网络与信息安全学报 ›› 2016, Vol. 2 ›› Issue (12): 1-11.doi: 10.11959/j.issn.2096-109x.2016.00088
• 综述 • 下一篇
马明杰1,杜跃进1,2,李凤华1,刘佳文3
修回日期:
2016-11-06
出版日期:
2016-12-01
发布日期:
2016-12-28
作者简介:
马明杰(1987-),女,山东莱芜人,中国科学院信息工程研究所博士生,主要研究方向为信息安全、隐私保护。|杜跃进(1972-),男,宁夏银川人,博士,阿里巴巴集团安全部技术副总裁,中国科学院信息工程研究所客座教授、博士生导师,主要研究方向为版权与数据资产保护、安全态势感知技术。|李凤华(1966-),男,湖北浠水人,博士,中国科学院信息工程研究所副总工、研究员、博士生导师,主要研究方向为网络与系统安全、信息保护、隐私计算。|刘佳文(1995-),女,陕西咸阳人,中央财经大学本科生,主要研究方向为网络安全、隐私保护。
基金资助:
Ming-jie MA1,Yue-jin DU1,2,Feng-hua LI1,IUJia-wen L3
Revised:
2016-11-06
Online:
2016-12-01
Published:
2016-12-28
Supported by:
摘要:
位置服务发展引起的隐私泄露问题已不容忽视。基于语义的位置隐私保护是位置隐私保护工作中的重要组成部分。首先总结了近年来基于语义的位置隐私保护研究工作,包括隐私保护设计中的关键因素、语义保护可行性、相关概念等;随后讨论了基于语义的位置隐私保护机制、语义相似度测量方法、隐私保护度量方法等;最后展望了基于语义的位置隐私保护未来的研究方向。
中图分类号:
马明杰,杜跃进,李凤华,刘佳文. 基于语义的位置服务隐私保护综述[J]. 网络与信息安全学报, 2016, 2(12): 1-11.
Ming-jie MA,Yue-jin DU,Feng-hua LI,IUJia-wen L. Review of semantic-based privacy-preserving approaches in LBS[J]. Chinese Journal of Network and Information Security, 2016, 2(12): 1-11.
表3
基于语义的位置服务隐私保护工作的优缺点"
类别 | 方法 | 优点 | 缺点 |
语义感知[ | 能抵抗空间背景知识攻击 | 保护效果较差 | |
本体论[ | 攻击者很难辨别真实位置 | 未考虑路网情况 | |
树算法[ | 算法简单易理解 | 算法受内存大小限制 | |
Location diversity[ | 给出了语义位置概念,一定程度上保护现实生活的敏感位置 | 文章假设敏感位置是一个静态集合,可能会产生不符合现实情况的问题 | |
单点 | 特征提取[ | 在考虑位置流行度的基础上,用户可预先定义列表 | 未考虑路网情况 |
SALS[ | 隐私度高 | 计算开销大 | |
Voronoi图[ | 解决路网环境和P2P环境的隐私保护问题,有效解决单路段攻击 | 未考虑连续LBS情况以及用户上下文信息 | |
语义位置模糊匿名[ | 易实现 | 依靠可信第三方 | |
贝叶斯[ | 实现贝叶斯方法建模位置语义 | 依靠可信第三方 | |
B.E.S[ | 定义了停走模型 | 特征较为简单,保护力度不够 | |
语义匿名[ | 可抵御相似性攻击 | 保护强度受匿名集大小影响 | |
轨迹 | 区域EMD[ | 采用停留时间模型,考虑语义位置选取能够很好地保护敏感位置 | 未考虑路网信息保护程度和服务质量受敏感位置分布的影响 |
树算法[ | 能抵御推断攻击 | 计算开销大 | |
相似性聚类[ | 不依赖真实用户轨迹,可有效保护种子用户的隐私 | 未考虑轨迹中的时间因素 |
[1] | QuestMobile. 春季APP实力榜[R]. 北京: QuestMobile, 2016. |
QuestMobile. Spring APP power rankings[R]. Beijing: QuestMobile, 2016. | |
[2] | CNNIC. 中国互联网络发展状况统计报告[R]. 北京: 中国互联网络信息中心, 2016. |
CNNIC. Statistical report on internet development in China[R]. Beijing: China Internet Network Information Center, 2016. | |
[3] | HARA T , SUZUKI A , IWATA M , et al. Dummy-based user loca-tion anonymization under real-world constraints[J]. IEEE Access, 2016,4:673-687. |
[4] | NIU B , GAO S , LI F H , et al. Protection of location privacy in continuous LBSs against adversaries with background information[C]//The International Conference on Computing, Networking and Communications (ICNC'16). 2016:1-6. |
[5] | NGO H , KIM J . Location privacy via differential private perturba-tion of cloaking area[C]//IEEE 28th Computer Security Founda-tions Symposium(CSF'15), 2015:63-74. |
[6] | XIAO Y , XIONG L . Protecting locations with differential privacy under temporal correlations[C]//The 22nd ACM Conference on Computer and Communications Security (CCS'15), 2015:1298-1309. |
[7] | CHATZIKOKOLAKIS K , PALAMIDESSI C , STRONATI M . A predictive differentially-private mechanism for mobility traces[C]//The 14th Privacy Enhancing Technologies Symposium (PETS'14), 2014:21-41. |
