计算机科学 ›› 2019, Vol. 46 ›› Issue (4): 158-163.doi: 10.11896/j.issn.1002-137X.2019.04.025

• 信息安全 • 上一篇    下一篇

分布式结构下基于用户协作的匿名区域构建算法

吴丹丹, 吕鑫   

  1. 河海大学计算机与信息学院 南京211100
  • 收稿日期:2018-06-05 出版日期:2019-04-15 发布日期:2019-04-23
  • 通讯作者: 吕 鑫(1983-),男,博士生,讲师,CCF会员,主要研究方向为网络与信息安全,E-mail:[email protected](通信作者)。
  • 作者简介:吴丹丹(1993-),女,硕士生,主要研究方向为位置隐私保护,E-mail:[email protected]
  • 基金资助:
    本文受国家重点研发计划课题(2018YFC0407105,2016YFC0400910),国家自然科学基金面上项目(61272543),NSFC-广东联合基金重点项目(U1301252)资助。

Location Anonymous Algorithm Based on User Collaboration under Distributed Structure

WU Dan-dan, LYU Xin   

  1. College of Computer and Information,Hohai University,Nanjing 210000,China
  • Received:2018-06-05 Online:2019-04-15 Published:2019-04-23

摘要: 随着移动终端的日益普及和通信技术的飞速发展,基于位置的服务应用愈发广泛。但用户的位置信息时常涉及个人隐私,因此如何在确保服务质量的同时防止用户隐私的泄露是当前研究的热点问题。文中提出了一种分布式结构下基于用户协作的匿名区域构建算法,该方法在设定范围内随机选取锚点,并通过逐跳广播的方式搜寻协作用户,直至满足匿名需求。在协作用户响应过程中,用户计算自身到锚点的距离,形成以锚点为圆心的匿名区域。实验结果表明,该方法可有效抵御共谋攻击和匿名中心攻击,同时能较大程度地降低平均匿名面积。

关键词: P2P, 锚点, 欧氏距离, 位置隐私

Abstract: With the increasing popularity of mobile terminals and the rapid development of communication technology,location-based service applications have been widely used in people’s daily life.However,the users’ location information is commonly privacy-related.Thus,how to preserve users’ privacy while guaranteeing the service quality has become a hot issue in current research.An anonymous region constructing algorithm,through collaborating users,was proposed in this paper.The anchor is randomly selected in the designed set,and the cooperative users can be discovered by broadcasting hop-by-hop,until the anonymous demand is satisfied.During the collaboration responding process,the anchor-centered anonymous region is formed based on the distance between the user and the anchor.The experimental results show that the proposed algorithm is able to effectively resist collusion attacks and anonymous center attacks,meanwhile,the average area of anonymous region is greatly decreased.

Key words: Anchor, Euclidean distance, Location privacy, P2P

中图分类号: 

