检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:张少波[1] 刘琴 王国军[3] ZHANG Shaobo;LIU Qin;WANG Guojun(School of Computer Science and Engineering,Hunan University of Science and Technology,Xiangtan 411201,China;College of Computer Science and Electronic Engineering,Hunan University,Changsha 410082,China;School of Computer Science and Educational Software,Guangzhou University,Guangzhou 510006,China)
机构地区:[1]湖南科技大学计算机科学与工程学院,湖南湘潭411201 [2]湖南大学信息科学与工程学院,湖南长沙410082 [3]广州大学计算机科学与教育软件学院,广东广州510006
出 处:《通信学报》2018年第7期81-91,共11页Journal on Communications
基 金:国家自然科学基金资助项目(No.61632009;No.61472451;No.61402161;No.61772194);湖南省自然科学基金资助项目(No.2016JJ3046);广东省自然科学基金资助项目(No.2017A030308006);广东省高等教育高层次人才基金资助项目(No.2016ZJ01)~~
摘 要:在用户连续查询过程中,针对第三方匿名器结构中K匿名难以保证用户隐私的问题,提出一种基于位置混淆的轨迹隐私保护方法。首先通过位置预测机制和假位置选择机制获得(G-1)个查询混淆位置,然后将其与用户真实查询位置一起发送到不同匿名器形成匿名域后,再发送到LBS服务器进行查询,最后将获得的查询结果经不同匿名器返回给用户。该方法通过位置混淆来混淆用户的真实查询位置,使攻击者从单匿名器和LBS服务器不能推断出用户的真实轨迹,加强了对用户轨迹的隐私保护,也解决了单匿名器的性能瓶颈问题。安全分析表明了该方法的安全性,实验结果表明,该方法能减少用户与LBS服务器的交互次数以及单匿名器的开销。In the process of continuous queries,a method of trajectory privacy protection based on location obfuscation was proposed to solve the problem that K-anonymity was difficult to guarantee user privacy in third party architectrue.Firstly,the(G-1)query obfuscation locations through the location prediction was obtained and the dummy location selection mechanism,and then sent them together with the user’s real query location to different anonymizers to form cloaking regions and sent them to the LBS server for queries,and the query results were returned to the user by different anonymizers.In this method,the user’s real query location was confused by the location obfuscation,and the attacker couldn’t deduce the user’s trajectory from a single anonymizer or the LBS server.The method can enhance the privacy of the user’s trajectory and can effectively solve the performance bottleneck in the single anonymizer structure.Security analysis shows the security of the proposed approach,and experiments show this method can reduce the number of interactions between the user and the LBS server and the overhead of the single anonymizer.
分 类 号:TP393[自动化与计算机技术—计算机应用技术]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:18.227.183.185