通信学报 ›› 2015, Vol. 36 ›› Issue (9): 230-243.doi: 10.11959/j.issn.1000-436x.2015167
王宇航,张宏莉,余翔湛
出版日期:
2015-09-25
发布日期:
2017-09-15
基金资助:
Yu-hang WANG,Hong-li ZHANG,Xiang-zhan YU
Online:
2015-09-25
Published:
2017-09-15
Supported by:
摘要:
全面归纳了移动互联网中位置隐私保护的相关研究工作,总结了位置服务和定位服务中的威胁模型。然后,详细介绍了现有基于位置服务的隐私保护技术,分析了其在抗隐私攻击和位置隐私适用性方面的优缺点,并阐述了定位服务中位置隐私问题的本质、威胁和解决方法。最后指出了需要进一步研究的问题。
王宇航,张宏莉,余翔湛. 移动互联网中的位置隐私保护研究[J]. 通信学报, 2015, 36(9): 230-243.
Yu-hang WANG,Hong-li ZHANG,Xiang-zhan YU. Research on location privacy in mobile internet[J]. Journal on Communications, 2015, 36(9): 230-243.
表5
现有技术对各类LBS的适用性"
位置隐私保护技术 | LBS分类 | ||||||
1 | 2 | 3 | 45 | 6 | 7 | 8 | |
文献[ | √ | √ | √ | √ | |||
文献[ | √ | √ | √ | √ | |||
文献[ | √ | √ | √ | √ | |||
泛化法文献[ | √√ | √√ | √√ | √√ | |||
文献[ | √ | √ | √ | √ | |||
文献[ | √ | √ | √ | √ | |||
文献[ | √ | √ | √ | √ | |||
模糊法文献[ | √√√ | √√√ | √√√ | √√√√√√ | √√√ | √√√ | √√√ |
文献[ | √ | √ | √ | √ | |||
掩盖法文献[ | √ | √ | √√ | √√ | √ | √ | |
文献[ | √ | √ | √ | √ | |||
文献[ | √ | √ | √ | √ | |||
加密法文献[ | √ | √ | √√ | √√√ | √ | √√ | √√ |
文献[ | √ | √ | √ | √√ | √ | √ | √ |
[1] | KIM H , KIM J , LEE Y , et al. An empirical study of the use contexts and usability problems in mobile Internet[A]. Proceedings of the 35th Hawaii International Conference on System Sciences (HICSS 2002)[C]. Hawaii, 2002. |
[2] | Internet trends 2014[EB/OL]. , 2014. |
[3] | The Unital States' global surveillance recond[EB/OL]. , 2014. |
[4] | DAMIANI M L , CUIJPERS C . Privacy challenges in third-party location services[A]. IEEE 14th International Conference on Mobile Data Management(MDM 2013)[C]. Milan,Italy, 2013. |
[5] | DUCKHAM M , KULIK L . Location Privacy and Location-Aware Computing[M]. FL:CRC Press, 2006. |
[6] | 周傲英, 杨彬, 金澈清 , 等. 基于位置的服务:架构与进展[J]. 计算机学报 2011,34(7): 1155-1171. ZHOU A Y , YANG B , JIN C Q , et al. Location-based services:archi-tecture and progress[J]. Chinese Journal of Computers, 2011,34(7): 1155-1171. |
[7] | KIDO H , YANAGISAWA Y , SATOH T . An anonymous communica-tion technique using dummies for location-based services[A]. Pro-ceedings of the International Conference on Pervasive Services(ICPS 2005)[C]. Santorini,Greece, 2005.88-97. |
[8] | SHANKAR P , GANAPATHY V , IFTODE L . Privately querying location-based services with sybilQuery[A]. Proceedings of the 11th Inter-national Conference on Ubiquitous Computing(UBICOMP 2009)[C]. 2009.31-40. |
[9] | HONG J I , LANDAY J A . An architecture for privacy-sensitive ubiq-uitous computing[A]. Proceedings of the 2nd International Conference on Mobile Systems,Applications,and Services(MOBISYS 2004)[C]. Boston,Massachusetts,USA, 2004.177-189. |
[10] | ARDAGNA C A , CREMONINI M , DAMIANI E . Location privacy protection through obfuscation-based techniques[A]. Proceedings of the 21st Annual IFIP WG 11.3 Working Conference on Data and Ap-plications Security[C]. 2007.47-60. |