  • TP309
[1]GRUTESER M,GRUNWALD D.Anonymous usage of loca- tion-based services through spatial and temporal cloaking[C]∥1st ACM International Conference on Mobile Systems,Applications,and Services.SanFrancisco,United States,2003:31-42.
[2]NIU B,et al.Achieving k-anonymity in privacy-aware location-based services[C]∥33th IEEE International Conference on Computer Communications.Toronto,Canada,2014:754-762.
[3]LIU H,LI X H.Privacy enhancing method for dummy-based privacy protection with continuous location-based service queries[J].Journal on Communications,2016,37(7):140-150.(in Chinese) 刘海,李兴华.连续服务请求下基于假位置的用户隐私增强方法[J].通信学报,2016,37(7):140-150.
[4]PEI Z X,LI X H,LIU H.Anonymizing region construction scheme based on query range in location-based service privacy protection[J].Journal on Communications,2017,38(9):125-132.(in Chinese) 裴卓雄,李兴华,刘海.LBS隐私保护中基于查询范围的匿名区构造方案[J].通信学报,2017,38(9):125-132.
[5]YIU M L,JENSEN C S,MØLLER J,et al.Design and analysis of aranking approach to private location-based services[J].ACM Transactionson Database Systems,2011,36(2):1-42.
[6]HUANG Y,HUO Z,MENG X F.CoPrivacy:A Collaborative Location Privacy-Preserving Method without Cloaking Region[J].Chinese Journal of Computers,2011,34(10):1976-1985.(in Chinese) 黄毅,霍峥,孟小峰.CoPrivacy:一种用户协作无匿名区域的位置隐私保护方法[J].计算机学报,2011,34(10):1976-1985.
[7]PERAZZO P.A uniformity-based approach to location privacy[J].Computer Communications,2015,64(1):21-32.
[8]ANDRES M E,BORDENABE N E,et al.Geo-indistinguishability:differential privacy for location-based systems[C]∥20th ACM Conference on Computer and Communications Security(CCS’13).Berlin,Germany,2013:901-914.
[9]ZHANG L,MA C G.Correlation probability indistinguishable location privacy protection algorithm[J].Journal on Communications,2017,38(8):37-49.(in Chinese) 张磊,马春光.关联概率不可区分的位置隐私保护方法[J].通信学报,2017,38(8):37-49.
[10]CHOW C Y,MOKBEL M F,LIU X.A peer-to-peer spatial cloaking algorithm for anonymous location-based services[C]∥14th ACM International Symposium on Advances in Geographic information Systems(ACM-GIS’06).Arlington,USA,2006:171-178.
[11]CHOW C Y,MOKBEL M F,LIU X.Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments[J].GeoInformatica,2011,15(2):351-380.
[12]ASHOUR-TALOUKIM:a cryptographic approach for group location privacy[J].Computer Communications,2012,35(12):1527-1533.
[13]MANWEILER J,SCUDELLARI R,COX L P.SMILE:encounter-based trust for mobile social services[C]∥16th ACM Conference on Computer and Communications Security(CCS’09).Chicago,United States,2009:246-255.
[14]CRUTESER M,GRUNWALD D.Anonymous usage of location-based services through spatial and temporal cloaking[C]∥Proceedings of the 1st International Conference on Mobile System,Applications and Services,ACM,2003:31-42.
[15]CHOW C Y,MOKBEL M F.Casper*:query processing for location services without compromising privacy[J].ACM Tran-sactionson Database Systems,2009,34(4):1-48.
[16]WANG J H,CHENG J J.Spatial Cloaking Algorithm Based on Grid Expansion in P2P Mode[J].Computer Science,2014,4(41):90-94.(in Chinese) 王嘉慧,程久军.P2P模式下基于网格扩增的位置匿名算法[J].计算机科学,2014,4(41):90-94.
