Please wait a minute...
浙江大学学报(工学版)  2020, Vol. 54 Issue (12): 2437-2444    DOI: 10.3785/j.issn.1008-973X.2020.12.019
计算机与控制工程     
面向连续位置服务的位置感知隐私保护方案
郑磊(),张俊星*()
内蒙古大学 计算机学院,内蒙古 呼和浩特 010021
Location-aware privacy protection scheme in continuous location-based service
Lei ZHENG(),Jun-xing ZHANG*()
College of Computer Science, Inner Mongolia University, Hohhot 010021, China
 全文: PDF(883 KB)   HTML
摘要:

为了增强在位置服务(LBS)中对用户个人隐私的保护,提出基于本地缓存的位置感知匿名选择算法(LaSA). 利用历史轨迹信息和缓存信息,以不依赖可信第三方(TTP)服务器的方式构建匿名区域. 在连续位置服务查询中,利用马尔可夫预测模型对未来可能查询的位置进行预判. 根据预测位置、缓存贡献度和数据新鲜度构建匿名区域,以覆盖用户所查真实区域. 结果表明,与已有方案相比,所提出的LaSA隐私保护方案能提供更高的缓存命中率,减少用户服务请求次数,保证用户位置数据的安全.

关键词: 位置服务(LBS)位置隐私缓存策略路径感知马尔可夫模型    
Abstract:

A location-aware anonymous selection algorithm (LaSA) based on local cache was proposed in order to enhance the protection of users′ privacy in location-based service (LBS). Anonymous zones were constructed without relying on the trusted third-party (TTP) server, using historical track information and cache information. The Markov prediction model was used to select the possible query location in the future continuous location service query. The anonymous region was constructed to cover the region inspected by user based on predicted location, cache contribution, and data freshness. Results show that the proposed LaSA solution can provide a higher cache hit rate reduce the number of user service requests, and ensure the security of user′s location data with comparison with the existing schemes.

Key words: location-based service (LBS)    location privacy    caching-based solution    trajectory sensing    Markov model
收稿日期: 2019-12-16 出版日期: 2020-12-31
CLC:  TN 918.9  
基金资助: 国家自然科学基金资助项目(61261019);内蒙古自治区科技计划资助项目(201802027);内蒙古自治区自然科学基金资助项目(2018MS06023)
通讯作者: 张俊星     E-mail: zhenglei@mail.imu.edu.cn;junxing@imu.edu.cn
作者简介: 郑磊(1987—),男,硕士生,从事移动网络研究. orcid.org/0000-0002-1119-0618. E-mail: zhenglei@mail.imu.edu.cn
服务  
把本文推荐给朋友
加入引用管理器
E-mail Alert
作者相关文章  
郑磊
张俊星

引用本文:

郑磊,张俊星. 面向连续位置服务的位置感知隐私保护方案[J]. 浙江大学学报(工学版), 2020, 54(12): 2437-2444.

Lei ZHENG,Jun-xing ZHANG. Location-aware privacy protection scheme in continuous location-based service. Journal of ZheJiang University (Engineering Science), 2020, 54(12): 2437-2444.

链接本文:

http://www.zjujournals.com/eng/CN/10.3785/j.issn.1008-973X.2020.12.019        http://www.zjujournals.com/eng/CN/Y2020/V54/I12/2437

