基于双线性对的k-匿名隐私保护方案研究
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:Research on k-anonymous privacy protection scheme based on bilinear pairing
  • 作者:宋成 ; 张亚东 ; 彭维平 ; 闫玺玺
  • 英文作者:Song Cheng;Zhang Yadong;Peng Weiping;Yan Xixi;School of Computer Science & Technology,Henan Polytechnic University;
  • 关键词:基于位置的服务 ; 双线性对 ; k-匿名 ; 隐私保护
  • 英文关键词:location-based services;;bilinear pairings;;k-anonymity;;privacy protection
  • 中文刊名:JSYJ
  • 英文刊名:Application Research of Computers
  • 机构:河南理工大学计算机科学与技术学院;
  • 出版日期:2018-03-14 17:31
  • 出版单位:计算机应用研究
  • 年:2019
  • 期:v.36;No.331
  • 基金:国家自然科学基金青年基金资助项目(61300124,61300216);; 河南省科技攻关计划项目(132102210123)
  • 语种:中文;
  • 页:JSYJ201905054
  • 页数:4
  • CN:05
  • ISSN:51-1196/TP
  • 分类号:255-258
摘要
针对移动互联网环境下位置服务的隐私保护问题,基于双线性对性质和k-匿名的思想,提出了一个高服务质量的隐私增强方案。通过终端在欧几里德距离环形区域内均匀生成2k个虚假位置,利用位置熵、位置分散度和地图背景信息从中筛选出k-1个虚假位置,进而达到更优的k-匿名效果。通过安全性分析,方案不仅满足隐私性、匿名性、不可伪造性等安全特性,而且能够抗查询服务追踪攻击。仿真实验表明,方案虚假位置节点选取具有更优的均匀度,同时在假节点生成和选取效率方面也有所提高。
        Aiming at the privacy protection problem of location service in mobile Internet environment,this paper proposed a high quality of service privacy enhancement scheme based on bilinear pairing property and anonymity. The terminal generated 2k evenly distributed false locations in the ring area of Euclidean distance. According to location entropy,location dispersion and map background information,the terminal screens superior k-1 false locations from them to achieve better k-anonymity.Through the security analysis,the scheme not only satisfied the privacy,anonymity,unforgeability etc.,but also could resist query service tracking attack. The simulation experiments show that the selection of false position nodes in this scheme has a better uniformity,and the efficiency of the false node generation and selection is also improved.
引文
[1]Tiwari S,Kaushik S,Jagwani P,et al.A survey on LBS:system architecture,trends and broad research areas[M]//Databases in Networked Information Systems.Berlin:Springer,2011:223-241.
    [2]Krumm J.A survey of computational location privacy[J].Personal and Ubiquitous Computing,2009,13(6):391-399.
    [3]Sun Yanming,Chen Min,Hu Long,et al.ASA:against statistical attacks for privacy-aware users in location based service[J].Future Generation Computer Systems,2017,70(5):48-58.
    [4]Xin Mingjun,Lu Manli,Li Weimin.An adaptive collaboration evaluation model and its algorithm oriented to multi-domain locationbased services[J].Expert Systems with Applications,2015,42(5):2798-2807.
    [5]万盛,李凤华,牛犇,等.位置隐私保护技术研究进展[J].通信学报,2016,37(12):124-141.(Wan Sheng,Li Fenghua,Niu Ben,et al.Progress in location privacy protection technology[J].Journal of Communication,2016,37(12):124-141.)
    [6]Talukder N,Ahamed S I.Preventing multi-query attack in locationbased services[C]//Proc of the 3rd ACM Conference on Wireless Network Security.New York:ACM Press,2010:25-36.
    [7]Gao Sheng,Ma Jianfeng,Shi Weisong,et al.Tr PF:a trajectory privacy-preserving framework for participatory sensing[J].IEEE Trans on Information Forensics&Security,2013,8(6):874-887.
    [8]Mascetti S,Freni D,Bettini C,et al.Privacy in geo-social networks:proximity notification with untrusted service providers and curious buddies[J].The International Journal on Very Large Data Bases,2011,20(4):541-566.
    [9]Liu Xinxin,Liu Kaikai,Guo Linke,et al.A game-theoretic approach for achieving k-anonymity in location based services[C]//Proc of IEEE INFOCOM.Piscataway,NJ:IEEE Press,2013:2985-2993.
    [10]Kido H,Yanagisawa Y,Satoh T.Protection of location privacy using dummies for location-based services[C]//Proc of the 21st International Conference on Data Engineering Workshops.Washington DC:IEEE Computer Society,2005:1248.
    [11]Lu Hua,Jensen C S,Man Manlung.PAD:privacy-area aware,dummy-based location privacy in mobile services[C]//Proc of the 7th ACM International Workshop on Data Engineering for Wireless and Mobile Access.New York:ACM Press,2008:16-23.
    [12]Niu Ben,Li Qinghua,Zhu Xiaoyan,et al.Achieving k-anonymity in privacy-aware location-based services[C]//Proc of IEEE INFOCOM.Piscataway,NJ:IEEE Press,2014:754-762.
    [13]Xu T,Cai Ying.Exploring historical location data for anonymity preservation in location-based services[C]//Proc of the 27th IEEE IN-FOCOM Conference on Computer Communications.Piscataway,NJ:IEEE Press,2008:547-555.
    [14]Xu T,Cai Ying.Feeling-based location privacy protection for location-based services[C]//Proc of the 16th ACM Conference on Computer and Communications Security.New York:ACM Press,2009:348-357.
    [15]Wang Yu,Xu Dingbang,He Xiao,et al.L2P2:location-aware location privacy protection for location-based services[C]//Proc of IEEEINFOCOM.Piscataway,NJ:IEEE Press,2012:1996-2004.
    [16]Li Xinghua,Wang Ermeng,Yang Weidong,et al.DALP:a demandaware location privacy protection scheme in continuous locationbased services[J].Concurrency&Computation Practice&Experience,2016,28(4):1219-1236.
    [17]Schlegel R,Chow C Y,Huang Q,et al.User-defined privacy grid system for continuous location-based services[J].IEEE Trans on Mobile Computing,2015,14(10):2158-2172.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700