An Active Diffusion Based Location Privacy Protection Method
YE A-yong1, LIN Shao-cong1, MA Jian-feng1,2, XU Li1
1. Key Lab of Network Security and Cryptology, Fujian Normal University, Fuzhou, Fujian 350007, China;
2. School of Computer Science and Technology, Xidian University, Xi'an, Shaanxi 710071, China
In recent years,while the location-based services have become very popular,location privacy issue has also attracted more and more attention from researchers to users.In this article,we present a privacy preserving strategy based on an active diffusion mechanism.The sharing mechanism of location service information in the neighborhood was introduced to reduce the dependence of users on LBS server,thereby resisting the private information disclosure.Through theoretical analysis and simulation results,we have verified the effectiveness of our proposal.
叶阿勇, 林少聪, 马建峰, 许力. 一种主动扩散式的位置隐私保护方法[J]. 电子学报, 2015, 43(7): 1362-1368.
YE A-yong, LIN Shao-cong, MA Jian-feng, XU Li. An Active Diffusion Based Location Privacy Protection Method. Chinese Journal of Electronics, 2015, 43(7): 1362-1368.
[1] Mokbel M F.Privacy in location-based services:State-of-the-art and research directions[A].Proceedings of the International Conference on Mobile Data Management[C].USA:IEEE,2007.228.
[2] Reza Shokri.Hiding in the mobile crowd:location privacy through collaboration[J].IEEE Transactions on Dependable Secure Computer,2014,11(3):266-279.
[3] Gruteser M,Grunwal D.Anonymous usage of location-based services through spatial and temporal cloaking[A].Proceedings of the International Conference on Mobile Systems Applications and Services[C].USA:IEEE,2003.163-168.
[4] M F Mokbel,C Y Chow,W G Aref.The new Casper:Query processing for location services without compromising privacy[A].Proceedings of the International Conference on Very Large Data Bases[C].USA:VLDB,2006.763-774.
[5] Bhuvan B,Ling L,et a1.Supporting anonymous location queries in mobile environments with privacy grid[A].Proceedings of the 17th International Conference on WWW[C].USA:ACM,2008.237-246.
[6] P Kalnis,G Ghinita,et al.Preventing location-based identity inference in anonymous spatial queries[J].IEEE Transactions on Knowledge Data Engineering,2007,19(12):1719-1733.
[7] 王丽娜,彭瑞卿,等.个人移动数据收集中的多维轨迹匿名方法[J].电子学报,2013,41(8):1653-1659. Wang Li-na,Peng Rui-qing,et al.Multi-dimensional trajectory anonymity in collecting personal mobility data[J].Acta Electronica Sinica,2013,41(8):1653-1659.(in Chinese)
[8] H Kido,et al.An anonymous communication technique using dummies for location-based services[A].Proceedings of IEEE ICPS[C].USA:IEEE,2005.88-97.
[9] Rinku Dewri.Exploiting service similarity for privacy in location based search queries[J].IEEE Transactions on Parallel and Distributed Systems,2013,25(2):374-383.
[10] Kenta Miura,Fumiaki Sato.A hybrid method of user privacy protection for location based services[A].Proceedings of the 7th International Conference on Complex,Intelligent,and Software Intensive Systems[C].Taiwan:CISIS,2013.434-439.
[11] Agusti Solanas,Antoni Mart Ballest.A TTP-free protocol for location privacy in location based services[J].Computer Communications,2008,31(6):1181-1191.
[12] Kyriakos Mouratidis.Strong location privacy:A case study on shortest path queries[A].Proceedings of IEEE 29th International Conference on Data Engineering (ICDE)[C].USA:IEEE,2013.136-143.
[13] 刘华玲,郑建国,孙辞海.基于贪心扰动的社交网络隐私保护研究[J].电子学报,2013,41(8):1586-1591. Liu Hua-ling,Zheng Jian-guo,Sun Ci-hai.Privacy preserving in social networks based on greedy perturbation[J].Acta Electronica Sinica,2013,41(8):1586-1591.(in Chinese)
[14] M Piorkowski,N Sarafijanovic Djukic,M Grossg.CRAWDAD data set epfl/mobility[DB].http://crawdad.cs.dartmouth.edu,2009-02-24.
[15] 马知恩,周义仓.传染病动力学的数学建模与研究[M].北京:科学出版社,2004.