网络与信息安全学报 ›› 2017, Vol. 3 ›› Issue (6): 8-20.doi: 10.11959/j.issn.2096-109x.2017.00130

• 学术论文 • 上一篇    下一篇

面向关联攻击的轨迹匿名方法

张磊1,2,马春光1,杨松涛1,2,李增鹏1   

  1. 1 哈尔滨工程大学计算机科学与技术学院,黑龙江 哈尔滨 150001
    2 佳木斯大学信息电子技术学院,黑龙江 佳木斯 154007
  • 修回日期:2017-03-01 出版日期:2017-06-01 发布日期:2017-06-21
  • 作者简介:张磊(1982-),男,黑龙江绥化人,哈尔滨工程大学博士生,佳木斯大学讲师,主要研究方向为信息安全、隐私保护。|马春光(1974-),男,黑龙江双城人,博士,哈尔滨工程大学教授、博士生导师,主要研究方向为密码学、数据安全与隐私保护、无线自组织网络及安全。|杨松涛(1972-),男,黑龙江鹤岗人,博士,佳木斯大学教授,主要研究方向为信息安全、隐私保护。|李增鹏(1989-),男,山东青岛人,哈尔滨工程大学博士生,主要研究方向为密码学、密码协议。
  • 基金资助:
    国家自然科学基金资助项目(61472097);高等学校博士学科点专项科研基金资助项目(20132304110017);黑龙江省自然科学基金项目(F2015022)

Trajectories anonymous algorithm for association attack

Lei ZHANG1,2,Chun-guang MA1,Song-tao YANG1,2,Zeng-peng LI1   

  1. 1 College of Computer Science and Technology,Harbin Engineering University,Harbin 150001,China
    2 College of Information and Electronic Technology,Jiamusi University,Jiamusi 154007,China
  • Revised:2017-03-01 Online:2017-06-01 Published:2017-06-21
  • Supported by:
    The National Natural Science Foundation of China(61472097);Specialized Research Fund for the Doctoral Program of Higher Education(20132304110017);The Natural Science Foundation of Heilongjiang Province(F2015022)

摘要:

针对用户在申请位置连续查询服务时,不同移动类型产生的轨迹差异泄露用户位置隐私的情况,提出一种相似轨迹实时生成方法。该方法实时计算可产生相似轨迹的连续位置,通过在生成的位置上添加虚假用户与真实用户建立匿名组,满足在连续查询过程中实时轨迹匿名的需求,弥补了当前轨迹隐私保护方法都针对已形成的轨迹进行匿名、无法满足实时位置更新下用户位置隐私保护方面的不足。在这种方法下,提出了一种根据用户移动方向、速度等移动类型一致性计算的轨迹匿名方法,提高了生成轨迹的相似程度。同时,该方法充分考虑生成位置与真实用户位置之间存在的差异,在保障轨迹相似的基础上,进行了位置筛选,降低了攻击者通过生成轨迹的不可到达性辨识出真实轨迹的概率。实验表明,该方法在有效保护连续查询用户位置隐私的前提下,具有很好的执行效率。

关键词: 隐私保护, 连续查询, 位置匿名, 相似轨迹

Abstract:

During the location based service of continuous query,the trajectories which were produced by different movement types may reveal the privacy of user’s location.To solve this problem,a mechanism was proposed to put forward the real-time similar trajectories.With this mechanism,the subsequent position was calculated and which the dummy one was generated to establish an anonymous group,the demands of real-time trajectory anonymity were met,compensating the shortage of real-time trajectories of anonymity in other similar kinds of algorithm.Under this mechanism,a method for calculating subsequent anonymous position was proposed,which used the user's movement patterns,such as mobile direction,speed.The dummy trajectories were made very similar with the trajectory produced by the continuous query user.At the same time,the position of reachable difference in real areas was put forward,and on the basis of position reachable,this mechanism also filtrates out the unreachable candidate locations which had been calculated in the phase of dummy position generates,then decrease the probability of adversary identifies the real trajectory from the location of unreachable.Experimental results show that this method is effective for protecting the location privacy of continuous query user,and provides a good working efficiency.

Key words: privacy protection, continuous query, trajectory anonymous, similar trajectories

中图分类号: 

No Suggested Reading articles found!