[8] | MONREALE A , TRASARTI R , RENSO C , et al. Preserving pri-vacy in semantic-rich trajectories of human mobility[C]//The 3rd ACM SIGSPATIA; International Workshop on Security and Pri-vacy in GIS and LBS(SPRINGL'10). 2010:47-54. |
[9] | SPACCAPIETRA S , PARENT C , DAMIANI M L , et al. A con-ceptual view on trajectories[J]. Data&Knowledge Engineering , 2008,65(1): 126-146. |
[10] | DAMIANI M L , BERTINO E , SILVESTRI C . Protecting location privacy through semantics-aware obfuscation techniques[C]//Joint iTrust and PST Conferences on Privacy, Trust Management and Security (IFIPTM '08). 2008:231-245. |
[11] | DAMIANI M L , SILVESTRI C , BERTINO E . Semantics-aware obfuscation for location privacy[J]. Journal of Computing Science and Engineering, 2008,2(2):137-160. |
[12] | LIOUDAKIS G V , DELLAS N L , KOUTSOLOUKAS E , et al. A semantic framework for privacy-aware access control[C]//The In-ternational Multiconference on Computer Science and Information Technology(IMCSIT'08). 2008:813-820. |
[13] | XIAO Z , XU J , MENG X . P-Sensitivity:a semantic pri-vacy-protection model for location-based services[C]//The Interna-tional Conference on Mobile Data Management Work-shops(MDMW'08). 2008:47-54. |
[14] | HAAV H M , KALJUVEE A , LUTS M , et al. Ontology-based retrieval of spatially related objects for location based services[C]//On the Move to Meaningful Internet Systems:(OTM'09). 2009:1010-1024. |
[15] | XUE M , KALNIS P , PUNG H . Location Diversity:enhanced privacy protection in location based services[C]//The 4th Interna-tional Symposium on Location and Context Awareness (LoCA'09), Tokyo. 2009:70-87. |
[16] | DAMIANI M L , BERTINO E , SILVESTRI C . The PROBE framework for the personalized cloaking of private locations[J]. Transactions on Data Privacy, 2010,2(3): 123-148. |
[17] | DAMIANI M L . Analyzing semantic location cloaking techniques in a probabilistic grid-based map[C]//The 18th SIGSPATIAL In-ternational Conference on Advances in Geographic Information Systems (GIS' 10). 2010:522-523. |
[18] | DAMIANI M L , SILVESTRI C , BERTINO E . Fine-grained cloak-ing of sensitive positions in location-sharing applications[J]. IEEE Pervasive Computing, 2011,10(4): 64-72. |
[19] | CHE Y , CHIEW K , HONG X , et al. SALS:semantics-aware loca-tion sharing based on cloaking zone in mobile social net-works[C]//The First ACM SIGSPATIAL International Workshop on Mobile Geographic Information Systems(MobiGIS'12). 2012:49-56. |
[20] | LI M , QIN Z , WANG C . Sensitive semantics-aware personality cloaking on road network environment[J]. International Journal of Security and Its Applications, 2014,8(1): 133-146. |
[21] | PAN X , WU L , PIAO C , et al. P3RN:personalized privacy protec-tion using query semantics over road networks[C]//The Interna-tional Conference on Web-Age Information Management (WIAM'14), Macau. 2014:323-335. |
