综述论文

基于位置隐私保护研究综述

  • 秦波 ,
  • 唐秋楠 ,
  • 王美琪
展开
  • 中国人民大学 信息学院,北京100872
秦波,女,博士,讲师,研究方向为信息安全.Email:bo.qin@ruc.edu.cn. 唐秋楠,女,本科生,研究方向为信息安全.Email:shirley3207@sina.com. 王美琪,女,本科生,研究方向为信息安全.Email:rucwmq@163.com.

收稿日期: 2015-07-09

  网络出版日期: 2015-10-08

基金资助

国家自然科学基金面上项目(61370190,61173154,61472429);中国人民大学中央高校基础科研基金(14XNLF02)

Review on location privacy protection research

  • QIN Bo ,
  • TANG Qiu-Nan ,
  • WANG Mei-Qi
Expand

Received date: 2015-07-09

  Online published: 2015-10-08

摘要

近年来,随着无线通信技术和定位技术的发展,与基于位置服务(LocationBased Services,LBS)有关的应用受到越来越多人的使用和重视.一方面LBS为人们的生活带来了很大的便利,而另一方面用户的隐私泄露风险也成为最大的安全威胁.用户的隐私主要包括用户时空位置隐私、有关时间序列的轨迹隐私和用户身份隐私.国内外研究学者针对该问题的基于不同的隐私保护技术系统结构提出了诸多解决方法,可分为假名技术、假位置技术和隐匿时空技术,分别保护了用户的身份信息隐私、位置隐私和轨迹隐私.本文对比现有的隐私保护技术,分析了LBS面临的挑战,归纳了现有的研究工作,并指出了未来的研究方向.

本文引用格式

秦波 , 唐秋楠 , 王美琪 . 基于位置隐私保护研究综述[J]. 华东师范大学学报(自然科学版), 2015 , 2015(5) : 14 -27 . DOI: 10.3969/j.issn.1000-5641.2015.05.002

Abstract

In recent years, with the development of wireless communication technology and mobile positioning technology, applications relating to locationbased services (LBS) are increasingly taken seriously and used widely. On the one hand, LBS brings people considerable convenience; on the other hand, it becomes a nonnegligible security threat that users’ privacy, mainly including location privacy, trajectory privacy and identity privacy, could be leaked out. Many solutions on the basis of different structures of privacy protection system have been proposed by researchers at home and abroad, which can be divided into pseudonym, faked locations and spatial and temporal cloaking, protecting users’ identity privacy, location privacy and trajectory privacy respectively. In this paper, we contrast the existing privacy protection technologies and analyze challenges LBS is facing. At the same time, we conclude the existing researches and give directions for future research.

参考文献

[1]〖ZK(#〗ILARRI S, MENA E, ILLARRAMENDI A. Locationdependent query processing: Where we are and where we are heading[J]. ACM Computing Surveys (CSUR), 2010, 42(3):12.

[2]PERUSCO L, MICHAEL K. Control, trust, privacy, and security: Evaluating locationbased services[J]. IEEE Technology and Society Magazine, 2007, 26(1): 416.

[3]SCHILLER J H, VOISARD A. LocationBased Services[M]. San Francisco: Morgan Kaufmann, 2004.

[4]VEIJALAINEN J, WESKE M. Modeling static aspects of mobile electronic commerce environments[M]//Advances in Mobile Commerce Technologies. \[s.l.\]: IGI Publishing, 2003: 137170.

[5]BARNES R, LEPINSKI M, COOPER A, et al. An architecture for location and location privacy in internet applications[R]. BCP 160, RFC 6280, 2011.

[6]KALNIS P, GHINITA G, MOURATIDIS K, et al. Preventing locationbased identity inference in anonymous spatial queries[J]. IEEE Transactions on Knowledge and Data Engineering, 2007, 19(12): 17191733.

[7]XIONG X, MOKBEL M F, AREF W G. Seacnn: Scalable processing of continuous knearest neighbor queries in spatiotemporal databases[C]//Proceedings of the 21st International Conference on Data Engineering. IEEE, 2005: 643654.

[8]DAMIANI M L, BERTINO E, SILVESTRI C. The PROBE framework for the personalized cloaking of private locations[J]. Transactions on Data Privacy, 2010, 3(2): 123148.

