Please wait a minute...
J4  2011, Vol. 45 Issue (3): 429-434    DOI: 10.3785/j.issn.1008-973X.2011.03.005
无线电电子学、计算机技术     
路网限制环境中基于匿名蜂窝的位置隐私保护
徐建1,徐明1,林欣2,郑宁1
1.杭州电子科技大学 计算机学院,浙江 杭州310018;2.华东师范大学 信息科学技术学院,上海 200241
Location privacy protection through anonymous cells in road network
XU Jian1,XU Ming1,LIN Xin2,ZHENG Ning1
1.College of Computer, Hangzhou Dianzi University, Hangzhou 310018, China;
2.School of Information Science and Technology, East China Normal University, Shanghai 200241, China
 全文: PDF  HTML
摘要:

为了解决路网限制上下文环境的位置隐私保护问题,提出一个基于匿名蜂窝的位置隐私保护算法.根据路网环境特殊的点、线网络结构,事先将道路网络处理成由道路交叉点为圆心的圆形基本匿名区域——匿名蜂窝组成的网络.使用Hilbert曲线对匿名蜂窝进行空间编码,在算法中使用B+树对其进行索引.讨论了基于匿名蜂窝对用户查询进行匿名处理的2种成组方法:相邻结点优先成组和相邻路径结点优先成组,并对它们进行分析比较.在具体描述该算法的同时,进行了理论分析.通过实验验证了算法的可行性.实验结果表明:基于匿名蜂窝的相邻路径结点优先成组方法能够较好的增强算法应对推理攻击的鲁棒性.

Abstract:

To solve the problem of location privacy protection under restricted context in road network, this work developed and demonstrated a privacy protection algorithm. According to the characteristics of points and lines structure in the road network, the network is divided into anonymous cells with each road intersection as the center in advance. Cells are coded with Hilbert curve and indexed by a B+ tree. Two cellular-based methods for query anonymous processing nearest neighbor first and nearest road first were introduced. Then the two methods were analyzed and compared. Data from a real city map simulation show the effectiveness of the algorithm. The results prove that the nearest road first cloaking method can achieve more location privacy without loss of efficiency than the other, therefore improve the robustness against inference attacks.

出版日期: 2012-03-16
:  TP 391  
基金资助:

国家自然科学基金资助项目(61003195,60903169); 浙江省自然科学基金资助项目(Y106427).

作者简介: 徐建(1975-),男,浙江缙云人,副教授,从事分布式计算机系统的研究.E-mail:jian.xu@hdu.edu.cn
服务  
把本文推荐给朋友
加入引用管理器
E-mail Alert
RSS
作者相关文章  

引用本文:

徐建,徐明,林欣,郑宁. 路网限制环境中基于匿名蜂窝的位置隐私保护[J]. J4, 2011, 45(3): 429-434.

XU Jian,XU Ming,LIN Xin,ZHENG Ning. Location privacy protection through anonymous cells in road network. J4, 2011, 45(3): 429-434.

链接本文:

http://www.zjujournals.com/eng/CN/10.3785/j.issn.1008-973X.2011.03.005        http://www.zjujournals.com/eng/CN/Y2011/V45/I3/429

