位置隐私保护方法,用户首先将查询区域划分为网格,并结合保序对称加密和K匿名技术,在匿名器形成K匿名,然后利用网格标识匹配返回查询结果给用户。在查询的过程中,匿名器并不知道用户的具体位置,加强了该模型中用户位置的隐私保护。同时中间匿名器仅进行简单的比较和匹配,有效缓解了匿名器的性能瓶颈问题。安全分析表明该方法能有效保护用户的位置隐私;并且通过实验验证该方法能有效减小匿名器的处理时间开销。
  • LU Rongxing, LIN Xiaodong, LIANG Xiaohui, et al. A dynamic privacypreserving key management scheme for location-based services in vanets[J]. IEEE Transactions on Intelligent Transportation Systems, 2012, 13(1): 127-139. doi: 10.1109/TITS.2011.2164068.
    YU Rong, KANG Jiawen, HUANG Xumin, et al. MixGroup: accumulative pseudonym exchanging for location privacy enhancement in vehicular social networks[J]. IEEE Transactions on Dependable and Secure Computing, 2016, 13(1): 93-105. doi: 10.1109/TDSC.2015.2399291.
    NIU Ben, LI Qinghua, ZHU Xiaoyan, et al. Enhancing privacy through caching in location-based services[C]. 2015 IEEE Conference on Computer Communication(INFOCOM), Hong Kong, China, 2015: 1017-1025. doi: 10.1109/ INFOCOM.2015.7218474
    张学军, 桂小林, 伍忠东. 位置服务隐私保护研究综述[J]. 软件学报, 2015, 26(9): 2373-2395. doi: 10.13328/j.cnki.jos. 004857.
    ZHANG Xuejun, GUI Xiaolin, and WU Zhongdong. Privacy preservation for location-based services: a survey[J]. Journal of Software, 2015, 26(9): 2373-2395. doi: 10.13328/j.cnki.jos. 004857.
    PENG Tao, LIU Qin, and WANG Guojun. Enhanced location privacy preserving scheme in location-based services [J]. IEEE Systems Journal, 2014: 1-12. doi: 10.1109/JSYST. 2014.2354235.
    SHOKRI R, THEODORAKOPOULOS G, PAPADIMITRATOS P, et al. Hiding in the mobile crowd: location privacy through collaboration[J]. IEEE Transactions on Dependable and Secure Computing, 2014, 11(3): 266-279. doi: 10.1109/TDSC.2013.57.
    CHOW C Y, MOKBEL M F, and LIU X. Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments[J]. GeoInformatica, 2011, 15(2): 351-380. doi: 10.1007/s10707-009-0099-y.
    ARDAGNA C A, CREMONINI M, VIMERCATI S D C, et al. An obfuscation-based approach for protecting location privacy[J]. IEEE Transactions on Dependable and Secure Computing, 2011, 8(1): 13-27. doi: 10.1109/TDSC.2009.25.
    彭志宇, 李善平. 移动环境下LBS位置隐私保护[J]. 电子与信息学报, 2011, 33(5): 1211-1216. doi: 10.3724/SP.J.1146. 2010.01050.
    PENG Zhiyu and LI Shanping. Protecting location privacy in location-based services in mobile environments[J]. Journal of Electronics Information Technology, 2011, 33(5): 1211-1216. doi: 10.3724/SP.J.1146. 2010.01050.
    GEDIK B and LIU L. Protecting location privacy with personalized k-anonymous: architecture and algorithms[J]. IEEE Transactions on Mobile Computing, 2008, 7(1): 1-18. doi: 10.1109/TMC.2007.1062.
    周长利, 马春光, 杨松涛. 路网环境下保护LBS位置隐私的连续KNN查询方法[J]. 计算机研究与发展, 2015, 52(11): 2628-2644. doi: 10.7544/issn1000-1239.2015.20140523.
    ZHOU Changli, Ma Chunguang, and YANG Songtao. Location privacy-preserving method for LBS continuous KNN query in road networks[J]. Journal of Computer Research and Development, 2015, 52(11): 2628-2644. doi: 10.7544/ issn1000-1239.2015.20140523.
    SCHLEGEL R, CHOW C Y, HUANG Q, et al. User-defined privacy grid system for continuous location-based services[J]. IEEE Transactions on Mobile Computing, 2015, 14(10): 2158-2172. doi: 10.1109/TMC.2015.2388488.
    AGRAWAL R, KIERNAN J, SRIKANT R, et al. Order preserving encryption for numeric data[C]. Proceedings of the 2004 ACM SIGMOD International Conference on Management of Data, Paris, France, 2004: 563-574.
    POPA R A, LI F H, and ZELDOVICH N. An ideal-security protocol for order-preserving encoding[C]. 2013 IEEE Symposium on Security and Privacy (SP), Berkeley, California, 2013: 463-477. doi: 10.1109/SP.2013.38.
    AHMADIAN M, PAYA A, and MARINESCU D C. Security of applications involving multiple organizations and order preserving encryption in hybrid cloudenvironments[C]. 2014 IEEE International Parallel Distributed Processing Symposium Workshops (IPDPSW), Phoenix, Azerbaijan, 2014: 894-903. doi: 10.1109/IPDPSW.2014.102.
    GAO Sheng, MA Jianfeng, SHI Weisong, et al. TrPF: a trajectory privacy-preserving framework for participatory sensing[J]. IEEE Transactions on Information Forensics and Security, 2013, 8(6): 874-887. doi: 10.1109/TIFS.2013. 2252618.
    MCNAMES J. A fast nearest-neighbor algorithm based on a principal axis search tree[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2001, 23(9): 964-976. doi: 10.1109/34.955110.
    BRINKHOFF T. Generating traffic data[J]. Bulletin of the Technical Committee Data Engineering, 2003, 26(2): 19-25.
  • 加载中
计量
  • 文章访问数:  1229
  • HTML全文浏览量:  121
  • PDF下载量:  501
  • 被引次数: 0
出版历程
  • 收稿日期:  2016-04-12
  • 修回日期:  2016-07-18
  • 刊出日期:  2016-09-19

目录

    /

    返回文章
    返回