支持定位隐私保护的物联网实体搜索技术研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
物联网描绘的美好前景以及它所带来的巨大商业利益,吸引着科研机构、跨国企业、科技公司和各国政府的投入,以物联网为代表的新兴技术一跃成为信息社会的核心产业之一。在各方面因素的推动下,物联网的技术步入一个快速发展的阶段。
     在拥有海量实体的物联网中,实体的搜索和定位技术成为首先需要解决的问题。搜索处于物联网框架的底层,是物联网的基础,尚未有成熟的解决方案。实体搜索作为物联网中最重要的模块,能够建立实体间紧密的联系,支撑不同的应用层服务。同时,由于物联网中定位服务广泛的应用,位置隐私越来越吸引研究人员和普通大众的关注,而位置隐私保护与服务质量的矛盾、位置隐私需求的个性化特征、位置隐私与其他隐私的强关联性等特征使位置隐私保护成为难以解决的问题。
     本文首先分析了物联网实体搜索和位置隐私保护的研究现状,梳理了不同的研究思路,明确了物联网实体搜索和位置隐私保护方面的关键性问题。结合已有的实体搜索框架,本文提出一个支持定位隐私保护的物联网实体搜索算法。针对现有算法中没有将实体和服务器统一考虑的问题,在该算法中提出了支持最短路径和地理敏感度的隐私保护算法。经过测试,该算法可以有效地模糊实体位置,而服务器的服务质量并没有受到影响。
The bright promise of Internet of Things and the commercial interests brought by it has been attracting research institutions, multinational corporations, technology companies and governments. Internet of Things, which represents emerging technologies, has become one of the core industries of Information Society. Concerned technology has stepped into a stage of rapid development, thanks to multi-factors.
     The technology of searching and locating an entity among massive others is a top priority. It is elementary to the Internet of Things, and there is no mature solution yet. Searching entity is the most important part of Internet of Things, brings close links between the entities and supports kinds of services in the application layer. Meanwhile, the public and researchers have increasingly been concerned about location privacy protection, which is difficult to deal with due to the contradiction between location privacy and the quality of service, customized needs of privacy protection and the strong correlation between location privacy and other privacies.
     The paper summarizes current researches of entity searching and location privacy protection of Internet of Things, analyzes different research ideas and specifies the key issues. Based on existing frameworks of entity searching, the paper proposes a new algorithm which supports location privacy protection. Because there is no existing algorithm for the integrated consideration of the request and the response, the shortest path algorithm and geographic sensitivity are used for location privacy protection in the design. Testing proves that the algorithm can change location effectively and quality of service is not affected.
引文
[1] Kevin Ashton. That‘Internet of Things’Thing[C]. RFID Journal. Juli 2009.
    [2] Weiser, Gold, Brown. Ubiquitous computing[EB/OL]. (1999-05-11) [2011-6-6]. http://www.research.ibm.com/journal/sj/384/weiser.html.
    [3] Weiser, Mark. Ubiquitous computing[EB/OL]. (1996-03-17) [2011-6-6]. http://www.ubiq.com/hypertext/weiser/UbiHome.html.
    [4] Weiser Mark. The Computer for the 21st Century[EB/OL]. (1991-9) [2011-6-6]. http://www.ubiq.com/hypertext/weiser/SciAmDraft3.html.
    [5] Jeh G, Widom J. Scaling Personalized WebSearch[R]. Stanford University Technical Report, 2002.
    [6] Zelkha Eli, Epstein Brian, Birrell Simon, Dodsworth Clark. From Devices to Ambient Intelligence[C]. In Digital Living Room Conference. June 1998.
    [7] ITU. ITU Internet Reports 2005:The Internet of Things[R]. 2005.
    [8] EPOSS. Internet of Things in 2020[R]. 2008
    [9] USA. The Digital Road to Recover: A Stimulus Plan to Create Jobs, Boost Productivity and Revitalize America[R]. 2009.
    [10] Commission of The European Communities. Internet of Things—An action plan for Europe[R]. 2009.
    [11]温家宝. 2010年政府工作报告[M]. 2010.
    [12] Chi-Yin Chow, Mohamed F. Mokbel, Walid G. Aref. Casper: Query Processing for Location Services without Compromising Privacy[J]. ACM Transactions on Database Systems Vol. 34 No. 4
    [13] Wiki. Foursquare(social network)[EB/OL] . (2011-6-5) [2011-6-6]. http://en.wikipedia.org/wiki/Foursquare_(social_network).
