检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:张艳格[1]
机构地区:[1]郑州财经学院电子商务学院,河南郑州450000
出 处:《微电子学与计算机》2017年第2期132-135,140,共5页Microelectronics & Computer
摘 要:在对异构社交网络中用户轨迹进行隐匿时,当前方法大多针对用户单个位置进行轨迹隐匿,不适于复杂的异构社交网络.为此,提出一种新的基于假轨迹的异构社交网络中用户轨迹隐匿方法,通过一个例子对所提方法的基本思想进行分析.对假轨迹方法进行概述,在中心服务器系统结构上实现.给出单个位置的暴露风险、轨迹暴露风险、距离偏移度的概念和计算公式.为了避免攻击者判断出用户真实轨迹的概率,提出记忆规则进行优化.将查询消息、真实位置等参数传输至隐私保护服务器,隐私保护服务器依据用户参数要求和记忆规则产生满足条件的假位置,将含有假位置的匿名框传输至服务提供商,隐私保护服务器对返回的查询结果进行求精后传输至用户.实验结果表明,采用所提方法得到的轨迹数据有很高的可用性.In the heterogeneous network users in the path of the hidden, most of the current methods for users to a single location to track hidden, not suitable for complex heterogeneous social networks. For this, put forward a new heterogeneous social networks based on false trajectory track hidden by the user, through an example analysis of the basic concept of the proposed method. Are summarized, the methods of false track in a central server system structure on the implementation. Given a single location exposure risk, trajectory exposure risk, the concept and calculation formula of distance deviation degree. In order to avoid the attacker tell users real trajectories of probability, proposed rules to optimize memory. Sending query parameters such as news, true location server to privacy protection, privacy protection server on the parameters of user requirements and the rule satisfy the condition of the false memory location, anonymous boxes containing a false position to service providers, privacy protection server to return after the refinement of the query results of transmission to the user. The experimental results show that the proposed method the trajectory data has a high availability.
分 类 号:TP309[自动化与计算机技术—计算机系统结构]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.249