[1]周红亚,张倩. 基于非可信用户的P2P加密位置隐私保护[J].计算机技术与发展,2016,26(05):104-109.
 ZHOU Hong-ya,ZHANG Qian. Location Privacy Preservation in Mobile P2P Encryption Based on Non-trusted Users[J].,2016,26(05):104-109.
点击复制

 基于非可信用户的P2P加密位置隐私保护()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
26
期数:
2016年05期
页码:
104-109
栏目:
安全与防范
出版日期:
2016-05-10

文章信息/Info

Title:
 Location Privacy Preservation in Mobile P2P Encryption Based on Non-trusted Users
文章编号:
1673-629X(2016)05-0104-06
作者:
 周红亚张倩
 南京邮电大学 计算机学院
Author(s):
 ZHOU Hong-yaZHANG Qian
关键词:
 位置请求服务器隐私保护用户协作加密
Keywords:
 LBSprivacy protectionuser collaborationencryption
分类号:
TP31
文献标志码:
A
摘要:
 近年来,随着移动互联网及智能移动设备的飞速发展,位置服务给人们的生活带来了极大的便利,但是,用户的位置隐私也受到了极大的威胁.文中从LBS位置隐私保护的实际应用出发,根据现有的位置隐私保护模型,分析不同LBS隐私保护的系统结构的优缺点,介绍了在移动分布式P2 P结构的构造方法,提出了基于非可信用户的P2 P加密位置隐私保护方案.该方案建立在所有角色都不可信的基础上,通过使用将位置隐私和用户隐私分开处理的方式及采用加密的方法来保护用户的隐私.该方案能提供精确地理位置服务,获得精确查询结果的同时还能抵御各种恶意角色攻击,包括恶意邻居节点、恶意LBS服务器、两者的合谋攻击以及连续查询攻击和区域密度攻击,有效地保护了用户的隐私信息.
Abstract:
 In recent years,with the rapid development of mobile Internet and portable devices,location services has brought great conven-ience to people’ s lives,but user privacy has also been a lot of threats. Based on the practical application of LBS location privacy protec-tion,according to the existing location privacy protection model,it analyzes the pros and cons of the system structure of different LBS pri-vacy in this paper,and briefly describes mobile construction method of distributed P2P architecture,then an encrypted location scheme of privacy protection for P2P based on non-trusted user has been put forward. The scheme builds on all the roles are not credible,through location on privacy and privacy of users be handled separately,and uses encryption method to protect users’ privacy. The program not on-ly can provide a precise location for precise query results but also safeguard against different kinds of malicious attacks,including mali-cious neighbor nodes,malicious LBS servers,the two conspired to attack,continuous queries and regional density attack,which protect privacy of the user’ s information effectively.

相似文献/References:

[1]张志宏,吴庆波,邵立松,等.基于飞腾平台TOE协议栈的设计与实现[J].计算机技术与发展,2014,24(07):1.
 ZHANG Zhi-hong,WU Qing-bo,SHAO Li-song,et al. Design and Implementation of TCP/IP Offload Engine Protocol Stack Based on FT Platform[J].,2014,24(05):1.
[2]梁文快,李毅. 改进的基因表达算法对航班优化排序问题研究[J].计算机技术与发展,2014,24(07):5.
 LIANG Wen-kuai,LI Yi. Research on Optimization of Flight Scheduling Problem Based on Improved Gene Expression Algorithm[J].,2014,24(05):5.
[3]黄静,王枫,谢志新,等. EAST文档管理系统的设计与实现[J].计算机技术与发展,2014,24(07):13.
 HUANG Jing,WANG Feng,XIE Zhi-xin,et al. Design and Implementation of EAST Document Management System[J].,2014,24(05):13.
[4]侯善江[],张代远[][][]. 基于样条权函数神经网络P2P流量识别方法[J].计算机技术与发展,2014,24(07):21.
 HOU Shan-jiang[],ZHANG Dai-yuan[][][]. P2P Traffic Identification Based on Spline Weight Function Neural Network[J].,2014,24(05):21.
[5]李璨,耿国华,李康,等. 一种基于三维模型的文物碎片线图生成方法[J].计算机技术与发展,2014,24(07):25.
 LI Can,GENG Guo-hua,LI Kang,et al. A Method of Obtaining Cultural Debris’ s Line Chart Based on Three-dimensional Model[J].,2014,24(05):25.
[6]翁鹤,皮德常. 混沌RBF神经网络异常检测算法[J].计算机技术与发展,2014,24(07):29.
 WENG He,PI De-chang. Chaotic RBF Neural Network Anomaly Detection Algorithm[J].,2014,24(05):29.
[7]刘茜[],荆晓远[],李文倩[],等. 基于流形学习的正交稀疏保留投影[J].计算机技术与发展,2014,24(07):34.
 LIU Qian[],JING Xiao-yuan[,LI Wen-qian[],et al. Orthogonal Sparsity Preserving Projections Based on Manifold Learning[J].,2014,24(05):34.
[8]尚福华,李想,巩淼. 基于模糊框架-产生式知识表示及推理研究[J].计算机技术与发展,2014,24(07):38.
 SHANG Fu-hua,LI Xiang,GONG Miao. Research on Knowledge Representation and Inference Based on Fuzzy Framework-production[J].,2014,24(05):38.
[9]叶偲,李良福,肖樟树. 一种去除运动目标重影的图像镶嵌方法研究[J].计算机技术与发展,2014,24(07):43.
 YE Si,LI Liang-fu,XIAO Zhang-shu. Research of an Image Mosaic Method for Removing Ghost of Moving Targets[J].,2014,24(05):43.
[10]余松平[][],蔡志平[],吴建进[],等. GSM-R信令监测选择录音系统设计与实现[J].计算机技术与发展,2014,24(07):47.
 YU Song-ping[][],CAI Zhi-ping[] WU Jian-jin[],GU Feng-zhi[]. Design and Implementation of an Optional Voice Recording System Based on GSM-R Signaling Monitoring[J].,2014,24(05):47.

更新日期/Last Update: 2016-09-19