期刊文献+

基于SpaceTwist的k-匿名增量近邻查询位置隐私保护算法 被引量:8

Space Twist-based k-anonymity incremental nearest neighbor query algorithm for location privacy protection
下载PDF
导出
摘要 随着移动网络的持续进步,基于位置的服务在日常生活中被广泛应用,同时位置隐私保护也成为广大用户所关注的焦点。基于Space Twist和k-匿名算法,结合路网环境提出一种新的位置隐私保护方法。该方法摆脱第三方可信匿名器,采用客户—服务器体系结构,根据用户的位置隐私需求结合用户所在路网环境设计出用户端匿名区生成算法,并且保证k-匿名。用户端以该匿名区请求基于位置的服务,服务器根据用户请求返回检索点并满足用户期望的K近邻结果。根据不同的路网环境和用户隐私需求进行大量实验,证明该算法在满足用户基于位置服务需求的同时提高了对用户位置隐私的保护。 With continued advances in mobile Internet, the location-based services are widely used in daily life, more and more users focus on the location privacy protection. This paper proposed a new location privacy protection scheme which com- bined with the network environment and based on the SpaceTwist algorithm and k-anonymity algorithm. The approach prefered to client-server structure rather than trusted third party server and designed the anonymity algorithm in user end according to user's request of location privacy and the network environment, which ensured the k-anonymity. The mobile end users could request the location-based services in its anonymous area, and the server would return the access points to meet user' s expect K-value, Finally, it evaluated the proposed approach by a large number of experiments according to different network environ- ment together with different users privacy needs. The results demonstrate this algorithm meets the user' s requests of location- based services and at the same time it improves the protection of user' s location privacy.
作者 胡德敏 郑霞
出处 《计算机应用研究》 CSCD 北大核心 2016年第8期2402-2404,2412,共4页 Application Research of Computers
基金 国家自然科学基金资助项目(61170277 61472256) 上海市教委科研创新重点项目(12zz137) 上海市一流学科建设项目(S1201YLXK)
关键词 SpaceTwist算法 K-匿名 基于位置服务 路网环境 位置隐私 K近邻结果 SpaceTwist algorithm k-anonymous location-based service road network environment location privacy K-nearest neighbors result
  • 相关文献

参考文献2

二级参考文献12

  • 1潘晓,肖珍,孟小峰.位置隐私研究综述[J].计算机科学与探索,2007,1(3):268-281. 被引量:65
  • 2Atallah M J,Frikken K B.Privacy-preserving location-dependent query processing[].Proceeding of the IEEE/ACS International Conference on Pervasive Services(ICPS’).2004 被引量:1
  • 3Cheng R,Kalashnikov D V,Prabhakar S.Evaluating probabilistic queries over imprecise data[].Proceeding of ACM International Conference on Management of Data(SIGMOD’).2003 被引量:1
  • 4Machanavajjhala A,Gehrke J,et al.L-diversity:priva-cy beyond k-anonymity[].Proceedings ofnd Interna-tional Conference on Data Engineering(ICDE’).2006 被引量:1
  • 5Mokbel M F.Privacy in location-based services:start-of-the-art and research directions[].Proceeding ofth In-ternational Conference on Mobile Data Management(MDM’).2007 被引量:1
  • 6Man accused of stalking ex-girlfriend with GPS. http://www.foxnews.com/story/0,2933,131487,00.html . 2004 被引量:1
  • 7Authorities:GPS system used to stalk woman. http://www.usatoday.com/tech/news/2002-12-30-gps-stalker_x.htm . 2002 被引量:1
  • 8Sciannamea M.Companies increasingly use GPS-enable cell phones to track employees. http://wifi.weblogsinc.com/2004/09/24/companies-increasingly-use-gps-enabled-cell-phones-to-track/ . 2004 被引量:1
  • 9Gedik B,Liu L.Protecting location privacy with person-alized k-anonymity:architecture and algorithms[].IEEE Transactions on Mobile Computing. 被引量:1
  • 10Hong J I,Landay J A.An architecture for privacy-sen-sitive ubiquitous computing[].Proceedings of the Inter-national Conference on Mobile SystemsApplicationsand Services(MobiSys’).2004 被引量:1

共引文献75

同被引文献56

引证文献8

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部