[11] | DUCKHAM M , KULIK L . A formal model of obfuscation and nego-tiation for location privacy[A]. Proceedings of the 3rd International Conference on Pervasive Computing(PERVASIVE 2005)[C]. Munich,Germany, 2005.152-170. |
[12] | HU H B , XU J L . 2PASS bandwidth-optimized location cloaking for anonymous location-based services[J]. IEEE Transactions on Parallel and Distributed Systems, 2010,21(10): 1458-1472. |
[13] | GRUTESER M , GRUNWALD D . Anonymous usage of loca-tion-based services through spatial and temporal cloaking[A]. Pro-ceedings of the 1st International Conference on Mobile Systems,Ap-plications and Services (MOBISYS 2003)[C]. San Francisco,Califor-nia, 2003.31-42. |
[14] | MOKBEL M F , CHOW C Y , AREF W G . The new casper:query processing for location services without compromising privacy[A]. International Conference on Very Large Data Bases (VLDB 2006)[C]. Seoul,South Korea, 2006.763-774. |
[15] | GEDIK B , LIU L . Location privacy in mobile systems:a personalized anonymization model[A]. Proceedings of the 25th IEEE International Conference on Distributed Computing Systems (ICDCS 2005)[C]. Columbus,OH,USA, 2005.620-629. |
[16] | ZHANG C Y , HUANG Y . Cloaking locations for anonymous location based services:a hybrid approach[J]. Geoinformatica, 2009,13(2): 159-182. |
[17] | PAN X , MENG X F , XU J L . Distortion-based anonymity for continu-ous queries in location-based mobile services[A]. Proceedings of the ACM SIGSPATIAL International Conference on Advances in Ge-ographic Information Systems(GIS 2009)[C]. Seattle,Washington, 2009.256-265. |
[18] | BERESFORD A R , STAJANO F . Location privacy in pervasive com-puting[J]. IEEE Pervasive Computing, 2003,2(1): 46-55. |
[19] | BERESFORD A R , STAJANO F . Mix zones:user privacy in loca-tion-aware services[A]. Proceedings of the 2nd IEEE Annual Confer-ence on Pervasive Computing and Communications Workshops[C]. 2004.127-131. |
[20] | PALANISAMYB , LIU L . MobiMix:protecting location privacy with mix-zones over road networks[A]. IEEE 27th International Conference on Data Engineering (ICDE 2011)[C]. 2011.494-505. |
[21] | JANG M Y , CHANG J W . A new cloaking method based on weighted adjacency graph for preserving user location privacy in LBS[J]. Com-puter Science and its Applications, 2012,203:129-138. |
[22] | GHINITA G , KALNIS P , SKIADOPOULOS S . Mobihide:a mobile peer to peer system for anonymous location-based queries[A]. Pro-ceedings of the 10th International Conference on Advances in Spatial and Temporal Databases (SSTD 2007)[C]. Boston,MA,USA, 2007.221-238. |
[23] | WERNKE M , SKVORTSOV P , DURR F , et al. A classification of location privacy attacks and approaches[J]. Personal and Ubiquitous Computing, 2012,18(1): 163-175. |
