一级黄色片免费播放|中国黄色视频播放片|日本三级a|可以直接考播黄片影视免费一级毛片

高級搜索

留言板

尊敬的讀者、作者、審稿人, 關(guān)于本刊的投稿、審稿、編輯和出版的任何問題, 您可以本頁添加留言。我們將盡快給您答復。謝謝您的支持!

姓名
郵箱
手機號碼
標題
留言內(nèi)容
驗證碼

基于網(wǎng)格標識匹配的位置隱私保護方法

張少波 劉琴 王國軍

張少波, 劉琴, 王國軍. 基于網(wǎng)格標識匹配的位置隱私保護方法[J]. 電子與信息學報, 2016, 38(9): 2173-2179. doi: 10.11999/JEIT160350
引用本文: 張少波, 劉琴, 王國軍. 基于網(wǎng)格標識匹配的位置隱私保護方法[J]. 電子與信息學報, 2016, 38(9): 2173-2179. doi: 10.11999/JEIT160350
ZHANG Shaobo, LIU Qin, WANG Guojun. The Method of Location Privacy Protection Based on Grid Identifier Matching[J]. Journal of Electronics & Information Technology, 2016, 38(9): 2173-2179. doi: 10.11999/JEIT160350
Citation: ZHANG Shaobo, LIU Qin, WANG Guojun. The Method of Location Privacy Protection Based on Grid Identifier Matching[J]. Journal of Electronics & Information Technology, 2016, 38(9): 2173-2179. doi: 10.11999/JEIT160350

基于網(wǎng)格標識匹配的位置隱私保護方法

doi: 10.11999/JEIT160350 cstr: 32379.14.JEIT160350
基金項目: 

國家自然科學基金(61472451, 61272151, 61402161),中南大學中央高?;究蒲袠I(yè)務(wù)費專項資金(2016zzts058)

The Method of Location Privacy Protection Based on Grid Identifier Matching

Funds: 

The National Natural Science Foundation of China (61472451, 61272151, 61402161), The Fundamental Research Funds for the Central Universities of Central South University (2016zzts058)

