With the broad range of application of location detected device such as mobile phone, GPS and RFID etc, the researchers have paid more and more attention to the locationbased services (LBS). Though LBS brings convenience to us, it also rises up the risk of location privacy leakages. The existing LBS systems transform the users’ locaiton into a rectangle or circle cloaking region by location generalization. Then, the users’ location can be hidden in the cloaking region to achieve the purpose of protecting the users’ locaiton privacy. However, in practical applications, the cloaking region may be related to the actual landform for the users’ location, it may not be a rectangle or circle region. In fact, a rectangle or circle region even may result in the increase of invalid region and reduce the location information accuracy. In this paper, based on the shortcoming of existing systems, we design and implement a new system in which the user can define the polygonal cloaking region based on actual landform. At the meantime, the system can provide a double protection for the users’ location privacy. The system performance tests show the effectiveness of the propsed system.
CAO Wu
,
XU Lv
,
LIU Yu-Bao
,
YIN Jian
. The LBS system based on polygonal cloaking region[J]. Journal of East China Normal University(Natural Science), 2015
, 2015(5)
: 143
-153
.
DOI: 10.3969/j.issn.1000-5641.2015.05.012
[1]周傲英, 杨彬, 金澈清, 马强. 基于位置的服务:架构与进展[J]. 计算机学报, 2011, 34(7): 11551171.
[2]薛姣, 刘向宇, 杨晓春, 等. 一种面向公路网络的位置隐私保护方法[J]. 计算机学报, 2011, 34(5): 865878。
[3]黄毅, 霍峥, 孟小峰. CoPrivacy:一种用户协作无匿名区域的位置隐私保护方法[J]. 计算机学报,2011,34(10): 19771985。
[4]潘晓, 郝兴, 孟小峰. 基于位置服务中的连续查询隐私保护研究[J]. 计算机研究与发展, 2011, 47(1): 121129.
[5]MOKBEL M F, CHOW C, AREF W G. The new casper: Query processing for location services without compromising privacy[C]//Proceedings of the 32nd Internationl Conference on Very Large Date Bases. ACM, 2006: 763774.
[6]CHOW C Y, MOKBEL M F, HE T. Tinycasper: A privacypreserving aggregate location monitoring system in wireless sensor networks[C]//Proceedings of the 2008 ACM SIGMOD Internationl Conference on Management of Date. ACM, 2008: 13071310.
[7]GHINITA G, KALNIS P, SKIADOPOULOS S. PRIVE: Anonymous locationbased queries in distributed moblile systems\[C\]//Proceedings of the 16th International Conference on World Wide Web. ACM, 2007: 371380.
[8]张鹏, 童云海, 唐世渭, 等. 一种有效的隐私保护关联规则挖掘方法[J]. 软件学报, 2006, 17(08): 11641774.
[9]GAO J, YU J X, JIN R M, et al. Neighborhoodprivacy protected shortest distance computing in cloud[C]//Proceedings of the 2011 ACM SIGMOD Internationl Conference on Management of Date. ACM, 2011: 409420.
[10]王璐, 孟小峰. 位置大数据隐私保护研究综述[J]. 软件学报, 2014, 25(4): 693712.
[11] LIU Y, CHEN X, LI Z, et al. An efficient method for privacy preserving location queries[J]. Frontiers of Computer Science, 2012, 6(4): 409420.
[12] 陈修伟. 基于多边形隐匿区域的定位服务研究[D]. 广州:中山大学,2010.