隐私保护技术

基于位置服务中针对动态轨迹的匿名化

  • 魏燊 ,
  • 孙广中 ,
  • 谢幸
展开
  • 1. 中国科学技术大学 计算机科学与技术学院,合肥230027; 2. 微软亚洲研究院,北京100080
魏燊,男,硕士研究生,研究方向为数据安全与隐私. E-mail: weishen0@mail.ustc.edu.cn. 

收稿日期: 2015-09-11

  网络出版日期: 2015-10-08

Dynamic trajectory anonymization in location based services

  • WEI Shen ,
  • SUN Guang-Zhong ,
  • XIE Xing
Expand

Received date: 2015-09-11

  Online published: 2015-10-08

摘要

用户的移动设备中基于位置的服务会不断地向服务器发送用户当前的地理信息,通过地理位置查询出相应的结果并返回给用户.如何同时保证服务质量和地理信息不被泄露是一个重要的问题.为了保护用户的真实地点,提出一种基于虚假地点的方法,设备每次将发送多个地点给服务器来保护用户的真实地点.对于用户可能到达的地点,提出一种启发式算法划分需要发送的地点集合,并使用δ隐私来保证攻击者根据轨迹中的前后地点也无法获得更多有关敏感地点的信息.最后,在一个无线网接入数据上进行实验,实验结果表明在该数据集上平均需要发送5到6个地点.

本文引用格式

魏燊 , 孙广中 , 谢幸 . 基于位置服务中针对动态轨迹的匿名化[J]. 华东师范大学学报(自然科学版), 2015 , 2015(5) : 104 -115 . DOI: 10.3969/j.issn.1000-5641.2015.05.009

Abstract

Locationbased services in user’s mobile device can send geographical information queries to the server continuously, and receive corresponding results to the user. But simultaneously assure the quality of service and none leakage of geographical information is an important problem. This paper used a dummy location method to protect user’s real locations. The device sent multiple locations to the server. The paper also proposed a heuristic algorithm to partition location set and used δ privacy to prevent adversary infer sensitive information from contiguous locations. At last, an experiment on a WiFi access data set shows that five or six locations need to be sent averagely. 

参考文献

[1]DWORK C. Differential privacy VAN TILBORG H, JAJODIA S. Encyclopedia of Cryptography and Security. New York: Springer, 2011: 338340.

[2]XIAO Y H, LI X. Dynamic differential privacy for location based applications[EB/OL].[20150812].http://arxiv.org/abs/1410.5919.

[3]SWEENEY L. Achieving kanonymity privacy protection using generalization and suppression[J]. International Journal of Uncertainty, Fuzziness and KnowledgeBased Systems,  2002, 10(5): 571588.

[4]PAN X, XU J L, MENG X F. Protecting location privacy against locationdependent attacks in mobile services[J]. IEEE Transactions on Knowledge and Data Engineering, 2012, 24(8): 15061519.

[5]KIDO H, YANAGISAWA Y, SATOH T. An anonymous communication technique using dummies for locationbased services[C]Proceedings of International Conference on Pervasive Services. IEEE, 2005, 8897.

[6]GTZ M, NATH S, GEHRKE J. et al. Privately releasing user context streams for personalized mobile applications[C]Proceedings of the 2012 ACM SIGMOD International Conference on Management of Data. ACM, 2012: 289300.

[7]CHOW C Y, MOKBEL M F. Trajectory privacy in locationbased services and data publication[J]. ACM SIGKDD Explorations Newsletter, 2011, 13(1): 1929.

[8]GHINITA G, KALNIS P, KHOSHGOZARAN A, et al. Private queries in location based services: Anonymizers are not necessary[C]Proceedings of the 2008 ACM SIGMOD International Conference on Management of Data. ACM, 2008: 121132.

[9]SWEENEY L. kanonymity: A model for protecting privacy[J]. International Journal of Uncertainty, Fuzziness and KnowledgeBased Systems, 2002, 10(5): 557570.

[10]HARA T, ARASE Y, YAMAMOTO A, et al. Location anonymization using real car trace data for location based services[C]Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication. ACM, 2014: 34.
文章导航

/