用户的移动设备中基于位置的服务会不断地向服务器发送用户当前的地理信息,通过地理位置查询出相应的结果并返回给用户.如何同时保证服务质量和地理信息不被泄露是一个重要的问题.为了保护用户的真实地点,提出一种基于虚假地点的方法,设备每次将发送多个地点给服务器来保护用户的真实地点.对于用户可能到达的地点,提出一种启发式算法划分需要发送的地点集合,并使用δ隐私来保证攻击者根据轨迹中的前后地点也无法获得更多有关敏感地点的信息.最后,在一个无线网接入数据上进行实验,实验结果表明在该数据集上平均需要发送5到6个地点.
Locationbased services in user’s mobile device can send geographical information queries to the server continuously, and receive corresponding results to the user. But simultaneously assure the quality of service and none leakage of geographical information is an important problem. This paper used a dummy location method to protect user’s real locations. The device sent multiple locations to the server. The paper also proposed a heuristic algorithm to partition location set and used δ privacy to prevent adversary infer sensitive information from contiguous locations. At last, an experiment on a WiFi access data set shows that five or six locations need to be sent averagely.
[1]DWORK C. Differential privacy VAN TILBORG H, JAJODIA S. Encyclopedia of Cryptography and Security. New York: Springer, 2011: 338340.
[2]XIAO Y H, LI X. Dynamic differential privacy for location based applications[EB/OL].[20150812].http://arxiv.org/abs/1410.5919.
[3]SWEENEY L. Achieving kanonymity privacy protection using generalization and suppression[J]. International Journal of Uncertainty, Fuzziness and KnowledgeBased Systems, 2002, 10(5): 571588.
[4]PAN X, XU J L, MENG X F. Protecting location privacy against locationdependent attacks in mobile services[J]. IEEE Transactions on Knowledge and Data Engineering, 2012, 24(8): 15061519.
[5]KIDO H, YANAGISAWA Y, SATOH T. An anonymous communication technique using dummies for locationbased services[C]Proceedings of International Conference on Pervasive Services. IEEE, 2005, 8897.
[6]GTZ M, NATH S, GEHRKE J. et al. Privately releasing user context streams for personalized mobile applications[C]Proceedings of the 2012 ACM SIGMOD International Conference on Management of Data. ACM, 2012: 289300.
[7]CHOW C Y, MOKBEL M F. Trajectory privacy in locationbased services and data publication[J]. ACM SIGKDD Explorations Newsletter, 2011, 13(1): 1929.
[8]GHINITA G, KALNIS P, KHOSHGOZARAN A, et al. Private queries in location based services: Anonymizers are not necessary[C]Proceedings of the 2008 ACM SIGMOD International Conference on Management of Data. ACM, 2008: 121132.
[9]SWEENEY L. kanonymity: A model for protecting privacy[J]. International Journal of Uncertainty, Fuzziness and KnowledgeBased Systems, 2002, 10(5): 557570.
[10]HARA T, ARASE Y, YAMAMOTO A, et al. Location anonymization using real car trace data for location based services[C]Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication. ACM, 2014: 34.