[24] | CHOW C Y , MOKBEL M F . Trajectory privacy in location-based services and data publication[J]. SIGKDD Explorations, 2011,13(1): 19-29. |
[25] | MASCETTI S , FRENI D , BETTINI C , et al. Privacy in geo-social networks:proximity notification with untrusted service providers and curious buddies[J]. The VLDB Journal, 2011,20(4): 541-566. |
[26] | LI X Y , JUNG T . Search me if you can:privacy-preserving location query service[A]. Proceedings of the INFOCOM 2013[C]. Turin,Italy, 2013.2760-2768. |
[27] | MARIAS G F , DELAKOURIDIS C , KAZATZOPOULOS L , et al. Location privacy through secret sharing techniques[A]. Sixth IEEE In-ternational Symposium on a World of Wireless Mobile and Multimedia Networks(WOWMOM 2005)[C]. Taormina,Italy, 2005.614-620. |
[28] | WERNKE M , DURR F , ROTHERMEL K . PShare:position sharing for location privacy based on multi-secret sharing[A]. Proceedings of the 10th IEEE International Conference on Pervasive Computing and Com-munications (PERCOM 2012)[C]. Lugano,Switzerland, 2012.153-161. |
[29] | KRUMM J . Inference attacks on location tracks[A]. Proceedings of the 5th International Conference on Pervasive Computing (PERVA-SIVE 2007)[C]. Toronto,Canada, 2007.127-143. |
[30] | GHINITA G , DAMIANI M L , SILVESTRI C , et al. Preventing veloc-ity-based linkage attacks in location-aware applications[A]. Pro-ceedings of the 17th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems (GIS 2009)[C]. Seattle,Washington,USA, 2009.246-255. |
[31] | MOKBEL M F . Privacy in location-based services:state of the art and research directions[A]. Proceedings of the 8th International Confer-ence on Mobile Data Management(MDM 2007)[C]. Mannheim,Ger-many, 2007.228. |
[32] | MACHANAVAJJHALA A , KIFER D , GEHRKE J , et al. L-diversity:privacy beyond k-anonymity[J]. ACM Transactions on Knowledge Discovery from Data, 2007,1(1): 3. |
[33] | TSAI J Y , KELLEY P G , CRANOR L F , et al. Location-sharing tech-nologies:privacy risks and controls[A]. TPRC 2009[C]. 2009. |
[34] | Location API[EB/OL]. . |
[35] | Privacy policiey[EB/OL]. . |
[36] | LAMARCA A , HIGHTOWER J , SMITH I , et al. Self-mapping in 802.11 location systems[A]. Proceedings of the 7th International Con-ference on Ubiqutous Computing(UBICOMP 2005)[C]. Tokyo,Japan, 2005.87-104. |
[37] | LATEGAHN J , KUENEMUND F , ROEHRIG C . Mobile robot local-ization using WLAN,odometry and gyroscope data[J]. International Journal of Computing, 2010,9(1): 22-30. |
[38] | FICCO M , PALMIERI F , CASTIGLIONE A . Hybrid indoor and outdoor location services for new generation mobile terminals[J]. Per-sonal and Ubiquitous Computing, 2014,18(2): 271-285. |
