检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:宋成[1] 程道晨 倪水平[1] SONG Cheng;CHENG Daochen;NI Shuiping(School of Compute Science and Technology,Henan Polytechnic University,Jiaozuo 454000,China)
机构地区:[1]河南理工大学计算机科学与技术学院,焦作454000
出 处:《北京邮电大学学报》2023年第3期109-114,共6页Journal of Beijing University of Posts and Telecommunications
基 金:国家自然科学基金项目(61872126)。
摘 要:针对基于位置服务中移动终端用户轨迹隐私安全及用户个性化需求的问题,提出一种个性化差分隐私的k匿名轨迹隐私保护方案。所提方案根据用户的个性化差异分配不同的隐私预算,利用差分隐私技术对用户轨迹多次添加拉普拉斯噪声,生成2k个噪声轨迹;利用轨迹相似性度量方法确定最优的k-1个噪声用户,将其与真实用户组成k匿名用户组,然后随机选取一个代理用户代替真实用户执行位置服务请求,从而实现对用户身份和轨迹的隐私性保护。通过安全性分析得出方案具有匿名性、不可伪造性和抗假冒攻击等安全特性。仿真实验结果表明,所提方案在隐私保护效果上有明显的优势,且具有较高的执行效率。To solve the issue of mobile terminal user's trajectory privacy security and individualized needs in location based services,a k anonymous trajectory privacy protection scheme based on individualized differential privacy is proposed.The proposed scheme first allocates different privacy budgets according to individual differences,then adopts differential privacy technology to repeatedly add laplacian noise to the user trajectory to generate 2k noise trajectories.Next,it uses the trajectory similarity measurement method to determine the optimal k-1 noise users,which form k anonymous user groups in combination with real users,and then randomly selects a proxy user to replace the real user to perform location based services requests to realize the privacy protection of user identities and trajectories.Security analysis shows that the scheme satisfies anonymity such security features as anonymity,unforgeability and anti⁃counterfeiting attack.Simulation results show that the scheme not only has an obvious advantage in privacy protection,but also has high execution efficiency.
分 类 号:TP309[自动化与计算机技术—计算机系统结构]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.198