计算机科学 ›› 2019, Vol. 46 ›› Issue (4): 158-163.doi: 10.11896/j.issn.1002-137X.2019.04.025
吴丹丹, 吕鑫
WU Dan-dan, LYU Xin
摘要: 随着移动终端的日益普及和通信技术的飞速发展,基于位置的服务应用愈发广泛。但用户的位置信息时常涉及个人隐私,因此如何在确保服务质量的同时防止用户隐私的泄露是当前研究的热点问题。文中提出了一种分布式结构下基于用户协作的匿名区域构建算法,该方法在设定范围内随机选取锚点,并通过逐跳广播的方式搜寻协作用户,直至满足匿名需求。在协作用户响应过程中,用户计算自身到锚点的距离,形成以锚点为圆心的匿名区域。实验结果表明,该方法可有效抵御共谋攻击和匿名中心攻击,同时能较大程度地降低平均匿名面积。
中图分类号:
[1]GRUTESER M,GRUNWALD D.Anonymous usage of loca- tion-based services through spatial and temporal cloaking[C]∥1st ACM International Conference on Mobile Systems,Applications,and Services.SanFrancisco,United States,2003:31-42. [2]NIU B,et al.Achieving k-anonymity in privacy-aware location-based services[C]∥33th IEEE International Conference on Computer Communications.Toronto,Canada,2014:754-762. [3]LIU H,LI X H.Privacy enhancing method for dummy-based privacy protection with continuous location-based service queries[J].Journal on Communications,2016,37(7):140-150.(in Chinese) 刘海,李兴华.连续服务请求下基于假位置的用户隐私增强方法[J].通信学报,2016,37(7):140-150. [4]PEI Z X,LI X H,LIU H.Anonymizing region construction scheme based on query range in location-based service privacy protection[J].Journal on Communications,2017,38(9):125-132.(in Chinese) 裴卓雄,李兴华,刘海.LBS隐私保护中基于查询范围的匿名区构造方案[J].通信学报,2017,38(9):125-132. [5]YIU M L,JENSEN C S,MØLLER J,et al.Design and analysis of aranking approach to private location-based services[J].ACM Transactionson Database Systems,2011,36(2):1-42. [6]HUANG Y,HUO Z,MENG X F.CoPrivacy:A Collaborative Location Privacy-Preserving Method without Cloaking Region[J].Chinese Journal of Computers,2011,34(10):1976-1985.(in Chinese) 黄毅,霍峥,孟小峰.CoPrivacy:一种用户协作无匿名区域的位置隐私保护方法[J].计算机学报,2011,34(10):1976-1985. [7]PERAZZO P.A uniformity-based approach to location privacy[J].Computer Communications,2015,64(1):21-32. [8]ANDRES M E,BORDENABE N E,et al.Geo-indistinguishability:differential privacy for location-based systems[C]∥20th ACM Conference on Computer and Communications Security(CCS’13).Berlin,Germany,2013:901-914. [9]ZHANG L,MA C G.Correlation probability indistinguishable location privacy protection algorithm[J].Journal on Communications,2017,38(8):37-49.(in Chinese) 张磊,马春光.关联概率不可区分的位置隐私保护方法[J].通信学报,2017,38(8):37-49. [10]CHOW C Y,MOKBEL M F,LIU X.A peer-to-peer spatial cloaking algorithm for anonymous location-based services[C]∥14th ACM International Symposium on Advances in Geographic information Systems(ACM-GIS’06).Arlington,USA,2006:171-178. [11]CHOW C Y,MOKBEL M F,LIU X.Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments[J].GeoInformatica,2011,15(2):351-380. [12]ASHOUR-TALOUKIM:a cryptographic approach for group location privacy[J].Computer Communications,2012,35(12):1527-1533. [13]MANWEILER J,SCUDELLARI R,COX L P.SMILE:encounter-based trust for mobile social services[C]∥16th ACM Conference on Computer and Communications Security(CCS’09).Chicago,United States,2009:246-255. [14]CRUTESER M,GRUNWALD D.Anonymous usage of location-based services through spatial and temporal cloaking[C]∥Proceedings of the 1st International Conference on Mobile System,Applications and Services,ACM,2003:31-42. [15]CHOW C Y,MOKBEL M F.Casper*:query processing for location services without compromising privacy[J].ACM Tran-sactionson Database Systems,2009,34(4):1-48. [16]WANG J H,CHENG J J.Spatial Cloaking Algorithm Based on Grid Expansion in P2P Mode[J].Computer Science,2014,4(41):90-94.(in Chinese) 王嘉慧,程久军.P2P模式下基于网格扩增的位置匿名算法[J].计算机科学,2014,4(41):90-94. [17]ASHOURI-TALOUKI M,BARAANI-DASTJERDI A,SEL- CUK A A.GLP:a cryptographic approach for group location privacy[J].Computer Communications,2012,35(12):1527-1533. [18]GAO S,MA J F.Towards cooperation location privacy-preser- vinggroup nearest neighbor queries in LBS[J].Journal on Communications,2015,36(3):146-154.(in Chinese) 高胜,马建峰.LBS中面向协同位置隐私保护的群组最近邻查询[J].通信学报,2015,36(3):146-154. |
