移動社交網(wǎng)絡中基于代理轉發(fā)機制的軌跡隱私保護方法
doi: 10.11999/JEIT151136 cstr: 32379.14.JEIT151136
基金項目:
國家自然科學基金(61472451, 61272151, 61402161, 61502163),中南大學中央高校基本科研業(yè)務費專項資金資助
The Method of Trajectory Privacy Preserving Based on Agent Forwarding Mechanism in Mobile Social Networks
Funds:
The National Natural Science Foundation of China (61472451, 61272151, 61402161, 61502163), The Fundamental Research Funds for the Central Universities of Central South University (2016zzts058, 2016zzts060)
-
摘要: K匿名技術是當前軌跡隱私保護的主流方法,但該方法也存在隱私泄露的風險。該文提出一種在移動社交網(wǎng)絡中基于代理轉發(fā)機制(BAFM)的軌跡隱私保護方法。該方法利用安全多方計算和內(nèi)積安全計算進行隱私加密匹配,通過可信服務器在移動社交網(wǎng)絡中找最匹配的用戶做代理,然后由代理轉發(fā)用戶的請求到服務器進行查詢,隱藏用戶的真實軌跡與位置服務器的聯(lián)系,有效保護用戶的軌跡隱私。安全分析表明該方法能有效保護用戶的軌跡隱私;同時,通過實驗驗證該方法相對K匿名更高效,能減小服務器的查詢和通信開銷。
-
關鍵詞:
- 移動社交網(wǎng)絡 /
- 軌跡隱私保護 /
- 安全多方計算 /
- 內(nèi)積安全計算
Abstract: The trajectory K-anonymous is the mainstream of the current trajectory privacy protection, but the method has some defects such as privacy leakage. In this paper, a method of trajectory privacy preserving is proposed Based on Agent Forwarding Mechanism (BAFM) in mobile social networks, which uses secure multi-party computation and inner product secure computation to find the best matching user by the trusted server as the agent. The agent forwards the users request to the server to query, which hides the correlation between users real trajectory and the server in order to achieve users trajectory privacy. Security analysis shows that the propose method can effectively protect the user's trajectory privacy. Experiments show that the proposed method is more effective, it reduces the overhead of servers query and communication. -
LU Rongxing, LIN Xiaodong, LIANG Xiaohui, et al. A dynamic privacy preserving key management scheme for location-based services in vanets[J]. IEEE Transactions on Intelligent Transportation Systems, 2012, 13(1): 127-139. doi: 10.1109/TITS.2011.2164068. 霍崢, 孟小峰, 黃毅. PrivateCheckIn: 一種移動社交網(wǎng)絡中的軌跡隱私保護方法[J]. 計算機學報, 2013, 36(4): 716-726. doi: 10.3724/SP.J.1016.2013.00716. HUO Zheng, MENG Xiaofeng, and HUANG Yi. PrivateCheckIn: Trajectory privacy-preserving for check-in services in MSNS[J]. Chinese Journal of Computers, 2013, 36(4): 716-726. doi: 10.3724/SP.J.1016.2013.00716. LEI P R, PENG W C, SU I J, et al. Dummy-based schemes for protecting movement trajectories[J]. Journal of Information Science and Engineering, 2012, 28(2): 335-350. YOU T H, PENG W C, and LEE W C. Protecting moving trajectories with dummies[C]. Proceedings of the 8th International Conference on Mobile Data Management, Mannheim, Germany, 2007: 278-282. doi: 10.1109/MDM. 2007.58. TERROVITIS M and MAMOULIS N. Privacy preservation in the publication of trajectories[C]. Proceedings of the 9th International Conference on Mobile Data Management, Beijing, 2008: 65-72. doi: 10.1109/MDM. 2008.29. 趙婧, 張淵, 李興華, 等. 基于軌跡頻率抑制的軌跡隱私保護方法[J]. 