[9]GHINITA G, KALNIS P, SKIADOPOULOS S. Prive: Anonymous locationbased queries in distributed mobile systems[C]//Proceedings of the 16th International Conference on World Wide Web. ACM, 2007: 371380.

[10]CHE Y, CHIEW K, HONG X, et al. SALS: semanticsaware location sharing based on cloaking zone in mobile social networks[C]//Proceedings of the 1st ACM SIGSPATIAL International Workshop on Mobile Geographic Information Systems. ACM, 2012: 4956.

[11]NERGIZ M E, ATZORI M, SAYGIN Y, et al. Towards trajectory anonymization:A generalizationbased approach[J]. IEEE Transactions on Data Privacy, 2009, 2(1):4775.

[12]CHENG R, ZHANG Y, BERTINO E, et al. Preserving user location privacy in mobile data management infrastructures[M]//Privacy Enhancing Technologies. Berlin: Springer, 2006: 393412.

[13]GRUTESER M, GRUNWALD D. Anonymous usage of locationbased services through spatial and temporal cloaking[C]//Proceedings of the 1st International Conference on Mobile Systems, Applications and Services. ACM, 2003: 3142.

[14]XIAO Z, MENG X, XU J. Quality aware privacy protection for locationbased services[M]//Advances in Databases: Concepts, Systems and Applications. Berlin: Springer, 2007: 434446.

[15]HONG J I, LANDAY J A. An architecture for privacysensitive ubiquitous computing[C]//Processing of the 2nd International Conference on Mobile Systems, Applications, and Services. ACM, 2004, 177189.

[16]CHAUM D. Untraceable electronic mail, return addresses, and digital pseudonyms[J]. Communications of the ACM, 1981: 24(2):8490.

[17]BERESFORD A R, STAJANO F. Location privacy in pervasive computing[J]. IEEE Pervasive computing, 2003, 2(1): 4655.

[18]HEECHANG SHIN, ATLURI V, VAIDYA J. A profile anonymization model for privacy in a personalized locationbased service environment[C]// Proceedings of the 9th International Conference on Mobile Data Management. IEEE, 2008: 7380.

[19]SHIN K G, JU X, CHEN Z, et al. Privacy protection for users of locationbased services[J]. IEEE Wireless Communications, 2012, 19(1): 3039.

[20]DUCKHAM M, KULIK L. A formal model of obfuscation and negotiation for location privacy[M]//Pervasive Computing. Berlin: Springer, 2005: 152170.

[21]CHOW C Y, MOKBEL M F, LIU X. A peertopeer spatial cloaking algorithm for anonymous locationbased service[C]//Proceedings of the 14th Annual ACM International Symposium on Advances in Geographic Information Systems. ACM, 2006: 171178.

[22]BAMBA B, LIU L, PESTI P, et al. Supporting anonymous location queries in mobile environments with privacygrid[C]//Proceedings of the 17th International Conference on World Wide Web. ACM, 2008: 237246.

[23]MOKBEL M F, CHOW C Y, AREF W G. The new casper: Query processing for location services without compromising privacy[C]//Proceedings of the 32nd International Conference on Very Large Data Bases. ACM, 2006: 763774.

[24]CHOW C Y, MOKBEL M F, LIU X. Spatial cloaking for anonymous locationbased services in mobile peertopeer environments[J]. GeoInformatica, 2011, 15(2): 351380.

[25]霍峥, 孟小峰. 轨迹隐私保护技术研究[J]. 计算机学报, 2011(10):18201830.

[26]XU T, CAI Y. Exploring historical location data for anonymity preservation in locationbased services[C]//Proceedings of the 27th Conference on Computer Communications. IEEE, 2008: 547555.

[27]TERROVITIS M, MAMOULIS N. Privacy preserving in the publication of trajectories[C]//Proceedings of the 9th International Conference on Mobile Data Management. IEEE, 2008:6572.

[28]LU R, LIN X, LIANG X, et al. A dynamic privacypreserving key management scheme for locationbased services in vanets[J]. IEEE Transactions on Intelligent Transportation Systems, 2012, 13(1): 127139.

[29]FREUDIGER J, SHOKRI R, HUBAUX J P. Evaluating the privacy risk of locationbased services[M]//Financial Cryptography and Data Security. Berlin: Springer, 2012: 3146.