[22] | THI-BAO T L , DANG T K . Semantic Bob-tree:a new obfuscation technique for location privacy protection[C]//The International Conference on Advances in Mobile Computing&Multimedia (MoMM'12). 2012:281-284. |
[23] | LE T T B , DANG T K . Semantic-aware obfuscation for location privacy at database level[C]//The International Conference on In-formation and Communication Technology(ICT'13). 2013:111-120. |
[24] | OH Y , JUNG K , PARK S , et al. A privacy preserving technique to prevent sensitive behavior exposure in semantic location-based ser-vice[C]//The 18th International Conference on Knowledge-Based and Intelligent Information&Engineering Systems(KES'14). 2014,35:318-327. |
[25] | ELKHODR M , SHAHRESTANI S , CHEUNG H . A semantic obfuscation technique for the internet of things[C]//The Interna-tional Conference on Communications Workshops(ICC'14). 2014:448-453. |
[26] | YANG J , ZHU Z , SEITER J , et al. Informative yet unrevealing:semantic obfuscation for location based services[C]//The 2nd Workshop on Privacy in Geographic Information Collection and Analysis (GeoPrivacy'15). 2015. |
[27] | WU Z , CHEN Z , ZHU J , et al. Location semantics protection basedon bayesian inference[C]//The International Conference on Web-Age Information Management (WIAM'15). 2015:297-308. |
[28] | LEE B , OH J , YU H , et al. Protecting location privacy using loca-tion semantics[C]//The 17th ACM SIGKDD international confer-ence on Knowledge discovery and data mining (KDD '11). 2011:1289-1297. |
[29] | EMRE Y , MARIA L D , OSMAN A , et al. Privacy-preserving sharing of sensitive semantic locations under road-network con-straints[C]//The 13th International Conference on Mobile Data Management(MDM'12). 2012:186-195. |
[30] | LI M , CAO S , QIN Z . A trajectory preserving method based on semantic anonymity proxy[C]//IEEE International Conference on Dependable,Autonomic and Secure Computing(DASC 2013). 2013:16-20. |
[31] | KOU Q , TIAN Y , SONG Z , et al. Privacy preserving social tie discovery based on cloaked human trajectories[C]//The 7th Interna-tional Workshop on Hot Topics in Planet-scale mobile computing and online Social networking (HOTPOST'15). 2015:13-18. |
[32] | HAN P , TSAI H P . SST:privacy preserving for semantic trajecto-ries[C]//IEEE International Conference on Mobile Data Manage-ment (MDM 15). 2015:80-85. |
[33] | MUBARK A A , ELABD E , ABDULKADER H . Semantic ano-nymization in publishing categorical sensitive attributes[C]//The International Conference on Knowledge and Smart Technol-ogy(KST 2016). 2016:89-95. |
[34] | VINCENT , BINDSCHAEDLER , REZA , et al. Synthesizing plau-sible privacy-preserving location traces[C]//The 37th IEEE Sympo-sium on Security and Privacy(S&P'16). 2016:546-563. |
[35] | BILOGREVIC I , HUGUENIN K , MIHAILA S , et al. Predicting users' motivations behind location check-ins and utility implications of privacy protection mechanisms[C]//The 22nd Annual Network and Distributed System Security Symposium (NDSS'15 ). 2015. |
