[1]史敏仪,李玲娟. 移动用户位置隐私保护方案研究[J].计算机技术与发展,2014,24(10):151-154.
 SHI Min-yi,LI Ling-juan. Study on Location Privacy Protection Scheme for Moving Objects[J].,2014,24(10):151-154.
点击复制

 移动用户位置隐私保护方案研究()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
24
期数:
2014年10期
页码:
151-154
栏目:
安全与防范
出版日期:
2014-10-10

文章信息/Info

Title:
 Study on Location Privacy Protection Scheme for Moving Objects
文章编号:
1673-629X(2014)10-0151-04
作者:
 史敏仪李玲娟
 南京邮电大学 计算机学院
Author(s):
 SHI Min-yiLI Ling-juan
关键词:
 位置隐私假数据法K-匿名脚印
Keywords:
 location privacyfalse data method K-anonymity footprint
分类号:
TP311
文献标志码:
A
摘要:
 随着基于位置的服务( LBS)的发展,如何保证用户在使用位置服务时的隐私安全,已成为一个亟待解决的问题。文中对主流的位置隐私保护技术进行了分析和比较。在此基础上,针对移动用户的位置隐私保护,提出了一种基于中心服务器的位置隐私保护方案。该方案针对隐私保护需求的差异性,考虑区域的敏感等级,对敏感区域采用K-匿名和假名进行保护,同时运用脚印来辅助匿名。该方案能在不降低位置服务质量的前提下,有效地保护移动用户位置隐私。
Abstract:
 With the rapid development of Location-Based Service ( LBS) ,how to ensure the users’ privacy security has become an ur-gent problem when they use LBS. In this paper,several primary location privacy protection technologies are analyzed and compared,and a central server-based location privacy protection scheme is proposed for protecting mobile user’s location privacy. This scheme consid-ers the sensitive level of area according to different privacy protection needs,uses K-anonymity and pseudonyms to protect location priva-cy in sensitive areas,and applies footprint to assist anonymity. This scheme can effectively protect location privacy of moving object with-out reducing the quality of service.

相似文献/References:

[1]杨洋 王汝传[].增强现实中的位置隐私保护[J].计算机技术与发展,2012,(09):232.
 YANG Yang,WANG Ru-chuan.Location Privacy Protection in Augmented Reality[J].,2012,(10):232.
[2]吴婷婷,李玲娟.面向 RFID 的位置隐私保护算法研究[J].计算机技术与发展,2013,(01):157.
 WU Ting-ting,LI Ling-juan.Study on RFID-oriented Location Privacy Protection Algorithm[J].,2013,(10):157.
[3]施佳琪,吴蒙.一种改进的源节点位置隐私保护方法[J].计算机技术与发展,2013,(11):141.
 SHI Jia-qi[],WU Meng[].An Improved Method of Source Node Location Privacy Protection[J].,2013,(10):141.
[4]张志宏,吴庆波,邵立松,等.基于飞腾平台TOE协议栈的设计与实现[J].计算机技术与发展,2014,24(07):1.
 ZHANG Zhi-hong,WU Qing-bo,SHAO Li-song,et al. Design and Implementation of TCP/IP Offload Engine Protocol Stack Based on FT Platform[J].,2014,24(10):1.
[5]梁文快,李毅. 改进的基因表达算法对航班优化排序问题研究[J].计算机技术与发展,2014,24(07):5.
 LIANG Wen-kuai,LI Yi. Research on Optimization of Flight Scheduling Problem Based on Improved Gene Expression Algorithm[J].,2014,24(10):5.
[6]黄静,王枫,谢志新,等. EAST文档管理系统的设计与实现[J].计算机技术与发展,2014,24(07):13.
 HUANG Jing,WANG Feng,XIE Zhi-xin,et al. Design and Implementation of EAST Document Management System[J].,2014,24(10):13.
[7]侯善江[],张代远[][][]. 基于样条权函数神经网络P2P流量识别方法[J].计算机技术与发展,2014,24(07):21.
 HOU Shan-jiang[],ZHANG Dai-yuan[][][]. P2P Traffic Identification Based on Spline Weight Function Neural Network[J].,2014,24(10):21.
[8]李璨,耿国华,李康,等. 一种基于三维模型的文物碎片线图生成方法[J].计算机技术与发展,2014,24(07):25.
 LI Can,GENG Guo-hua,LI Kang,et al. A Method of Obtaining Cultural Debris’ s Line Chart Based on Three-dimensional Model[J].,2014,24(10):25.
[9]翁鹤,皮德常. 混沌RBF神经网络异常检测算法[J].计算机技术与发展,2014,24(07):29.
 WENG He,PI De-chang. Chaotic RBF Neural Network Anomaly Detection Algorithm[J].,2014,24(10):29.
[10]刘茜[],荆晓远[],李文倩[],等. 基于流形学习的正交稀疏保留投影[J].计算机技术与发展,2014,24(07):34.
 LIU Qian[],JING Xiao-yuan[,LI Wen-qian[],et al. Orthogonal Sparsity Preserving Projections Based on Manifold Learning[J].,2014,24(10):34.
[11]汪玉美,崔逊学,吴海兵,等. 基于多跳LEACH防御流量分析攻击算法研究[J].计算机技术与发展,2014,24(09):154.
 WANG Yu-mei,CUI Xun-xue,WU Hai-bing,et al. Research on Defense Traffic Analysis Attacks Algorithm Based on Multi-hop LEACH[J].,2014,24(10):154.

更新日期/Last Update: 2015-04-02