您的位置:山东大学 -> 科技期刊社 -> 《山东大学学报(工学版)》

山东大学学报(工学版) ›› 2012, Vol. 42 ›› Issue (5): 96-101.

• 机器学习与数据挖掘 • 上一篇    下一篇

面向路网限制的位置隐私保护算法

孙岚,罗钊,吴英杰,王一蕾   

  1. 福州大学数学与计算机科学学院, 福建 福州 350108
  • 收稿日期:2012-06-01 出版日期:2012-10-20 发布日期:2012-06-01
  • 作者简介:作者简介:孙岚(1978- ),女,陕西西安人,讲师,硕士,主要研究方向为数据挖掘与隐私保护.E-mail:lsun@fzu.edu.cn
  • 基金资助:
    福建省自然科学基金资助项目(2010J01330);福州大学科技发展基金资助项目(2010-XY-18, 2010-XY-20)

An algorithm for protecting location privacy in road network

SUN Lan, LUO Zhao, WU Ying-jie, WANG Yi-lei   

  1. College of Mathematics and Computer Science, Fuzhou University, Fuzhou 350108, China
  • Received:2012-06-01 Online:2012-10-20 Published:2012-06-01

摘要: 目前关于位置服务中的位置隐私保护研究大多是面向欧式空间,其相关模型及算法无法直接用于解决路网环境下位置服务中可能存在的隐私泄露问题。本研究针对公路网络下用户分布不均可能导致的推断攻击,设计出一种面向路网限制的位置隐私保护算法。本算法通过对公路网络的边权进行排序,并结合路段地理位置分布,进行隐匿边集的构造,以达到降低边权不均引起推断攻击的风险。通过实验对本算法的可行性及有效性与同类算法进行了比较分析。实验结果表明,本算法是有效可行的。

关键词: 位置隐私保护, 公路网络, 边权不均, 边权推断攻击, 隐匿边集, 查询代价

Abstract: Recently, the privacy preserving locationbased services has been a hot topic in data privacy preserving research fields. The existed researches on location privacy preserving mainly focused on Euclidean space. However, many locationbased services were under roadnetwork environment, whose distribution of users was possibly unbalanced, which could make the traditional location privacy models and methods under Euclidean space unusable. A location privacy protection algorithm was proposed to prevent the inferring attack caused by the unbalanced distribution of users in roadnetwork. The key idea of the proposed algorithm was that the cloaked segment set was constructed by sorting edges with edge weight and taking the geographical position distribution of users into consideration. Experimental analysis was designed by comparing the proposed algorithm and the traditional algorithm on the feasibility and effectiveness. Experimental results showed that the proposed algorithm was effective and feasible.

Key words: location privacy preserving, road network, unbalanced edge weight, edge weight inference attack, cloaking edge set, query cost

中图分类号: 

  • TP309
[1] 王兰忠, 孟文杰. 远程教育中视频感知加密算法[J]. 山东大学学报(工学版), 2015, 45(4): 40-44.
[2] 王丹辉1,王安2*. 针对分组密码S盒的能量分析攻击效率研究[J]. 山东大学学报(工学版), 2014, 44(2): 6-11.
[3] 杨珺涵1,曹天杰1,2. 标准模型下基于无证书密钥封装的口令认证密钥交换协议[J]. 山东大学学报(工学版), 2013, 43(2): 11-17.
[4] 徐龙琴1,刘双印1,2,3,4*. 基于APSO-WLSSVR的水质预测模型[J]. 山东大学学报(工学版), 2012, 42(5): 80-86.
[5] 张光庆,孔凡玉,李大兴, . Koblitz曲线上抵抗简单功耗分析的有效算法[J]. 山东大学学报(工学版), 2007, 37(3): 78-80 .
[6] 杨 晨,马文平,王新梅 . 实用的基于知识签名的群签名方案[J]. 山东大学学报(工学版), 2007, 37(1): 76-79 .
[7] 刘元勋,徐秋亮,云晓春 . 面向入侵检测系统的通用应用层协议识别技术研究[J]. 山东大学学报(工学版), 2007, 37(1): 65-69 .
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!