[36] | BARAK O , COHEN G , TOCH E . Anonymizing mobility data using semantic cloaking[J]. Pervasive&Mobile Computing, 2016,38(C): 102-112. |
[37] | LI Y . Semantic-aware location privacy preservation on road net-works[C]//Database Systems for Advanced Applications (DAS-FAA'16). 2016:314-331. |
[38] | NGO H , KIM J . Location privacy via differential private perturba-tion of cloaking area[C]//Computer Security Foundations Sympo-sium (CSF'15). 2015:63-74. |
[39] | THAT D H T , POPA I S , ZEITOUNI K , et al. PAMPAS:pri-vacy-aware mobile participatory sensing using secure probes[C]//The 28th International Conference on Scientific and Statistical Da-tabase Management (SSDBM'16). 2016:1-12. |
[40] | NOVAK E , LI Q . Near-private,proximity based location shar-ing[C]//The Conference on Computer Communications (INFO-COM'14). 2014:37-45. |
[41] | PALANISAMY B , LIU L . Effective mix-zone anonymization techniques for mobile travelers[J]. Geoinformatica, 2014,18(1): 135-164. |
[42] | ZUBERI R S , AHMAD S N . Secure mix-zones for privacy protec-tion of road network location based services users[J]. Journal of Computer Networks& Communications, 2016,2016,(3): 1-8. |
[43] | GERVAIS A , SHOKRI R , SINGLA A , et al. Quantifying Web-search privacy[C]//The 2014 ACM Sigsac Conference on Computer and Communications Security(CCS'14). 2014:966-977. |
[44] | SU X , HYYSALO J , RAUTIAINEN M , et al. Privacy as a service in digital health[J]. Computers and Society, 2016:1-6. |
[45] | SAFI H , ASSEMI B , MESBAH M , et al. Trip detection with smartphone-assisted collection of travel data[J]. Transportation Research Record Journal of the Transportation Research Board, 2016,2594:18-26. |
[46] | CETATEANU A , LUCA B A , POPESCU A A , et al. A novel methodology for identifying environmental exposures using GPS data[J]. International Journal of Geographical Information Science, 2016:1-17. |
[47] | TRAJCEVSKI G . Compression of spatio-temporal data[C]//The 17th IEEE International Conference on Mobile Data Manage-ment[MDM' 16]. 2016:4-7. |
[48] | MOUSAVI S M , HARWOOD A , KARUNASEKERA S , et al. Geometry of interest (GOI):spatio-temporal destination extraction and partitioning in GPS trajectory data[J]. Journal of Ambient Intel-ligence&Humanized Computing, 2016:1-16. |
[49] | GRAAFF V , DE B R A , VAN K M . Automated semantic trajectory annotation with indoor point-of-interest visits in urban ar-eas[C]//The 31st Annual ACM Symposium on Applied Comput-ing(SAC'16), Pisa. 2016:552-559. |
[50] | HUANG G , HE J , ZHOU W , et al. Discovery of stop regions for understanding repeat travel behaviors of moving objects[J]. Journal of Computer&System Sciences, 2015,82(4):582-593. |
[51] | ILARRI S , STOJANOVIC D , RAY C . Semantic management of moving objects:a vision towards smart mobility[J]. Expert Systems with Applications An International Journal, 2015,42(3):1418-1435. |
[52] | CHRISTINE P , STEFANO S , CHIARA R , et al. Semantic trajecto-ries modeling and analysis[J]. ACM Computing Surveys, 2013,45(4):1-32. |
