Chinese Journal of Network and Information Security ›› 2017, Vol. 3 ›› Issue (6): 8-20.doi: 10.11959/j.issn.2096-109x.2017.00130
• Papers • Previous Articles Next Articles
Lei ZHANG1,2,Chun-guang MA1,Song-tao YANG1,2,Zeng-peng LI1
Revised:
2017-03-01
Online:
2017-06-01
Published:
2017-06-21
Supported by:
CLC Number:
Lei ZHANG,Chun-guang MA,Song-tao YANG,Zeng-peng LI. Trajectories anonymous algorithm for association attack[J]. Chinese Journal of Network and Information Security, 2017, 3(6): 8-20.
[1] | GRUTESER M , GRUNWALD D . Anonymous usage of location-based services through spatial and temporal cloaking[C]// The 1st International Conference on Mobile Systems,Applications and Services,ACM. 2003: 31-42. |
[2] | BAMBA B , LIU L , PESTI P ,et al. Supporting anonymous location queries in mobile environments with privacygrid[C]// The 17th International Conference on World Wide Web. 2008: 237-246. |
[3] | REBOLLO-MONEDERO D , FORNE J , SOLANAS A ,et al. Private location-based information retrieval through user collaboration[J]. Computer Communications, 2010,33(6): 762-774. |
[4] | YIU M L , JENSEN C S , MOLLER J ,et al. Design and analysis of a ranking approach to private location-based services[J]. ACM Transactions on Database Systems, 2011,36(2): 475-486. |
[5] | GHINITA G , KALNIS P , KHOSHGOZARAN A ,et al. Private queries in location based services:anonymizers are not necessary[C]// The 2008 ACM Sigmod International Conference on Management of Data. 2008: 121-132. |
[6] | AGGARWAL G , FEDER T , KENTHAPADI K ,et al. Anonymizing tables[M]. Berlin: SpringerPress, 2005: 246-258. |
[7] | WONG R C W , LI J , FU A W C ,et al. (α,k)-anonymity:an enhanced k-anonymity model for privacy preserving data publishing[C]// The 12th ACM Sigkdd International Conference on Knowledge Discovery and Data Mining. 2006: 754-759. |
[8] | LEE J G , HAN J , WHANG K Y . Trajectory clustering:a partition-and-group framework[C]// The 2007 ACM Sigmod International Conference on Management of Data. 2007: 593-604. |
[9] | XU Y , WANG K , FU A W C ,et al. Anonymizing transaction databases for publication[C]// The 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 2008: 767-775. |
[10] | ABUL O , BONCHI F , NANNI M ,et al. Never walk alone:uncertainty for anonymity in moving objects databases[C]// The 24th IEEE International Conference on Data Engineering,Cancun. 2008: 376-385. |
[11] | BONCHI F . Privacy preserving publication of moving object data[M]// Privacy in Location-Based Applications. Berlin: SpringerPress, 2009: 190-215. |
[12] | BONCHI F , LAKSHMANAN L V S , WANG H . Trajectory anonymity in publishing personal mobility data[J]. Sigkdd Explor Newsl, 2011,13(1): 30-42. |
[13] | 潘晓, 郝兴, 孟小峰 . 基于位置服务中的连续查询隐私保护研究[J]. 计算机研究与发展, 2010,47(1): 121-129. |
PAN X , HAO X , MENG X F . Privacy preserving towards continuous query in location-based services[J]. Journal of Computer Research and Development, 2010,47(1): 121-129. | |
[14] | HASHEM T , KULIK L , ZHANG R . Countering overlapping rectangle privacy attack for moving KNN queries[J]. Information Systems, 2013,38(3): 430-453. |
[15] | HWANG R H , HSUEH Y L , CHUNG H W . A novel time- obfuscated algorithm for trajectory privacy protection[J]. IEEE Transactions on Services Computing, 2014,7(2): 126-139. |
[16] | GAO S , MA J F , SHI W S ,et al. LTPPM:a location and trajectory privacy protection mechanism in participatory sensing[J]. Wireless Communications &Mobile Computing, 2015,15(1): 155-169. |
[17] | WANG Y , HE L P , PENG J ,et al. Privacy preserving for continuous query in location based services[C]// The IEEE 18th International Conference on Parallel and Distributed System (ICPADS). 2012: 213-220. |
[18] | SKOUMAS G , SKOUTAS D , VLACHAKI A . Efficient identification and approximation of k-nearest moving neighbors[C]// The 21st ACM Sigspatial International Conference on Advances in Geographic Information Systems. 2013: 264-273. |
[19] | WANG E K , YE Y . A new privacy-preserving scheme for continuous query in location-based social networking services[J]. The International Journal of Distributed Sensor Networks, 2014(1): 836-839. |
[20] | JIA J , ZHANG F . Nonexposure accurate location k-anonymity algorithm in LBS[J]. Scientific World Journal, 2014(1): 149-168. |
[21] | 张磊, 马春光, 杨松涛 . 基于位置关联相似性的匿名算法[J]. 中国科技论文, 2016(2): 197-201. |
ZHANG L , MA C G , YANG S T . Anonymous algorithm based on position correlation similarity[J]. China Science and Technology, 2016(2): 197-201. | |