[1] KARIM W. Privacy implications of personal locators: why you should think twice before voluntarily availing yourself to GPS monitoring[J]. Journal of Law & Policy, 2004, 14: 485-515.
[2] BARKHUUS L, DEY A. Locationbased services for mobile telephony: a study of userss privacy concerns[C]∥Proceedings of Interact.Zurich:IOS, 2003:709-712.
[3] SWEENEY L. Kanonymity: a model for protecting privacy[J]. Journal on Uncertainty, Fuzziness and Knowledge based Systems, 2002, 10(5): 557-570.
[4] GRUTESER M, GRUNWALD D. Anonymous usage of location based services through spatial and temporal cloaking[C]∥Proceedings of Mobile Systems, Applications and Services. San Francisco: ACM, 2003:31-42 .
[5] KIDO, YANAGISAWA H. A anonymous communication technique using dummies for locationbased services[C] ∥Proceedings of ICPS. Santorini: IEEE, 2005:88-97.
[6] GHINITA G, KALNIS P, SKIADOPOULOS S. PRIVE: anonymous locationbased queries in distributed mobile systems[C]∥Proceedings of World Wide Web. Banff: ACM, 2007:371-380.
[7] MOHAMED M, CHOW ChiYin, WALID A. The new Casper: query processing for location services without compromising privacy[C]∥Proceedings of Very Large Data Bases. Korea: VLDB, 2006:763-774.
[8] BAMBA B, LIU L, PESTI P. Supporting anonymous location queries in mobile environments with privacy grid[C]∥ Proceedings of World Wide Web. Beijing:IEEE, 2008: 237-246.
[9] GEDIK B, LIU L. Protecting location privacy with personalized kanonymity: architecture and algorithms[J]. IEEE Transactions on Mobile Computing, 2008, 7(1):1-17.
[10] XU J, TANG X, HU H, et a1. Privacyconscious locationbased queries in mobile environments[J]. IEEE Transactions on Parallel and Distributed Systems, 2010, 21(3):313-326.
[11] KYRIAKOS M, YIU ManLung. Anonymous query processing in road networks[J]. IEEE Transactions on Knowledge and Data Engineering, 2010, 22(1):2-15.
[12] MOON B, JAGADISH H V, FALLOUTSOS C, et a1. Analysis of the clustering properties of the Hilbert spacefilling curve [J]. IEEE Transaction on Knowledge and Data Engineering, 2001, 13(1):124-141.
[13] THOMAS B. Generating networkbased moving objects[C] ∥Proceedings of International Conference on Scientific and Statistical Database Management. Berlin: IEEE, 2000:253-256.

[1] 赵建军,王毅,杨利斌. 基于时间序列预测的威胁估计方法[J]. J4, 2014, 48(3): 398-403.
[2] 张天煜, 冯华君, 徐之海, 李奇, 陈跃庭. 基于强边缘宽度直方图的图像清晰度指标[J]. J4, 2014, 48(2): 312-320.
[3] 刘中, 陈伟海, 吴星明, 邹宇华, 王建华. 基于双目视觉的显著性区域检测[J]. J4, 2014, 48(2): 354-359.
[4] 崔光茫, 赵巨峰, 冯华君, 徐之海, 李奇, 陈跃庭. 非均匀介质退化图像快速仿真模型的建立[J]. J4, 2014, 48(2): 303-311.
[5] 王相兵,童水光,钟崴,张健. 基于可拓重用的液压挖掘机结构性能方案设计[J]. J4, 2013, 47(11): 1992-2002.
[6] 王进, 陆国栋, 张云龙. 基于数量化一类分析的IGA算法及应用[J]. J4, 2013, 47(10): 1697-1704.
[7] 胡根生,鲍文霞,梁栋,张为. 基于SVR和贝叶斯方法的全色与多光谱图像融合[J]. J4, 2013, 47(7): 1258-1266.
[8] 刘羽, 王国瑾. 以已知曲线为渐进线的可展曲面束的设计[J]. J4, 2013, 47(7): 1246-1252.
[9] 吴金亮, 黄海斌, 刘利刚. 保持纹理细节的无缝图像合成[J]. J4, 2013, 47(6): 951-956.
[10] 陈潇红,王维东. 基于时空联合滤波的高清视频降噪算法[J]. J4, 2013, 47(5): 853-859.
[11] 朱凡,李悦,蒋 凯,叶树明,郑筱祥. 基于偏最小二乘的大鼠初级运动皮层解码[J]. J4, 2013, 47(5): 901-905.
[12] 吴宁, 陈秋晓, 周玲, 万丽. 遥感影像矢量化图形的多层次优化方法[J]. J4, 2013, 47(4): 581-587.
[13] 计瑜,沈继忠,施锦河. 一种基于盲源分离的眼电伪迹自动去除方法[J]. J4, 2013, 47(3): 415-421.
[14] 王翔,丁勇. 基于Gabor滤波器的全参考图像质量评价方法[J]. J4, 2013, 47(3): 422-430.
[15] 童水光, 王相兵, 钟崴, 张健. 基于BP-HGA的起重机刚性支腿动态优化设计[J]. J4, 2013, 47(1): 122-130.