图 1  LaSA方案架构
图 2  LaSA方案中的隐私保护策略
参数 取值
Nt 12 024
x1y1)/ km (0,0)
x2y2)/ km (30,26)
Re/网格 2
k 3~20
τ 0.1~1.0
ε 0~0.5
表 1  实验参数
图 3  匿名度对隐私保护方案的影响
图 4  预测度和覆盖度对缓存命中率的影响
1 LUO E, BHUIYAN M Z A, WANG G, et al Privacy protector: privacy-protected patient data collection in IoT-based healthcare systems[J]. IEEE Communications Magazine, 2018, 56 (2): 163- 168
doi: 10.1109/MCOM.2018.1700364
2 LIU Q, WANG G, LI F, et al Preserving privacy with probabilistic indistinguishability in weighted social networks[J]. IEEE Transactions on Parallel and Distributed Systems, 2017, 28 (5): 1417- 1429
doi: 10.1109/TPDS.2016.2615020
3 LI L, LU R, HUANG C EPLQ: efficient privacy-preserving location-based query over outsourced encrypted data[J]. IEEE Internet of Things Journal, 2016, 3 (2): 206- 218
doi: 10.1109/JIOT.2015.2469605
4 AMAGATA D, HARA T A general framework for MaxRS and MaxCRS monitoring in spatial data streams[J]. ACM Transactions on Spatial Algorithms and Systems, 2017, 3 (1): 1- 34
5 JUNGGAB S, DONGHYUN K, ALAM B M Z, et al Privacy enhanced location sharing for mobile online social networks[J]. IEEE Transactions on Sustainable Computing, 2018, 5 (2): 279- 290
6 NIU B, GAO S, LI F, et al. Protection of location privacy in continuous LBSs against adversaries with background information [C]// ICNC. Kauai: IEEE, 2016: 1-6.
7 LIU H, LI X, LI H, et al. Spatiotemporal correlation-aware dummy-based privacy protection scheme for location-based services [C]// INFOCOM. Atlanta: IEEE, 2017: 1-9.
8 SCHLEGEL R, CHOW C Y, HUANG Q, et al User-defined privacy grid system for continuous location-based services[J]. IEEE Transactions on Mobile Computing, 2015, 14 (10): 2158- 2172
9 ZHU X, CHI H, NIU B, et al. MobiCache: when k-anonymity meets cache [C]// Globecom. Atlanta: IEEE, 2013: 820-825.
10 REZA S, GEORGE T, PANOS P Hiding in the mobile crowd: locationprivacy through collaboration[J]. IEEE Transactions on Dependable and Secure Computing, 2014, 11 (3): 266- 279
doi: 10.1109/TDSC.2013.57
11 ZHANG S, LIU Q, WANG G. A caching-based privacy-preserving scheme for continuous location-based services [C]//SpaCCS. Zhangjiajie: Springer, 2016: 73-82.
12 PINGLEY A, ZHANG N, FU X, et al. Protection of query privacy for continuous location based services [C]// INFOCOM. Shanghai: IEEE, 2011: 1710-1718.
13 LIAO D, SUN G, LI H, et al The framework and algorithm for preserving user trajectory while using location-based services in IoT-cloud systems[J]. Cluster Computing, 2017, 20 (2): 1- 15
14 WANG X, PANDE A, ZHU J, et al STAMP: enabling privacy-preserving location proofs for mobile users[J]. IEEE/ACM Transactions on Networking, 2016, 24 (6): 3276- 3289
doi: 10.1109/TNET.2016.2515119
15 胡德敏, 郑霞 基于Space Twist的k-匿名增量近邻查询位置隐私保护算法[J]. 计算机应用研究, 2016, (8): 2402- 2404
HU De-min, ZHENG Xia Space twist-based k-anonymity incremental nearest neighbor query algorithm for location privacy protection[J]. Application Research of Computers, 2016, (8): 2402- 2404
doi: 10.3969/j.issn.1001-3695.2016.08.035
16 HWANG R H, HSUEH Y L, WU J J, et al SocialHide: a generic distributed framework for location privacy protection[J]. Journal of Network and Computer Applications, 2016, 76 (9): 87- 100
17 NIU B, ZHU X, LI W, et al. EPcloak: an efficient and privacy-preserving spatial cloaking scheme for LBSs [C]// IEEE International Conference on Mobile Ad Hoc and Sensor Systems. Philadelphia: IEEE, 2014: 398-406.
18 ZHANG S, WANG G, LIU Q, et al. A trajectory privacy-preserving scheme based on dual-K mechanism for continuous location-based services [C]// IEEE ISPA / IUCC. Guangzhou: IEEE, 2017: 406-419.
19 SHUHEI H, DAICHI A, TAKAHIRO H, et al Dummy generation based on user-movement estimation for location privacy protection[J]. IEEE Access, 2018, 6: 22958- 22969
doi: 10.1109/ACCESS.2018.2829898
20 GONG X, CHEN X, XING K, et al. Personalized location privacy in mobile networks: a social group utility approach [C]// INFOCOM. Hong Kong: IEEE, 2015: 1008-1016.
21 NATESAN G, LIU J. An adaptive learning model for k-anonymity location privacy protection [C]// COMPSAC. Taichung: IEEE, 2015: 10-16.
22 HWANG R H, HSUEH Y L, CHUNG H W A novel time-obfuscated algorithm for trajectory privacy protection[J]. IEEE Transactions on Services Computing, 2014, 7 (2): 126- 139
doi: 10.1109/TSC.2013.55
23 ZHANG S, WANG G, LIU Q, et al A trajectory privacy-preserving scheme based on query exchange in mobile social networks[J]. Soft Computing, 2017, 22 (18): 6121- 6133
24 JUNG K, JO S, SEOG P. A game theoretic approach for collaborative caching techniques in privacy preserving location-based services [C]// BIGCOMP. Jeju: IEEE, 2015: 59–62.
25 PENG T, LIU Q, MENG D, et al Collaborative trajectory privacy preserving scheme in location-based services[J]. Information Sciences, 2017, 387: 165- 179
doi: 10.1016/j.ins.2016.08.010
26 ZHANG S, CHOO K K R, LIU Q, et al Enhancing privacy through uniform grid and caching in location-based services[J]. Future Generation Computer Systems, 2017, 86 (9): 881- 892
27 NIU B, LI Q, ZHU X, et al. Enhancing privacy through caching in location-based services [C]// INFOCOM. Hong Kong: IEEE, 2015: 1017-1025.
28 李璐璐, 华佳烽, 万盛, 等 基于高效信息缓存的位置隐私保护方案[J]. 通信学报, 2017, 38 (6): 148- 157
LI Lu-lu, HUA Jia-feng, WAN Sheng, et al Achieving efficient location privacy protection based on cache[J]. Journal on Communications, 2017, 38 (6): 148- 157
[1] 陈太波,张翠芳. 后验概率图与补白模型二次融合的关键词识别[J]. 浙江大学学报(工学版), 2020, 54(6): 1170-1176.
[2] 任午令, 赵翠文, 姜国新, David Maimon, Theodore Wilson, Bertrand Sobesto. 基于攻击行为预测的网络防御策略[J]. 浙江大学学报(工学版), 2014, 48(12): 2144-2151.
[3] 徐建, 黄孝喜, 郭鸣, 金正平, 郑宁. 动态P2P网络中基于匿名链的位置隐私保护[J]. J4, 2012, 46(4): 712-718.
[4] 徐建,徐明,林欣,郑宁. 路网限制环境中基于匿名蜂窝的位置隐私保护[J]. J4, 2011, 45(3): 429-434.
[5] 周佳庆, 吴羽, 江锦华, 陈刚,董轶. 实时垂直搜索引擎对象缓存优化策略[J]. J4, 2011, 45(1): 14-19.
[6] 周韶园 王树青 张建明. PCA-CHMM在化工过程故障诊断中的应用[J]. J4, 2005, 39(10): 1475-1480.