Please wait a minute...
J4  2012, Vol. 46 Issue (4): 712-718    DOI: 10.3785/j.issn.1008-973X.2012.04.020
自动化技术、电信技术     
动态P2P网络中基于匿名链的位置隐私保护
徐建1, 黄孝喜1, 郭鸣2, 金正平1, 郑宁1
1.杭州电子科技大学 计算机学院,浙江 杭州310018;2.浙江大学城市学院 计算机与计算科学学院,浙江 杭州 310015
Location privacy through anonymous chain in dynamic P2P network
XU Jian1, HUANG Xiao-xi1, GUO Ming2, JIN Zheng-ping1, ZHENG Ning1
1. College of Computer, Hangzhou Dianzi University, Hangzhou 310018, China;2. School of Computer and
Computing Science, Zhejiang University City College, Hangzhou 310015, China
 全文: PDF  HTML
摘要:

为了解决动态P2P环境中的位置隐私保护问题,提出基于匿名链的位置隐私保护算法.不同于一般的K-anonymity方法,通过在用户查询信息转发的过程中构造一条匿名链来混淆身份信息与位置信息的一一对应关系,在完成查询的同时保护用户位置的隐私.针对一般P2P匿名存在的匿名组稳定性问题,该算法根据路网环境中移动对象的动态性,通过计算相邻移动用户之间的连通性对匿名链中间节点的选择进行优化.讨论匿名链构造的方法和中间节点优化选择的标准,对算法的安全性展开理论分析.通过实验验证了算法的可行性.实验结果表明,该算法在不同用户密度下都能够较好地完成匿名链的构造,保护用户位置隐私;同时,中间节点的优化方法可以在一定时间内显著提高匿名链的有效性.

Abstract:

An anonymous chain based privacy protection algorithm was presented to solve the problem of location privacy protecting in dynamic peer-to-peer (P2P) network. Different from the general K-anonymity method, anonymous chain was constructed to break the one-to-one correspondence between the user identity and location information during the forwarding process of query message, and the location privacy was protected with the completion of the query. The algorithm optimizes the selection of intermediate nodes according to the stability of linkage between two nodes in order to deal with the dynamic issues in P2P environment.A connectivity matrix was introduced for the chain constructing algorithm and the security of anonymous chain was proved. A simulation on a real city map for the algorithm showed the effectiveness. The results prove that anonymous chain can be constructed in different density of moving nodes and the optimal intermediate nodes selecting method obviously improves the stability of the chain.

出版日期: 2012-05-17
:  TP 391  
基金资助:

国家自然科学基金资助项目(61003195, 61070212, 61103101); 中国博士后科学基金特别资助项目(201104743).

作者简介: 徐建(1975—),男,副教授,从事分布式计算机系统的研究.E-mail:jian.xu@hdu.edu.cn
服务  
把本文推荐给朋友
加入引用管理器
E-mail Alert
RSS
作者相关文章  

引用本文:

徐建, 黄孝喜, 郭鸣, 金正平, 郑宁. 动态P2P网络中基于匿名链的位置隐私保护[J]. J4, 2012, 46(4): 712-718.

XU Jian, HUANG Xiao-xi, GUO Ming, JIN Zheng-ping, ZHENG Ning. Location privacy through anonymous chain in dynamic P2P network. J4, 2012, 46(4): 712-718.

链接本文:

http://www.zjujournals.com/eng/CN/10.3785/j.issn.1008-973X.2012.04.020        http://www.zjujournals.com/eng/CN/Y2012/V46/I4/712