[39] | KUHN M G . An asymmetric security mechanism for navigation sig-nals[A]. Proceedings of the 6th International Conference on Informa-tion Hiding(IH 2004)[C]. Toronto,Canada, 2004.239-252. |
[40] | TIPPENHAUER N O , RASMUSSEN K B , POPPER C , et al. Attacks on public WLAN-based positioning systems[A]. Proceedings of the 7th International Conference on Mobile Systems,Applications,and Services(MOBISYS 2009)[C]. Kraków,Poland, 2009.29-40. |
[41] | Android location SDK[EB/OL]. . |
[42] | Configure access points with google location services[EB/OL]. . |
[43] | PENG Z T , KAJI K , KAWAGUCHI N . Privacy protection in WiFi-based location estimation[A]. Seventh International Conference on Mobile Computing and Ubiquitous Networking(ICMU 2014)[C]. Singapore, 2014.62-67. |
[44] | 王璐, 孟小峰 . 位置大数据隐私保护研究综述[J]. 软件学报 2014,25(4): 693-712. WANG L , MENG X F . Location privacy preservation in big data era:a survey[J]. Journal of Software, 2014,25(4): 693-712. |
[45] | GHINITA G , KALNIS P , KHOSHGOZARAN A , et al. Private queries in location based services:anonymizers are not necessary[A]. Proceedings of the ACM SIGMOD International Conference on Management of Data (SIGMOD 2008)[C]. Vancouver,Canada, 2008.121-132. |
[46] | WANG H , WANG Z Y , SHEN G B , et al. Wheelloc:enabling con-tinuous location service on mobile phone for outdoor scenarios[A]. Proceedings of the INFOCOM 2013[C]. Turin,Italy, 2013.2733-2741. |
[47] | About POLS[EB/OL]. . |
[48] | LI B H , QUADER I J , DEMPSTER A G . On outdoor positioning with WiFi[J]. Journal of Global Positioning Systems, 2008,7(1): 18-26. |
[1] | 晏燕, 丛一鸣, Adnan Mahmood, 盛权政. 基于深度学习的位置大数据统计发布与隐私保护方法[J]. 通信学报, 2022, 43(1): 203-216. |
[2] | 李洪涛, 任晓宇, 王洁, 马建峰. 基于差分隐私的连续位置隐私保护机制[J]. 通信学报, 2021, 42(8): 164-175. |
[3] | 崔杰, 陈学峰, 张静, 魏璐, 仲红. 基于公交车缓存的车联网位置隐私保护方案[J]. 通信学报, 2021, 42(7): 150-161. |
[4] | 叶阿勇,孟玲玉,赵子文,刁一晴,张娇美. 基于预测和滑动窗口的轨迹差分隐私保护机制[J]. 通信学报, 2020, 41(4): 123-133. |
[5] | 王洁,王春茹,马建峰,李洪涛. 基于位置语义和查询概率的假位置选择算法[J]. 通信学报, 2020, 41(3): 53-61. |
[6] | 刘文学,陈诗军,葛建,袁洪,龚翠玲. 基于GNSS邻域相似性的5G基站纳秒级时间同步技术研究[J]. 通信学报, 2020, 41(1): 180-190. |
[7] | 李维皓,曹进,李晖. 基于位置服务隐私自关联的隐私保护方案[J]. 通信学报, 2019, 40(5): 57-66. |
[8] | 张文静,刘樵,朱辉. 基于信息论方法的多等级位置隐私度量与保护[J]. 通信学报, 2019, 40(12): 51-59. |
[9] | 李维皓,丁晟,孟佳洁,李晖. 基于位置服务中时空关联的隐私保护方案[J]. 通信学报, 2018, 39(5): 134-142. |
[10] | 周倩,秦小麟,丁有伟. 基于攻击感知的能量高效源位置隐私保护算法[J]. 通信学报, 2018, 39(1): 101-116. |
[11] | 裴卓雄,李兴华,刘海,雷凯跃,马建峰,李晖. LBS隐私保护中基于查询范围的匿名区构造方案[J]. 通信学报, 2017, 38(9): 125-132. |
[12] | 沈楠,贾春福,梁爽,李瑞琪,刘哲理. 基于保序加密的网格化位置隐私保护方案[J]. 通信学报, 2017, 38(7): 78-88. |
[13] | 周长利,田晖,马春光,杨松涛. 路网环境下基于伪随机置换的LBS隐私保护方法研究[J]. 通信学报, 2017, 38(6): 19-29. |
[14] | 李璐璐,华佳烽,万盛,朱辉,李凤华. 基于高效信息缓存的位置隐私保护方案[J]. 通信学报, 2017, 38(6): 148-157. |
[15] | 刘海,李兴华,王二蒙,马建峰. 连续服务请求下基于假位置的用户隐私增强方法[J]. 通信学报, 2016, 37(7): 140-150. |
阅读次数 | ||||||
全文 |
|
|||||
摘要 |
|
|||||
|