    [14]网易.网易八方[EB/OL]. (unknow) [2011-6-7]. http://bafang.163.com/index.
    [15]毛伟.互联网资源标识和寻址技术研究[D].中国科学院计算技术研究所计算机系统结构博士学位论文. 2006.
    [16] PEinar Snekkenes. Concepts for personal location privacy policies[C]. In Proceedings of the 3rd ACM conference on Electronic Commerce. New York, NY, USA. ACM Press. 2001:48-57.
    [17] Evan Welbourne, Leilani Battle, Garret Cole, Kayla Gould, Kyle Rector, Samuel Raymer, Magdalena Balazinska, Gaetano Borriello. Building the Internet of Things Using RFID[J]. IEEE Internet Computing, 2009.
    [18]孙其博,刘杰,黎羴,范春晓,孙娟娟.物联网:概念、架构与关键技术研究综述[J].北京邮电大学学报, 2010, 33(3).
    [19] Snehamay Banerjee and Ram Kumar. Managing Electronic Interchanges of Business Documents[J]. Communications of the ACM. 2002, 45(7):96-102.
    [20] Luigi Atzori, Antonio Iera, Giacomo Morabito. The Internet of Things:A survey[J]. Computer Networks, 2010, 54(15):2787-2805.
    [21]孔宁,李晓东,罗万明,阎保平.物联网资源寻址模型[J].软件学报, 2010, 21(7): 1657-1666.
    [22]王群.物联网体系结构研究及模拟实验平台的组建[J].实验技术与管理, 2010, 27(10):178-181.
    [23] Accada. Accada is now Fosstrak[EB/OL].(unknow) [2011-6-6]. http://www.accada.o rg/.
    [24] Auto-ID Labs. Fosstrak: Open Source RFID Software Platform[EB/OL]. (unknow) [2011-6-6]. http://www.fosstrak.org/
    [25]宫雪,刘慧,陈峥.对象名解析服务的技术构架[J].物流技术, 2006(4):62-64.
    [26]刘学洋,赵文,张世琨,王立福.基于P2P的RFID编码解析网络结构与算法研究[J].电子学报, 2008, 36(12A):102-108.
    [27] Rüdiger Schollmeier. A Definition of Peer-to-Peer Networking for the Classification of Peer-to-Peer Architectures and Applications[C]. In Proceedings of the First International Conference on Peer-to-Peer Computing. 2002:101-102.
    [28] Benjamin Fabian, Oliver Günther. Security Challenges of the EPCglobal Network [J]. Communications of the ACM. 2009, 52(7):121-125.
    [29]周彦伟,吴振强. TA-ONS——新型的物联网查询机制[J].计算机应用, 2010, 30(8): 2202-2206.
    [30]杨庚,许建,陈伟,祁正华,王海勇.物联网安全特征与关键技术[J].南京邮电大学学报, 2010, 30(4):20-29.
    [31] Stefan Zoels, Simon Schubert, Wolfgang Kellerer, Zoran Despotovic. Hybrid DHT Design for Mobile Environments[C]. In Agents and Peer-to-Peer Computing: 5th International Workshop. Hakodate, Japan. 2006:19-30.
    [32] Andrew MacQuire, Andrew Brampton, Idris A. Rai, Laurent Mathy. PerformanceAnalysis of Stealth DHT with Mobile Nodes[C]. In Proceedings of the 4th annual IEEE international conference on Pervasive Computing and Communications Workshops. Washington, DC, USA:IEEE Computer Society, 2006:184-189.
    [33] Wiki. Distributed hash table[EB/OL]. (2011-6-5) [2011-6-6]. http://en.wikipedia.org/ wiki/Distributed_hash_table.
    [34] E.Sit, R.Morris. Security Considerations for Peer-to Peer Distributed Hash Tables[C]. In Proceedings for the 1st International Workshop on Peer-to-Peer Systems. Cambridge, MA, USA. 2002.
    [35] Jose Costa-Requena, Haitao Tang, Inmaculada Espigares. Consistent LBS Solution in Next Generations of Mobile Internet[C]. In Proceedings of the Ninth International Conference on Parallel and Distributed Systems. 2002:637-642.
    [36]王春. 3G时代位置服务技术研究[J].通信技术. 2010, 43(5):159-161.
    [37] Gruteser M, Grunwald D. Anonymous Usage of Location-based Services Through Spatial and Temporal Cloaking[C]. In Processing of the Intemational Conference on Mobile Systems, Applications, and Services. 2003:163-168.
