期刊文献+

连续空间查询的位置隐私保护综述 被引量:8

Survey on location privacy preservation of continuous spatial queries
下载PDF
导出
摘要 在移动互联网中,移动用户把个人位置信息发送到位置服务提供者并通过空间查询获取兴趣点数据;在连续空间查询中,用户沿着轨迹提交多个位置信息,这导致了严重的用户隐私风险。近年来,连续空间查询的位置隐私保护技术成为无线网络安全和隐私领域的研究热点。首先介绍了位置服务中的空间查询和隐私威胁;归纳了连续空间查询的隐私保护模型,并比较了对应的隐私保护方法。最后介绍了发展趋势并指明了未来的研究方向。 In the mobile Internet, mobile users send their personal location information to location based service(LBS) pro- viders and obtain point of interest(POI) data via spatial queries. In a continuous spatial query,a user submits multiple locations along his trajectory. This query led to serious user privacy risks. Recently, the location privacy preservation technique of continuous spatial queries became a research hotspot in the wireless network security and privacy area. First, this paper introduced spatial queries and privacy threats in LBS. Next, it summed up privacy preservation models for continuous spatial queries, and compared the corresponding privacy preservation methods. Finally, it indicated the trends and future directions.
出处 《计算机应用研究》 CSCD 北大核心 2015年第2期321-325,342,共6页 Application Research of Computers
基金 国家自然科学基金资助项目(61170263) 国家"核高基"科技重大专项课题基金资助项目(2012ZX01039-004-009) 信息网络安全公安部重点实验室开放课题资助项目(C11606)
关键词 位置服务 连续空间查询 k匿名 差分隐私 隐私信息检索 隐藏区 location based services continuous spatial queries k-anonymlty differential privacy private information retrieval cloaking region
  • 相关文献

参考文献32

  • 1PALANISAMY B, LIU Ling. MobiMix: protecting location privacy with mix-zones over road networks [ C ]//Proc of the 27th International Conference on Data Engineering. 2011: 494-505. 被引量:1
  • 2LI Guo:liang, FEN(; Jian-hua, XU Jing. DESKS: direction-aware spatial keyword search[ C]//Proc of the 29th International Conference on Data Engineering. 2012: 474-485. 被引量:1
  • 3PAN Xiao, XU Jian-liang, MENG Xiao-feng. Protecting location pri- vacy against location-dependent attacks in mobile services[ J]. IEEE Trans on Knowledge and Data Engineering, 2012, 24 (8): 1506-1519. 被引量:1
  • 4DEWRI R, RAY I, WHITLEY D. Query m-invariance: preventing query disclosures in continuous location- based services [ C ]//Proc of the 1 lth International Conference on Mobile Data Management. 2010: 95-104. 被引量:1
  • 5DWORK C. Differential privacy[ C ]//Proc of the 33rd International Colloquium on Automata, Languages and Programming. Berlin: Springer, 2006 : 1 - 12. 被引量:1
  • 6HU Wenling,WANG Yongli,ZHANG Gongxuan.A Privacy Protection Method for Continuous Query Based on Location Services[J].Wuhan University Journal of Natural Sciences,2013,18(5):449-454. 被引量:2
  • 7YI Xun, KAOSAR M G, PAULET R, et al. Single-database private in- formation retrieval from fully homomorphic encryption [ J ]. IEEE Trans on Knowledge and Data Engineering, 2013, 25(5) : 1125-1134. 被引量:1
  • 8LEE H, OH B S, KIM H, et al. Grid-based cloaking area creation scheme supporting continuous location-based services[ C ]//Proc of the 27th Annual ACM Symposium on Applied Computing. New York : ACM Press, 2012: 537-543. 被引量:1
  • 9ABUL O, BONCHI F, NANNI M. Never walk alone: uncertainty for anonymity in moving objects databases [ C ]//Proc of the 24th Interna- tional Conference on Data Engineering. [ S. 1. ] : IEEE Press, 2008 : 376-385. 被引量:1
  • 10MOHAMMED N, FUNG B, DEBBABI M. Walking in the crowd: an- onymizing trajectory data for pattern analysis [ C ]//Proc of the 18th ACM Conference on Information and Knowledge Management. New York: ACM Press, 2009: 1441-1444. 被引量:1

