基于随机偏移和零交集偏移的匿名区域切换算法
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:Anonymous Region Handoff Algorithm Based on Random Migration and Zero Intersection Offset
  • 作者:王智明
  • 英文作者:WANG Zhiming;College of Information Engineering,Putian University;
  • 关键词:基于位置的服务 ; 隐私保护 ; k-匿名 ; 匿名区域
  • 英文关键词:location-based service;;privacy protection;;k-anonymous;;anonymous area
  • 中文刊名:GZDI
  • 英文刊名:Journal of Guizhou University(Natural Sciences)
  • 机构:莆田学院信息工程学院;
  • 出版日期:2019-04-28 07:00
  • 出版单位:贵州大学学报(自然科学版)
  • 年:2019
  • 期:v.36
  • 基金:福建省教育厅中青年项目资助(JAT160443);; 莆田市科技项目资助(2014G16);; 莆田学院2017校级应用型课程建设项目资助
  • 语种:中文;
  • 页:GZDI201902012
  • 页数:6
  • CN:02
  • ISSN:52-5002/N
  • 分类号:64-69
摘要
近年来,LBS技术迅猛发展,渗透着我们生活的方方面面,与此同时个人位置隐私安全也成为一个不容忽视的社会问题。通过对普通匿名区域生成算法改进,提出了匿名区域偏移切换算法与匿名区域零交集偏移切换算法。匿名区域偏移切换算法对普通匿名区域生成算法产生的匿名区域进行偏移,偏移与用户分布情况有关,具有随机性。匿名区域零交集偏移切换算法则对匿名区域偏移切换算法中匿名区域的偏移量作进一步要求,使得切换前、后的匿名区域无交集,进一步提升抵御攻击能力。经过实验验证,两种改进算法在抵御攻击的能力和提升匿名区域切换的成功率方面有良好表现。
        In recent years,with the rapid development of LBS technology,it permeates all aspects of our lives.At the same time,personal location privacy security has become a social problem that can not be ignored. By improving the general anonymous region generation algorithm,an anonymous region offset handover algorithm and an anonymous region zero intersection offset handover algorithm were proposed. Anonymous region migration handover algorithm migrates anonymous region generated by common anonymous region generation algorithm. The migration is related to user distribution and has randomness. Anonymous area zero-intersection migration handover algorithm further requires anonymous area offset in anonymous area migration handover algorithm,which makes the anonymous area before and after handover no intersection,and further improves the ability to resist attacks.Experiments show that the two improved algorithms have good performance in resisting attacks and improving the success rate of anonymous area handover.
引文
[1]Sun Yanming,Chen Min,Hu Long,et al.ASA:Against statistical attacks for privacy-aware users in Location Based Service[J].Future Generation Computer Systems,2016,7(4):46-53.
    [2]N.Talukder,S.I.Ahamed. Preventing multi-query attack in locationbased services[C].New Jersey,USA:Proceedings of the Third ACM Conference on Wireless Network Security(Wi Sec),2010.
    [3]Niu B,Zhang Z,Li X,et al. Privacy-area aware dummy generation algorithms for location-based services[C]//2014 IEEE International Conference on Communications. IEEE(ICC),2014:957-962.
    [4]Sweeney L. K-anonymity:a model for protecting privacy[J].International journal on uncertainty,fuzziness and knowledge-based systems,2002,10(5):557-570.
    [5]Gruteser M,Grunwald D.Anonymous usage of location-based services through spatial and temporal cloaking[C]//Proceedings of the1st International Conference on Mobile Systems,Applications And Services.New York:ACM Press,2003.
    [6]Machanavajjhala A,Kifer D,et al.L-diversity:Privacy beyond k-anonymity[J]. ACM Transactions on Knowledge Discovery from Data(TKDD),2007,1(7):63-66.
    [7]Solanas A,Sebe F,Domingo-Ferrer J.Micro-aggregationbased heuristics for p-sensitive k-anonymity:one step beyond[C]. Nantes,France:Proceedings of the 2008 international workshop on privacy and anonymity in information society(PAIS’08),2008:61-69.
    [8]Li Xinghua,Wang Ermeng,Yang Weidong.DALP:A demand-aware location privacy protection scheme in continuous location-based services[J]. Concurrency&Computation Practice&Experience,2016,28(4):1219-1236.
    [9]Schlegel R,Chow C Y.User-defined privacy grid system for continuous location-based services[J]. IEEE Transactions on Mobile Computing,2015,14(10):2158-2172.
    [10]PALANISAMY B,LIU L. Attack-resilient mix-zones over road networks:architecture and algorithms[J]. IEEE Transactions on Mobile Computing,2015,14(3):495-508.
    [11]Yiu M L,Jensen C S,Huang X,et al. SpaceTwist:Managing the trade-offs among location privacy,query performance,and query accuracy in mobile services[C]. Cancun,Mexico:Proceedings of the IEEE International Conference on Data Engineering(ICDE.08),2008.
    [12]Kim Yong-Ki,Hossain Amina,Hossain Al-Amin,et al. Hilbert-order based spatial cloaking algorithm in road network[J]. Concurrency and Computation:Practice and Experience,2013,25(1):81-88.