    [38]林欣,李善平,杨朝晖. LBS中连续查询攻击算法及匿名性度量[J].软件学报. 2009, 20(4):1058-1068.
    [39]石峰,莫忠息.信息论[M].武汉:武汉大学出版社, 2004.
    [40]潘晓,郝兴,孟小峰.基于位置服务中的连续查询隐私保护研究[J].计算机研究与发展. 2010, 47(1):121-129.
    [41] Sergio Mascetti, Claudio Bettini. A Comparison of Spatial Generalization Algorithms for LBS Privacy Preservation[C]. In 2007 International Conference on Mobile Data Management. Mannheim, Germany: Conference and Custom Publishing, 2007:258-262.
    [42] Gabriel Ghinita, Panos Kalnis, Spiros Skiadopoulos. Prive: Anonymous Location-Based Queries in Distributed Mobile Systems[C]. In Proceedings of WWW. 2007:371-380.
    [43] Stefan Schlott, Frank Kargl, Michael Weber. Short paper: Random IDs for preserving location privacy[C]. In Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks. Athens, Greece. 2005:415-417.
    [44]魏琼,卢炎生.位置隐私保护技术研究进展[J].计算机科学. 2008, 35(9):21-25.
    [45]刘实,陈荦,赵亮,谭洁.面向位置服务的移动对象查询处理原型系统[J].计算机研究与发展. 2010, 47(SuppL):424-428.
    [46]潘晓,肖珍,孟小峰.位置隐私研究综述[J].计算机科学与探索. 2007, 1(3):268-281.
    [47]陈娟,方滨兴,殷丽华,苏申.传感器网络中基于源节点有限洪泛的源位置隐私保护协议[J].计算机学报. 2010, 33(9):1736-1747.
    [48]葛君伟,李恭伟,邓思兵.位置预测在定位服务中的应用研究[J].计算机应用研究. 2008, 25(12):3572-3574.
    [49] Junglas I.A.; Spitzmuller C. A Research Model for Studying Privacy Concerns Pertaining to Location-Based Services[C]. In Proceedings of the 38th Hawaii International Conference on System Sciences. Hawaii, 2005.
    [50]张志平,杨建伟.语义网技术及应用研究综述[J].情报学报, 2008(5).
    [51] EPCglobal. The Application Level Events (ALE) Specification[S]. 2009.
    [52] EPCglobal. EPC Information Services (EPCIS) Specification[S]. 2007.
    [53] EPCglobal. EPC Tag Data Standard[S]. 2010:27-28.
    [54] Wiki. Backus–Naur Form[EB/OL]. (2011-5-13) [2011-6-6]. http://en.wikipedia.org/ wiki/Backus-Naur_Form.
    [55] EPCglobal. EPCglobal Object Name Service[S]. 2008:12-19.
    [56] Andreas Pfitzmann, Marit K?hntopp. Anonymity, Unobservability, and Pseudonymity-A Proposal for Terminology[J]. Designing Privacy Enhancing Technologies—Proceedings of the International Workshop on Design Issues in Anonymity and Unobservability, 2000(2009):1-9.
    [57] Marco Gruteser, Dirk Grunwald. Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking[C]. In Proceedings of the 1st international conference on Mobile systems, applications and services. San Francisco, CA . 2003.
    [58] Alastair R. Beresford, Frank Stajano. Location Privacy in Pervasive Computing[J]. IEEE Pervasive Computing, 2003, 2(1):46-55.
    [59] Hidetoshi Kido, Yutaka Yanagisawa, Tetsuji Satoh. An Anonymous Communication Technique using Dummies for Location-based Services[C]. In International Conference on Pervasive Services. 2005:88-97.
    [60] Matt Duckham, Lars Kulik. A Formal Model of Obfuscation and Negotiation for Location Privacy[C]. In The 3rd International Conference on Pervasive Computing. Munich, Germany. 2005:152-170.
    [61] Maria Luisa Damiani, Elisa Bertino, Claudio Silvestri. Protecting location privacyagainst spatial inferences: the PROBE approach[C]. In Proceedings of the 2nd SIGSPATIAL ACM GIS 2009 International Workshop on Security and Privacy in GIS and LBS. Seattle, WA, USA. 2009:32-41.
    [62] Stefan Steiniger, Moritz Neun, Alistair Edwardes. Foundations of Location Based Services[R]. Lecture Notes on LBS, Department of Geography, University of Zurich, 2006.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700