二级参考文献30

  • 1潘晓,肖珍,孟小峰.位置隐私研究综述[J].计算机科学与探索,2007,1(3):268-281. 被引量:65
  • 2Mokbel M F, Chow C Y, Aref W G. The new Casper: Query processing for location services without compromising privacy [C] //Proc of the 32nd Int Conf on Very Large Data Bases (VLDB). New York: ACM, 2006:763-774. 被引量:1
  • 3Chow C, Mokbel M F. Enabling privacy continuous queries for revealed user locations [C]//LNCS 4605 : Proc of the Int Syrup on Advances in Spatial and Temporal Databases (SSTD). Berlin: Springer, 2007. 被引量:1
  • 4Gruteser M, Grunwal D. Anonymous usage of location-based services through spatial and temporal cloaking [C] //Proe of the Int Conf on Mobile Systems, Applications, and Services (MobiSys). New York: ACM, 2003:163-168. 被引量:1
  • 5Xiao Zhen, Xu Jianliang, Meng Xiaofeng. P-sensitivity: A semantic privacy-protection model for location-based services [C] //Proc of the 2nd Int Workshop on PriVacy-Aware Location-Based Mobile Services(PALMS). Piscataway, NJ: IEEE, 2008:47-54. 被引量:1
  • 6Bamba B, Liu L. Supporting anonymous location queries in mobile environments with privacy grid [C] //Proc of Int Conf on World Wide Web (WWW). New York: ACM, 2008: 237-246. 被引量:1
  • 7Kido H, Yanagisawa Y, Satoh T. Protection of location privacy using dummies for location-based services [C]//Proc of the 26th Int Conf on the Physics of Semiconductors (ICPS). Piseataway, NJ: IEEE, 2005: 1248-1248. 被引量:1
  • 8Ghinita G, Kalnis P, Khoshgozaran A, et al. Private queries in location based services: Anonymizers are not necessary [C] //Proe of ACM SIGMOD 2008. New York: ACM, 2008. 被引量:1
  • 9Xu T, Cai Y. Location anonymity in continuous location based services [C]//Proc of Int Symp on Advances in Geographic Information Systems(GIS). New York: ACM, 2007. 被引量:1
  • 10Brinkhoff T. A framework for generating network-based moving objects [J]. An Int Journal on Advances of Computer Science for Geographic Information Systems (Geolnformatica), 2002, 6(2): 153-180. 被引量:1

共引文献131

同被引文献103

  • 1程玉胜,邓小光,江效尧.Apriori算法中频繁项集挖掘实现研究[J].计算机技术与发展,2006,16(3):58-60. 被引量:16
  • 2弓秀莲,赵旭俊,张继福.基于FP树的特异关联规则挖掘算法研究[J].太原科技大学学报,2007,28(6):428-432. 被引量:2
  • 3Zhang Zhaoyang, Wang Honggang, Lin Xiaodong, et al. Effective epidemic control and source tracing through mobile social sensing over WBANs//Proceedings of the INFOCOM. Turin, Italy, 2013:300-304. 被引量:1
  • 4Mun M Y, Reddy S, Shilton K, et al. PEIR the personal environmental impact report as a platform for participatory sensing systems research//Proceedings of the MobiSys. Krakow, Poland, 2009: 55-68. 被引量:1
  • 5Sehgal S, Kanhere S S, Chou C T. MobiShop: Using mobile phones for sharing consumer pricing information//Proceedingsof the Conference on Distributed Computing in Sensor Systems (DCOSS). Santorin Island, Greece, 2008. 被引量:1
  • 6Dong Yifei, Blazeski L, Sullivan D, et al. PetrolWatch: Using mobile phones for sharing petrol prices//Proceedings of the 7th Annual International Conference on Mobile Systems, Applications and Services (MobiSys). Krakow, Poland, 2009. 被引量:1
  • 7Krontiris I, Freiling F C, Dimitriou T. Locaition privacy in urban sensing networks: Research challenges and directions. IEEE Wireless Communications, 2010, 17(5) : 30-35. 被引量:1
  • 8Kapadia A, Kotz D, Triandopoulos N. Opportunistic sensing Security challenges for the new paradigm//Proceedings of the Communication Systems and Networks and Workshop (COMSNETS). Bangalore, India, 2009:1-10. 被引量:1
  • 9Liang Xiaohui, Zhang Kuan, Shen Xuemin, Lin Xiaodong. Security and privacy in mobile social networks: Challenges and solutions. IEEE Wireless Communications, 2014, 21(1): 33-41. 被引量:1
  • 10霍峥,张啸剑,盂小峰.移动社交网络及位置隐私保护研究综述.中国科技论文在线,2013:1-10. 被引量:1

引证文献8

二级引证文献49

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部