[17]ASHOURI-TALOUKI M,BARAANI-DASTJERDI A,SEL- CUK A A.GLP:a cryptographic approach for group location privacy[J].Computer Communications,2012,35(12):1527-1533.
[18]GAO S,MA J F.Towards cooperation location privacy-preser- vinggroup nearest neighbor queries in LBS[J].Journal on Communications,2015,36(3):146-154.(in Chinese) 高胜,马建峰.LBS中面向协同位置隐私保护的群组最近邻查询[J].通信学报,2015,36(3):146-154.
[1] 王磊, 李晓宇.
基于随机洋葱路由的LBS移动隐私保护方案
LBS Mobile Privacy Protection Scheme Based on Random Onion Routing
计算机科学, 2022, 49(9): 347-354. https://doi.org/10.11896/jsjkx.210800077
[2] 杨文坤, 原晓佩, 陈小锋, 郭睿.
三维激光雷达点云空间多特征分割
Spatial Multi-feature Segmentation of 3D Lidar Point Cloud
计算机科学, 2022, 49(8): 143-149. https://doi.org/10.11896/jsjkx.210300275
[3] 杨辉, 陶力宏, 朱建勇, 聂飞平.
基于锚点的快速无监督图嵌入
Fast Unsupervised Graph Embedding Based on Anchors
计算机科学, 2022, 49(4): 116-123. https://doi.org/10.11896/jsjkx.210200098
[4] 夏中, 向敏, 黄春梅.
基于CHBL的P2P视频监控网络分层管理机制
Hierarchical Management Mechanism of P2P Video Surveillance Network Based on CHBL
计算机科学, 2021, 48(9): 278-285. https://doi.org/10.11896/jsjkx.201200056
[5] 张学军, 杨昊英, 李桢, 何福存, 盖继扬, 鲍俊达.
融合语义位置的差分私有位置隐私保护方法
Differentially Private Location Privacy-preserving Scheme withSemantic Location
计算机科学, 2021, 48(8): 300-308. https://doi.org/10.11896/jsjkx.200900198
[6] 王辉, 朱国宇, 申自浩, 刘琨, 刘沛骞.
基于用户偏好和位置分布的假位置生成方法
Dummy Location Generation Method Based on User Preference and Location Distribution
计算机科学, 2021, 48(7): 164-171. https://doi.org/10.11896/jsjkx.200800069
[7] 王乐业.
群智感知中的地理位置本地化差分隐私机制:现状与机遇
Geographic Local Differential Privacy in Crowdsensing:Current States and Future Opportunities
计算机科学, 2021, 48(6): 301-305. https://doi.org/10.11896/jsjkx.201200223
[8] 张蔷, 黄樟灿, 谈庆, 李华峰, 湛航.
基于动态近邻套索算子的金字塔演化策略
Pyramid Evolution Strategy Based on Dynamic Neighbor Lasso
计算机科学, 2021, 48(6): 215-221. https://doi.org/10.11896/jsjkx.200400115
[9] 王萧萧, 王亭雯, 马玉玲, 范佳奕, 崔超然.
基于深度森林的P2P网贷借款人信用风险评估方法
Credit Risk Assessment Method of P2P Online Loan Borrowers Based on Deep Forest
计算机科学, 2021, 48(11A): 429-434. https://doi.org/10.11896/jsjkx.201000013
[10] 李龙飞,张泾周,王鹏德,郭鹏军.
基于节点兴趣和Q-learning的P2P网络搜索机制
P2P Network Search Mechanism Based on Node Interest and Q-learning
计算机科学, 2020, 47(2): 221-226. https://doi.org/10.11896/jsjkx.190400002
[11] 王淑云, 干宗良, 刘峰.
基于层级聚类回归模型的人脸超分辨率重建算法
Face Hallucination Reconstruction Algorithm Based on Hierarchical Clustering Regression Model
计算机科学, 2019, 46(8): 298-302. https://doi.org/10.11896/j.issn.1002-137X.2019.08.049
[12] 周艺华, 李广辉, 杨宇光, 侍伟敏.
基于GeoHash的近邻查询位置隐私保护方法
Location Privacy Preserving Nearest Neighbor Querying Based on GeoHash
计算机科学, 2019, 46(8): 212-216. https://doi.org/10.11896/j.issn.1002-137X.2019.08.035
[13] 孙伟, 赵玉普.
增强旋转不变LBP算法及其在图像检索中的应用
Enhanced Rotation Invariant LBP Algorithm and Its Application in Image Retrieval
计算机科学, 2019, 46(7): 263-267. https://doi.org/10.11896/j.issn.1002-137X.2019.07.040
[14] 张帅, 傅湘玲, 后羿.
基于投资者情感倾向的P2P市场成交量预测模型
Prediction Model of P2P Trading Volume Based on Investor Sentiment
计算机科学, 2019, 46(6A): 60-65.
[15] 童海,白光伟,沈航.
基于双向拍卖的k-匿名激励机制
Double-auction-based Incentive Mechanism for k-anonymity
计算机科学, 2019, 46(3): 202-208. https://doi.org/10.11896/j.issn.1002-137X.2019.03.030
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!