[1] KARIM W. Privacy implications of personal locators: why you should think twice before voluntarily availing yourself to GPS monitoring [J]. Journal of Law and Policy, 2004, 14(1): 485-515.
[2] BARKHUUS L, DEY A. Locationbased services for mobile telephony: a study of users’s privacy concerns [C] ∥Proceedings of Interact. Zurich: IOS, 2003: 709-712.
[3] GRUTESER M, GRUNWALD D. Anonymous usage of location based services through spatial and temporal cloaking [C] ∥Proceedings of Mobile systems, Applications and Services. San Francisco: ACM, 2003: 31-42.
[4] KIDO H, YANAGISAWA H. A anonymous communication technique using dummies for locationbased services[C] ∥Proceedings of ICPS. Santorini: IEEE, 2005: 88-97.
[5] GHINITA G, KALNIS P, KHOSHGOZARAN A, et a1. Private queries in location based services: anonymizers are not necessary [C] ∥Proceedings of the ACM International Conference on Management of Data. Vancouver: ACM, 2008: 121-132.
[6] BAMBA B, LIU L, PESTI P. Supporting anonymous location queries in mobile environments with privacy grid [C]∥ Proceedings of World Wide Web. Beijing: IEEE, 2008: 237-246.
[7] GEDIK B, LIU L. Protecting location privacy with personalized kanonymity: architecture and algorithms [J]. IEEE Transactions on Mobile Computing, 2008, 7(1): 1-17.
[8] XU J, TANG X, HU H, et a1. Privacyconscious locationbased queries in mobile environments [J]. IEEE Transactions on Parallel and Distributed Systems, 2010, 21(3): 313-326.
[9] KYRIAKOS M, YIU M. Anonymous query processing in road networks [J]. IEEE Transactions on Knowledge and Data Engineering, 2010, 22(1): 2-15.
[10] BALAJI P, LIU L. MobiMix: protecting location privacy with mix zones over road networks [C] ∥Proceedings of IEEE International Conference on Data Engineering (ICDE). Hannover: IEEE, 2011: 11-16.
[11] GHINITA G, KALNIS P, SKIADOPOULOS S. PRIVE: anonymous locationbased queries in distributed mobile systems [C]∥Proceedings of World Wide Web. Banff: ACM, 2007: 371-380.
[12] CHOW Chiyin, MOHAMED M, XUAN L. Spatial cloaking for anonymous locationbased services in mobile peertopeer environments [J]. GeoInformatica, 2011,15(2): 351-380.
[13] AMIR A, EFRAT A, MYLLYMAKI J, et al. Buddy tracking: efficient proximity detection among mobile friends [C]∥Proceedings of IEEE INFOCOM. Hong Kong: IEEE, 2004: 7-11.
[14] YIU M L, YU L H, SALTENIS S, et al. Efficient proximity detection among mobile users via selftuning policies [C]∥Proceedings of VLDB. Singapore: ACM, 2010: 13-17.
[15] HUBAUX J P, CAPKUN S, LUO J. The security and privacy of smart vehicles [J]. IEEE Security and Privacy, 2004(3): 4955.
[16] KU W S, ZIMMERMANN R, WANG H. Locationbased spatial query processing with data sharing in wireless broadcast environments [J]. IEEE Transactions on Mobile Computing, 2008, TMC 7(6): 778-791.
[17] THOMAS B. Generating networkbased moving objects [C] ∥Proceedings of International Conference on Scientific and Statistical Database Management. Berlin: IEEE, 2000: 253-256.

[1] 赵建军,王毅,杨利斌. 基于时间序列预测的威胁估计方法[J]. J4, 2014, 48(3): 398-403.
[2] 张天煜, 冯华君, 徐之海, 李奇, 陈跃庭. 基于强边缘宽度直方图的图像清晰度指标[J]. J4, 2014, 48(2): 312-320.
[3] 刘中, 陈伟海, 吴星明, 邹宇华, 王建华. 基于双目视觉的显著性区域检测[J]. J4, 2014, 48(2): 354-359.
[4] 崔光茫, 赵巨峰, 冯华君, 徐之海, 李奇, 陈跃庭. 非均匀介质退化图像快速仿真模型的建立[J]. J4, 2014, 48(2): 303-311.
[5] 王相兵,童水光,钟崴,张健. 基于可拓重用的液压挖掘机结构性能方案设计[J]. J4, 2013, 47(11): 1992-2002.
[6] 王进, 陆国栋, 张云龙. 基于数量化一类分析的IGA算法及应用[J]. J4, 2013, 47(10): 1697-1704.
[7] 刘羽, 王国瑾. 以已知曲线为渐进线的可展曲面束的设计[J]. J4, 2013, 47(7): 1246-1252.
[8] 胡根生,鲍文霞,梁栋,张为. 基于SVR和贝叶斯方法的全色与多光谱图像融合[J]. J4, 2013, 47(7): 1258-1266.
[9] 吴金亮, 黄海斌, 刘利刚. 保持纹理细节的无缝图像合成[J]. J4, 2013, 47(6): 951-956.
[10] 陈潇红,王维东. 基于时空联合滤波的高清视频降噪算法[J]. J4, 2013, 47(5): 853-859.
[11] 朱凡,李悦,蒋 凯,叶树明,郑筱祥. 基于偏最小二乘的大鼠初级运动皮层解码[J]. J4, 2013, 47(5): 901-905.
[12] 吴宁, 陈秋晓, 周玲, 万丽. 遥感影像矢量化图形的多层次优化方法[J]. J4, 2013, 47(4): 581-587.
[13] 计瑜,沈继忠,施锦河. 一种基于盲源分离的眼电伪迹自动去除方法[J]. J4, 2013, 47(3): 415-421.
[14] 王翔,丁勇. 基于Gabor滤波器的全参考图像质量评价方法[J]. J4, 2013, 47(3): 422-430.
[15] 童水光, 王相兵, 钟崴, 张健. 基于BP-HGA的起重机刚性支腿动态优化设计[J]. J4, 2013, 47(1): 122-130.