[53] | SIQUEIRA F D L , BOGORNY V . Discovering chasing behavior in moving object trajectories[J]. Transactions in GIS, 2011,15(5):667-688. |
[54] | PANAGIOTAKIS C , PELEKIS N , KOPANAKIS I , et al. Segmen-tation and sampling of moving object trajectories based representa-tive ness[J]. IEEE Transactions on Knowledge &Data Engineering, 2011,24(99):1328-1343. |
[55] | RUBNER Y , TOMASI C , GUIBAS L J . A metric for distributions with applications to image databases[C]//The International Confer-ence on Computer Vision(ICCV'98). Bombay, 1998:59-66. |
[56] | RUBNER Y , TOMASI C , GUIBAS L J . The earth mover's distance as a metric for image retrieval[J]. International Journal of Computer Vision, 2000,40(2):99-121. |
[57] | LI N , LI T , VENKATASUBRAMANIAN S . T-closeness:privacy beyond k-anonymity and l-diversity[C]//The International Conference on Data Engineering(ICDE'07). 2007:106-115. |
[58] | 侯洁 . 基于位置语义的位置服务(LBS)隐私保护研究[D]. 成都: 电子科技大学, 2015. |
HOU J . Research on location semantics based privacy-preserving technology for location-based services[D]. Chengdu: School of Computer Science and Engineering, 2015. | |
[59] | SHANNON C E . A mathematical theory of communication[J]. The Bell System Technical Journal, 1948,27(3):379-423. |
[60] | 李敏 . 基于位置服务的隐私保护研究[D]. 成都: 电子科技大学, 2014. |
LI M . Research on privacy protection in location based services[D]. Chengdu: School of Computer Science and Engineering, 2015. | |
[61] | SHOKRI R , TRONCOSO C , DIAZ C , et al. Unraveling an old cloak:k-anonymity for location privacy[C]//The ACM Workshop on Pri-vacy in the Electronic Society(WPES'10). 2010:115-118. |
[1] | 陈赛特, 李卫海, 姚远志, 俞能海. 轻量级K匿名增量近邻查询位置隐私保护算法[J]. 网络与信息安全学报, 2023, 9(3): 60-72. |
[2] | 肖敏, 毛发英, 黄永洪, 曹云飞. 基于属性签名的车载网匿名信任管理方案[J]. 网络与信息安全学报, 2023, 9(2): 33-45. |
[3] | 许建龙, 林健, 黎宇森, 熊智. 分布式用户隐私保护可调节的云服务个性化QoS预测模型[J]. 网络与信息安全学报, 2023, 9(2): 70-80. |
[4] | 胡安祥, 肖达, 郭世臣, 刘胜利. 基于语义冲突的硬编码后门检测方法[J]. 网络与信息安全学报, 2023, 9(1): 150-157. |
[5] | 孙哲, 宁洪, 殷丽华, 方滨兴. 基于教学实训靶场的“数据隐私保护”课程建设初探[J]. 网络与信息安全学报, 2023, 9(1): 178-188. |
[6] | 刘赣秦, 李晖, 朱辉, 黄煜坤, 刘兴东. 低功耗嵌入式平台的SM2国密算法优化实现[J]. 网络与信息安全学报, 2022, 8(6): 29-38. |
[7] | 白雪, 秦宝东, 郭瑞, 郑东. 基于SM2的两方协作盲签名协议[J]. 网络与信息安全学报, 2022, 8(6): 39-51. |
[8] | 刘军, 袁霖, 冯志尚. 集群网络密钥管理方案研究综述[J]. 网络与信息安全学报, 2022, 8(6): 52-69. |
[9] | 肖敏, 姚涛, 刘媛妮, 黄永洪. 具有隐私保护的动态高效车载云管理方案[J]. 网络与信息安全学报, 2022, 8(6): 70-83. |
[10] | 卢晨昕, 陈兵, 丁宁, 陈立全, 吴戈. 具有紧凑标签的基于身份匿名云审计方案[J]. 网络与信息安全学报, 2022, 8(6): 156-168. |
[11] | 明盛智, 朱建明, 隋智源, 张娴. 信息增值机制下在线医疗隐私保护策略[J]. 网络与信息安全学报, 2022, 8(6): 169-177. |
[12] | 夏毅, 兰明敬, 陈晓慧, 罗军勇, 周刚, 何鹏. 可解释的知识图谱推理方法综述[J]. 网络与信息安全学报, 2022, 8(5): 1-25. |
[13] | 张娴, 朱建明, 隋智源, 明盛智. 数字货币交易匿名性与监管的博弈分析[J]. 网络与信息安全学报, 2022, 8(5): 150-157. |
[14] | 刘峰, 杨杰, 齐佳音. 区块链密码学隐私保护技术综述[J]. 网络与信息安全学报, 2022, 8(4): 29-44. |
[15] | 金琳, 田有亮. 基于区块链的多权限属性隐藏电子病历共享方案[J]. 网络与信息安全学报, 2022, 8(4): 66-76. |
阅读次数 | ||||||
全文 |
|
|||||
摘要 |
|
|||||
|