[1] | 王磊, 李晓宇. 基于随机洋葱路由的LBS移动隐私保护方案 LBS Mobile Privacy Protection Scheme Based on Random Onion Routing 计算机科学, 2022, 49(9): 347-354. https://doi.org/10.11896/jsjkx.210800077 |
[2] | 杨文坤, 原晓佩, 陈小锋, 郭睿. 三维激光雷达点云空间多特征分割 Spatial Multi-feature Segmentation of 3D Lidar Point Cloud 计算机科学, 2022, 49(8): 143-149. https://doi.org/10.11896/jsjkx.210300275 |
[3] | 杨辉, 陶力宏, 朱建勇, 聂飞平. 基于锚点的快速无监督图嵌入 Fast Unsupervised Graph Embedding Based on Anchors 计算机科学, 2022, 49(4): 116-123. https://doi.org/10.11896/jsjkx.210200098 |
[4] | 夏中, 向敏, 黄春梅. 基于CHBL的P2P视频监控网络分层管理机制 Hierarchical Management Mechanism of P2P Video Surveillance Network Based on CHBL 计算机科学, 2021, 48(9): 278-285. https://doi.org/10.11896/jsjkx.201200056 |
[5] | 张学军, 杨昊英, 李桢, 何福存, 盖继扬, 鲍俊达. 融合语义位置的差分私有位置隐私保护方法 Differentially Private Location Privacy-preserving Scheme withSemantic Location 计算机科学, 2021, 48(8): 300-308. https://doi.org/10.11896/jsjkx.200900198 |
[6] | 王辉, 朱国宇, 申自浩, 刘琨, 刘沛骞. 基于用户偏好和位置分布的假位置生成方法 Dummy Location Generation Method Based on User Preference and Location Distribution 计算机科学, 2021, 48(7): 164-171. https://doi.org/10.11896/jsjkx.200800069 |
[7] | 王乐业. 群智感知中的地理位置本地化差分隐私机制:现状与机遇 Geographic Local Differential Privacy in Crowdsensing:Current States and Future Opportunities 计算机科学, 2021, 48(6): 301-305. https://doi.org/10.11896/jsjkx.201200223 |
[8] | 张蔷, 黄樟灿, 谈庆, 李华峰, 湛航. 基于动态近邻套索算子的金字塔演化策略 Pyramid Evolution Strategy Based on Dynamic Neighbor Lasso 计算机科学, 2021, 48(6): 215-221. https://doi.org/10.11896/jsjkx.200400115 |
[9] | 王萧萧, 王亭雯, 马玉玲, 范佳奕, 崔超然. 基于深度森林的P2P网贷借款人信用风险评估方法 Credit Risk Assessment Method of P2P Online Loan Borrowers Based on Deep Forest 计算机科学, 2021, 48(11A): 429-434. https://doi.org/10.11896/jsjkx.201000013 |
[10] | 李龙飞,张泾周,王鹏德,郭鹏军. 基于节点兴趣和Q-learning的P2P网络搜索机制 P2P Network Search Mechanism Based on Node Interest and Q-learning 计算机科学, 2020, 47(2): 221-226. https://doi.org/10.11896/jsjkx.190400002 |
[11] | 王淑云, 干宗良, 刘峰. 基于层级聚类回归模型的人脸超分辨率重建算法 Face Hallucination Reconstruction Algorithm Based on Hierarchical Clustering Regression Model 计算机科学, 2019, 46(8): 298-302. https://doi.org/10.11896/j.issn.1002-137X.2019.08.049 |
[12] | 周艺华, 李广辉, 杨宇光, 侍伟敏. 基于GeoHash的近邻查询位置隐私保护方法 Location Privacy Preserving Nearest Neighbor Querying Based on GeoHash 计算机科学, 2019, 46(8): 212-216. https://doi.org/10.11896/j.issn.1002-137X.2019.08.035 |
[13] | 孙伟, 赵玉普. 增强旋转不变LBP算法及其在图像检索中的应用 Enhanced Rotation Invariant LBP Algorithm and Its Application in Image Retrieval 计算机科学, 2019, 46(7): 263-267. https://doi.org/10.11896/j.issn.1002-137X.2019.07.040 |
[14] | 张帅, 傅湘玲, 后羿. 基于投资者情感倾向的P2P市场成交量预测模型 Prediction Model of P2P Trading Volume Based on Investor Sentiment 计算机科学, 2019, 46(6A): 60-65. |
[15] | 童海,白光伟,沈航. 基于双向拍卖的k-匿名激励机制 Double-auction-based Incentive Mechanism for k-anonymity 计算机科学, 2019, 46(3): 202-208. https://doi.org/10.11896/j.issn.1002-137X.2019.03.030 |
|