計算機學報, 2014, 37(10): 2096-2106. doi: 10.3724/ SP.J.1016.2014.02096. ZHAO Jing, ZHANG Yuan, LI Xinghua, et al. A trajectory privacy protection approach via trajectory frequency suppression[J]. Chinese Journal of Computers, 2014, 37(10): 2096-2106. doi: 10.3724/SP.J.1016.2014.02096. HWANG R H, HSUEH Y L, and CHUNG H W. A novel time-obfuscated algorithm for trajectory privacy protection[J]. IEEE Transactions on Services Computing, 2014, 7(2): 126-139. doi: 10.1109/TSC.2013.55. 朱懷杰, 王佳英, 王斌, 等. 障礙空間中保持位置隱私的最近鄰查詢方法[J]. 計算機研究與發(fā)展, 2014, 51(1): 115-125. doi: 10.7544/issn1000-1239.2014.20130694. ZHU Huaijie, WANG Jiaying, WANG Bin, et al. Location privacy preserving obstructed nearest neighbor queries[J]. Journal of Computer Research and Development, 2014, 51(1): 115-125. doi: 10.7544/issn1000-1239.2014.20130694. 楊靜, 張冰, 張健沛, 等. 基于圖劃分的個性化軌跡隱私保護方法[J]. 通信學報, 2015, 36(3): 1-11. doi: 10.11959/j.issn. 1000-436x.2015053. YANG Jing, ZHANG Bing, ZHANG Jianpei, et al. Personalized trajectory privacy preserving method based on graph partition[J]. Journal on Communications, 2015, 36(3): 1-11. doi: 10.11959/j.issn.1000-436x.2015053. 王超, 楊靜, 張健沛. 基于軌跡位置形狀相似性的隱私保護算法[J]. 通信學報, 2015, 36(2): 144-157. doi: 10.11959/j.issn. 1000-436x.2015043. WANG Chao, YANG Jing, and ZHANG Jianpei. Privacy preserving algorithm based on trajectory location and shape similarity[J]. Journal on Communications, 2015, 36(2): 144-157. doi: 10.11959/j.issn.1000-436x.2015043. XU T and CAI Y. Exploring historical location data for anonymity preservation in location-based services[C]. Proceedings of the 27th International Conference on Computer Communications(INFOCOM 2008), Toronto, Canada, 2008: 547-555. doi: 10.1109/INFOCOM.2008.103. GAO Sheng, MA Jianfeng, SHI Weisong, et al. TrPF: a trajectory privacy-preserving framework for participatory sensing[J]. IEEE Transactions on Information Forensics and Security, 2013, 8(6): 874-887. doi: 10.1109/TIFS.2013. 2252618. NIU Ben, ZHU Xiaoyan, CHI Haotian, et al. 3PLUS: privacy-preserving pseudo-location updating system in location-based services[C]. 2013 IEEE Wireless Communications and Networking Conference, Shanghai, China, 2013: 4564-4569. doi: 10.1109/WCNC.2013.6555314. GENKIN D, ISHAI Y, and POLYCHRONIADOU A. Efficient multi-party computation: from passive to active security via secure SIMD circuits[C]. Proceedings of the 35th Annual Cryptology Conference, Santa Barbara, USA, 2015: 721-741. doi: 10.1007/978-3-662-48000-7-35. ZHU Xiaoyan, LIU Jie, JIANG Shunrong, et al. Efficient weight-based private matching for proximity-based mobile social networks[C]. 2014 IEEE International Conference on Communications, Sydney, Australia, 2014: 4114-4119. doi: 10.1109/ICC.2014.6883965. BRINKHOFF T. Generating traffic data[J]. Bulletin of the Technical Committee Data Engineering, 2003, 26(2): 19-25. PAN Xiao, XU Jianliang, and MENG Xiaofeng. Protecting location privacy against location-dependent attacks in mobile services[J]. IEEE Transactions on Knowledge and Data Engineering, 2012, 24(8): 1506-1519. doi: 10.1109/TKDE. 2011.105. WANG Yu, XU Dingbang, HE Xiao, et al. L2p2: Location-aware location privacy protection for location-based services[C]. Proceedings IEEE INFOCOM, Orlando, Florida USA, 2012: 1996-2004. doi: 10.1109/INFOCOM.2012. 6195577. -
計量
- 文章訪問數(shù): 1292
- HTML全文瀏覽量: 100
- PDF下載量: 529
- 被引次數(shù): 0