期刊文献+

一种基于K匿名技术在轨迹隐私保护方法中的改进 被引量:1

An improvement of track privacy protection method based on K-anonymity technology
下载PDF
导出
摘要 针对K匿名技术在轨迹隐私保护中存在搜索k-1个匿名用户耗时过长、甚至搜索不到和易于被连续查询攻击所侵袭的现状,提出了一种改进的方法,方法利用时间截点对搜索时间进行约束,生成假名对用户发送查询请求时的真名进行保护,有效解决了上述问题。实验结果表明该方法的系统运行时间较短且隐私保护程度较高。 Aiming at the existence of K-anonymity technology in the trajectory privacy protection,the search for k-1 anonymous users is too long,even unsearchable and easy to be attacked by continuous query attacks.An improved method is proposed,which uses time interception pairs.The search time is constrained,and the pseudonym is generated to protect the real name when the user sends the query request.The experimental results show that the system has a shorter running time and a higher degree of privacy protection.
作者 张家磊 钟伯成 房保纲 丁佳蓉 贾媛媛 ZHANG Jialei;ZHONG Bocheng;FANG Baogang;DING Jiarong;JIA Yuanyuan(School of Electronic and Electrical Engineering,Shanghai University of Engineering Science,Shanghai 201620,China)
出处 《智能计算机与应用》 2019年第5期250-252,256,共4页 Intelligent Computer and Applications
关键词 K匿名技术 轨迹隐私 时间截点 假名 K-anonymity technology trajectory privacy time cut-off point kana
  • 相关文献

参考文献4

二级参考文献40

  • 1Gruteser M, Grunwald D. Anonymous usage of location-based services through spatial and temporal cloaking//Pro-ceedings of the International Conference on Mobile Systems.Applications, and Services (MobiSys,03). San Fransisco,USA, 2003; 31-42. 被引量:1
  • 2Pan X, Xu J,Meng X. Protecting location privacy againstlocation-dependent attacks in mobile services. IEEE Transac-tions on Knowledge and Data Engineering, 2012, 24 (8):1506-1519. 被引量:1
  • 3Mokbel M F, Chow C Y,Aref W G. The newcasper:Queryprocessing for location services without compromising privacy//Proceedings of the 32nd Conference of Very Large Databases(VLDB 2006). Seoul, 2006:763-774. 被引量:1
  • 4Bamba B,Liu L. Supporting anonymous location queries inmobile environments with privacy grid//Proceedings of the17th International Conference on World Wide Web (WWW2008). Beijing, 2008; 237-246. 被引量:1
  • 5Krumm J. A survey of computational location privacy.Personal and Ubiquitous Computing, 2009,13(6):391-399. 被引量:1
  • 6Huo Z, Meng X, Hu H,Huang Y. You can walk alone:Trajectory privacy-preserving through significant stays pro-tection//Proceedings of the 17th International Conference onDatabase Systems for Advanced Applications (DASFAA,12).Busan, Korea,2012:351-366. 被引量:1
  • 7You T H, Peng W C,Lee W C. Protecting moving trajecto-ries with dummies//Proceedings of the 8th InternationalConference on Mobile Data Management (MDM,07). Mann-heim, Germany, 2007 ; 278-282. 被引量:1
  • 8Terrovitis M, Mamoulis N. Privacy preserving in the publi-cation of trajectories//Proceedings of the 9th InternationalConference on Mobile Data Management (MDM,08). Bei-jing, China, 2008:65-72. 被引量:1
  • 9Gruteser M, Liu X. Protecting privacy in continuous locationtracking applications. IEEE Security and Privacy, 2004,2(2):28-34. 被引量:1
  • 10Abul O,Bonchi F, Nanni M. Never walk alone:Uncertaintyfor anonymity in moving object databases//Proceedings ofthe 24th International Conference on Data Engineering(ICDE’08). Cancun,Mexico,2008 ; 376-385. 被引量:1

共引文献89

同被引文献7

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部