[30]朱辉, 李晖, 高丽娟, 等. 面向基于位置服务的用户隐私保护系统及方法: 中国,CN104219245A\[P\]. 20141217.

[31]PINGLEY A, YU W, ZHANG N, et al. Cap: A contextaware privacy protection system for locationbased services[C]//Proceedings of the 29th IEEE International Conference on Distributed Computing Systems. IEEE, 2009: 4957.

[32]魏琼, 卢炎生. 位置隐私保护技术研究进展[J]. 计算机科学, 2008(09):2125.

[33]EL DEFRAWY K, TSUDIK G. Privacypreserving locationbased ondemand routing in MANETs[J]. IEEE Journal on Selected Areas in Communications, 2011, 29(10): 19261934.

[34]HU H, LEE D L. Range nearestneighbor query[J]. IEEE Transactions on Knowledge and Data Engineering, 2006, 18(1): 7891.

[35]余荣芳. 位置服务隐私保护技术的研究与应用[D].南京:南京理工大学, 2013.

[36]王璐, 孟小峰. 位置大数据隐私保护研究综述[J]. 软件学报, 2014(04)693712.

[37]潘晓, 肖珍, 孟小峰. 位置隐私研究综述[J]. 计算机科学与探索, 2007(03)268281.

[38]郭艳华. 位置服务中轨迹隐私保护方法的研究[D].武汉:华中师范大学, 2011.

[39]谈嵘. 位置隐私保护及其在基于位置的社交网络服务中的应用研究[D].上海:华东师范大学, 2013.

[40]车延辙. 基于位置服务中用户位置隐私保护关键技术研究[D].杭州:浙江大学, 2013.

[41]屈浩. 基于轨迹隐私的匿名方法研究[D].成都:电子科技大学, 2013.

[42]张浩. 基于位置服务的信息隐私保护技术研究[D].合肥:中国科学技术大学, 2014.

[43]娄绿林. 基于位置服务(LBS)的隐私保护方案研究[D].昆明:昆明理工大学, 2013.

[44]郭晓丽. 基于位置服务的移动对象隐私保护技术研究[D].哈尔滨:哈尔滨工程大学, 2013.

[45]GHINITA G, KALNIS P, KHOSHGOZARAN A, et al. Private queries in locationbased services: Anonymizers are not necessary[C]//Proceedings of the 2008 ACM SIGMOD International Conference on Management of Data. ACM, 2008: 121132.

[46]CHENG R, ZHANG Y, BERTINO E, et al. Preserving user location privacy in mobile data management infrastructures[M]//Privacy Enhancing Technologies. Berlin: Springer, 2006: 393412.

[47]GEDIK B, LIU L. Location privacy in mobile systems: A personalized anonymization model[C]//Proceedings of the 25th IEEE International Conference on Distributed Computing Systems. IEEE, 2005: 620629.

[48]KIDO H, YANAGISAWA Y, SATOH T. An anonymous communication technique using dummies for locationbased services[C]//Proceedings of the International Conference on Pervasive Services. IEEE, 2005: 8897.

[49]KANG H E, MENG W U. Protecting location privacy with personalized Kanonymity[J]. Journal of Nanjing University of Posts and Telecommunications (Natural Science), 2012(6): 014.

[50]贾金营, 张凤荔. 位置隐私保护技术综述[J]. 计算机应用研究, 2013(03):641646.

[51]王家波. 基于位置服务的轨迹隐私保护技术研究[D].杭州:杭州电子科技大学, 2014.

[52]侯士江. 基于空间K匿名的位置隐私保护技术研究[D].秦皇岛:燕山大学, 2014.

[53]薛姣, 刘向宇, 杨晓春, 等. 一种面向公路网络的位置隐私保护方法[J]. 计算机学报, 2011(05): 865878.

[54]LUPER D, CAMERON D, MILLER J A, et al. Spatial and temporal target association through semantic analysis and GPS data mining[C]//Proceedings of the 2007 International Conference on Information and Knowledge Engineering. IKE, 2007:251257.

[55]许隽. 基于位置服务中个性化位置隐私保护模型与算法的研究[D].广州:华南理工大学, 2013.
 
文章导航

/