  • 摘要: 在基于位置的服務(wù)中,基于可信第三方模型是當前位置隱私保護中的主要模型,但該模型存在一定的隱私泄露風險。該文提出一種基于網(wǎng)格標識匹配(GIM)的位置隱私保護方法,用戶首先將查詢區(qū)域劃分為網(wǎng)格,并結(jié)合保序?qū)ΨQ加密和K匿名技術(shù),在匿名器形成K匿名,然后利用網(wǎng)格標識匹配返回查詢結(jié)果給用戶。在查詢的過程中,匿名器并不知道用戶的具體位置,加強了該模型中用戶位置的隱私保護。同時中間匿名器僅進行簡單的比較和匹配,有效緩解了匿名器的性能瓶頸問題。安全分析表明該方法能有效保護用戶的位置隱私;并且通過實驗驗證該方法能有效減小匿名器的處理時間開銷。
  • LU Rongxing, LIN Xiaodong, LIANG Xiaohui, et al. A dynamic privacypreserving key management scheme for location-based services in vanets[J]. IEEE Transactions on Intelligent Transportation Systems, 2012, 13(1): 127-139. doi: 10.1109/TITS.2011.2164068.
    YU Rong, KANG Jiawen, HUANG Xumin, et al. MixGroup: accumulative pseudonym exchanging for location privacy enhancement in vehicular social networks[J]. IEEE Transactions on Dependable and Secure Computing, 2016, 13(1): 93-105. doi: 10.1109/TDSC.2015.2399291.
    NIU Ben, LI Qinghua, ZHU Xiaoyan, et al. Enhancing privacy through caching in location-based services[C]. 2015 IEEE Conference on Computer Communication(INFOCOM), Hong Kong, China, 2015: 1017-1025. doi: 10.1109/ INFOCOM.2015.7218474
    張學軍, 桂小林, 伍忠東. 位置服務(wù)隱私保護研究綜述[J]. 軟件學報, 2015, 26(9): 2373-2395. doi: 10.13328/j.cnki.jos. 004857.
    ZHANG Xuejun, GUI Xiaolin, and WU Zhongdong. Privacy preservation for location-based services: a survey[J]. Journal of Software, 2015, 26(9): 2373-2395. doi: 10.13328/j.cnki.jos. 004857.
    PENG Tao, LIU Qin, and WANG Guojun. Enhanced location privacy preserving scheme in location-based services [J]. IEEE Systems Journal, 2014: 1-12. doi: 10.1109/JSYST. 2014.2354235.
    SHOKRI R, THEODORAKOPOULOS G, PAPADIMITRATOS P, et al. Hiding in the mobile crowd: location privacy through collaboration[J]. IEEE Transactions on Dependable and Secure Computing, 2014, 11(3): 266-279. doi: 10.1109/TDSC.2013.57.
    CHOW C Y, MOKBEL M F, and LIU X. Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments[J]. GeoInformatica, 2011, 15(2): 351-380. doi: 10.1007/s10707-009-0099-y.
    ARDAGNA C A, CREMONINI M, VIMERCATI S D C, et al. An obfuscation-based approach for protecting location privacy[J]. IEEE Transactions on Dependable and Secure Computing, 2011, 8(1): 13-27. doi: 10.1109/TDSC.2009.25.
    彭志宇, 李善平. 移動環(huán)境下LBS位置隱私保護[J]. 電子與信息學報, 2011, 33(5): 1211-1216. doi: 10.3724/SP.J.1146. 2010.01050.
    PENG Zhiyu and LI Shanping. Protecting location privacy in location-based services in mobile environments[J]. Journal of Electronics Information Technology, 2011, 33(5): 1211-1216. doi: 10.3724/SP.J.1146. 2010.01050.
    GEDIK B and LIU L. Protecting location privacy with personalized k-anonymous: architecture and algorithms[J]. IEEE Transactions on Mobile Computing, 2008, 7(1): 1-18. doi: 10.1109/TMC.2007.1062.
    周長利, 馬春光, 楊松濤. 路網(wǎng)環(huán)境下保護LBS位置隱私的連續(xù)KNN查詢方法[J]. 計算機研究與發(fā)展, 2015, 52(11): 2628-2644. doi: 10.7544/issn1000-1239.2015.20140523.
    ZHOU Changli, Ma Chunguang, and YANG Songtao. Location privacy-preserving method for LBS continuous KNN query in road networks[J]. Journal of Computer Research and Development, 2015, 52(11): 2628-2644. doi: 10.7544/ issn1000-1239.2015.20140523.
    SCHLEGEL R, CHOW C Y, HUANG Q, et al. User-defined privacy grid system for continuous location-based services[J]. IEEE Transactions on Mobile Computing, 2015, 14(10): 2158-2172. doi: 10.1109/TMC.2015.2388488.
    AGRAWAL R, KIERNAN J, SRIKANT R, et al. Order preserving encryption for numeric data[C]. Proceedings of the 2004 ACM SIGMOD International Conference on Management of Data, Paris, France, 2004: 563-574.
    POPA R A, LI F H, and ZELDOVICH N. An ideal-security protocol for order-preserving encoding[C]. 2013 IEEE Symposium on Security and Privacy (SP), Berkeley, California, 2013: 463-477. doi: 10.1109/SP.2013.38.
    AHMADIAN M, PAYA A, and MARINESCU D C. Security of applications involving multiple organizations and order preserving encryption in hybrid cloudenvironments[C]. 2014 IEEE International Parallel Distributed Processing Symposium Workshops (IPDPSW), Phoenix, Azerbaijan, 2014: 894-903. doi: 10.1109/IPDPSW.2014.102.
    GAO Sheng, MA Jianfeng, SHI Weisong, et al. TrPF: a trajectory privacy-preserving framework for participatory sensing[J]. IEEE Transactions on Information Forensics and Security, 2013, 8(6): 874-887. doi: 10.1109/TIFS.2013. 2252618.
    MCNAMES J. A fast nearest-neighbor algorithm based on a principal axis search tree[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2001, 23(9): 964-976. doi: 10.1109/34.955110.
    BRINKHOFF T. Generating traffic data[J]. Bulletin of the Technical Committee Data Engineering, 2003, 26(2): 19-25.
  • 加載中
計量
  • 文章訪問數(shù):  1291
  • HTML全文瀏覽量:  133
  • PDF下載量:  505
  • 被引次數(shù): 0
出版歷程
  • 收稿日期:  2016-04-12
  • 修回日期:  2016-07-18
  • 刊出日期:  2016-09-19

目錄

    /

    返回文章
    返回