[22] | BERESFORD A R , STAJANO F . Location privacy in pervasive computing[J]. Pervasive Computing, 2003,2(1): 46-55. |
[23] | FREUDIGER J , SHOKRI R , HUBAUX J P . On the optimal placement of mix zones[C]// The Privacy enhancing Technologies. 2009: 216-234. |
[24] | FREUDIGER J , RAYA M , FéLEGYHáZI M ,et al. Mix-zones for location privacy in vehicular networks[C]// The 1st International Workshop on Wireless Networking for Intelligent Transportation Systems (Win-ITS). 2007. |
[25] | PALANISAMY B , LING L . MobiMix:protecting location privacy with mix-zones over road networks[C]// 2011 IEEE 27th International Conference on Data Engineering (ICDE). 2011: 494-505. |
[26] | PALANISAMY B , LIU L , LEE K ,et al. Anonymizing continuous queries with delay-tolerant mix-zones over road networks[J]. Distributed and Parallel Databases, 2014,32(1): 91-118. |
[27] | 马春光, 张磊, 杨松涛 . 位置轨迹隐私保护综述[J]. 信息网络安全, 2015(10): 24-31. |
MA C G , ZHANG L , YANG S T . Track location privacy protection review[J]. Information Network Security, 2015 (10): 24-31. | |
[28] | 张磊, 马春光, 杨松涛 ,等. 基于轮廓泛化的位置隐私保护模型及方法[J]. 系统工程与电子技术, 2016,38(12): 2894-2900. |
MA C G , ZHANG L , YANG S T ,et al. Location privacy protection model and method based on contour generalization[J]. Journal of Systems Engineering,and Electronics, 2016,38(12): 2894-2900. |
[1] | Jianlong XU, Jian LIN, Yusen LI, Zhi XIONG. Distributed user privacy preserving adjustable personalized QoS prediction model for cloud services [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 70-80. |
[2] | Zhe SUN, Hong NING, Lihua YIN, Binxing FANG. Preliminary study on the construction of a data privacy protection course based on a teaching-in-practice range [J]. Chinese Journal of Network and Information Security, 2023, 9(1): 178-188. |
[3] | Xue BAI, Baodong QIN, Rui GUO, Dong ZHENG. Two-party cooperative blind signature based on SM2 [J]. Chinese Journal of Network and Information Security, 2022, 8(6): 39-51. |
[4] | Min XIAO, Tao YAO, Yuanni LIU, Yonghong HUANG. Dynamic and efficient vehicular cloud management scheme with privacy protection [J]. Chinese Journal of Network and Information Security, 2022, 8(6): 70-83. |
[5] | Chenxin LU, Bing CHEN, Ning DING, Liquan CHEN, Ge WU. Identity-based anonymous cloud auditing scheme with compact tags [J]. Chinese Journal of Network and Information Security, 2022, 8(6): 156-168. |
[6] | Shengzhi MING, Jianming ZHU, Zhiyuan SUI, Xian ZHANG. Online medical privacy protection strategy under information value-added mechanism [J]. Chinese Journal of Network and Information Security, 2022, 8(6): 169-177. |
[7] | Xian ZHANG, Jianming ZHU, Zhiyuan SUI, Shengzhi MING. Analysis on anonymity and regulation of digital currency transactions based on game theory [J]. Chinese Journal of Network and Information Security, 2022, 8(5): 150-157. |
[8] | Feng LIU, Jie YANG, Jiayin QI. Survey on blockchain privacy protection techniques in cryptography [J]. Chinese Journal of Network and Information Security, 2022, 8(4): 29-44. |
[9] | Lin JIN, Youliang TIAN. Multi-authority attribute hidden for electronic medical record sharing scheme based on blockchain [J]. Chinese Journal of Network and Information Security, 2022, 8(4): 66-76. |
[10] | Weicheng ZHANG, Hongquan WEI, Shuxin LIU, Liming PU. Fast handover authentication scheme in 5G mobile edge computing scenarios [J]. Chinese Journal of Network and Information Security, 2022, 8(3): 154-168. |
[11] | Zhensheng GAO, Lifeng CAO, Xuehui DU. Research progress of access control based on blockchain [J]. Chinese Journal of Network and Information Security, 2021, 7(6): 68-87. |
[12] | Chuanxin ZHOU, Yi SUN, Degang WANG, Huawei GE. Survey of federated learning research [J]. Chinese Journal of Network and Information Security, 2021, 7(5): 77-92. |
[13] | Rongna XIE, Xiaonan FAN, Lin YUAN, Zichen GUO, Jiayu ZHU, Guozhen SHI. Research on extended access control mechanism in online social network [J]. Chinese Journal of Network and Information Security, 2021, 7(5): 123-131. |
[14] | Zhanhui YUAN, Zhi YANG, Hongqi ZHANG, Shuyuan JIN, Xuehui DU. Android complex information flow analysis method based on communicating sequential process [J]. Chinese Journal of Network and Information Security, 2021, 7(5): 156-168. |
[15] | Kui REN, Quanrun MENG, Shoukun YAN, Zhan QIN. Survey of artificial intelligence data security and privacy protection [J]. Chinese Journal of Network and Information Security, 2021, 7(1): 1-10. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|