通信学报 ›› 2016, Vol. 37 ›› Issue (12): 124-141.doi: 10.11959/j.issn.1000-436x.2016279
出版日期:
2016-12-25
发布日期:
2017-05-15
基金资助:
Sheng WAN1,Feng-hua LI1,2,Ben NIU2(),Zhe SUN2,Hui LI1
Online:
2016-12-25
Published:
2017-05-15
Supported by:
摘要:
日趋流行的基于位置服务(LBS, location-based service)在为人们日常生活带来便利的同时也严重威胁到用户隐私。位置隐私保护技术逐渐成为研究热点,并涌现出大批研究成果。首先介绍位置隐私保护背景知识,包括位置服务应用场景、位置服务体系框架、隐私保护目标和系统构架;接着讨论LBS中的攻击者模型和隐私保护度量指标;然后对4种基于泛化和模糊的LBS隐私保护技术进行深入分析和总结;最后给出了未来LBS隐私保护技术潜在的研究方向。
万盛,李凤华,牛犇,孙哲,李晖. 位置隐私保护技术研究进展[J]. 通信学报, 2016, 37(12): 124-141.
Sheng WAN,Feng-hua LI,Ben NIU,Zhe SUN,Hui LI. Research progress on location privacy-preserving techniques[J]. Journal on Communications, 2016, 37(12): 124-141.
[1] | 王璐, 孟小峰 . 位置大数据隐私保护研究综述[J]. 软件学报, 2014,25(4):693-712. WANG L , MENG X F . Location privacy preservation in big data era: a survey[J]. Journal of Software, 2014,25(4):693-712. |
[2] | HOH B , GRUTESER M . Protecting location privacy through path confusion[C]// 1st IEEE International Conference on Security and Pri-vacy for Emerging Areas in Communications Networks (Secure-Comm'05). Athens, Greece, 2005:194-205. |
[3] | KRUMM J . Inference attacks on location tracks[C]// 5th Springer International Conference on Pervasive Computing(PERVASIVE'07). Toronto, Canada, 2007:127-143. |
[4] | FAWAZ K , SHIN K G . Location privacy protection for smartphone users[C]// 21st ACM Conference on Computer and Communications Security(CCS'14). Scottsdale, United States, 2014:239-250. |
[5] | SHIN K G , JU X , CHEN Z , et al. Privacy protection for users of loca-tion-based services[J]. IEEE Wireless Communications, 2012,19(1):30-39. |
[6] | ZHANG Y , TAN C C , XU F , et al. VProof: lightweight pri-vacy-preserving vehicle location proofs[J]. IEEE Transactions on Ve-hicular Technology, 2015,64(1):378-385. |
[7] | WANG X , PANDE A , ZHU J , et al. STAMP: enabling pri-vacy-preserving location proofs for mobile users[J]. IEEE Transac-tions on Networking, 2016,PP(99):1-14. |
[8] | DICKINSON A , LOCHRIE M , EGGLESTONE P . UKKO: enriching persuasive location based games with environmental sensor data[C]// 2th ACM Annual Symposium on Computer-Human Interaction in Play(CHI Play'15). London, United Kingdom, 2015:493-498. |
[9] | 周傲英, 杨彬, 金澈清 , 等. 基于位置的服务:架构与进展[J]. 计算机学报, 2011,34(7):1155-1171. ZHOU A Y , YANG B , JIN C Q , et al. Location-based services: archi-tecture and progress[J]. Journal of Software, 2011,34(7):1155-1171. |
[10] | WERNKE M , SKVORTSOV P , DüRR F , et al. A classification of location privacy attacks and approaches[J]. Personal and Ubiquitous Computing, 2014,18(1):163-175. |
[11] | MACHANAVAJJHALA A , KIFER D , GEHRKE J , et al. L-diversity:privacy beyond k-anonymity[J]. ACM Transactions on Knowledge Discovery from Data, 2007,1(1):3. |
[12] | CHOW C Y , MOKBEL M F , LIU X . Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments[J]. GeoInformatica, 2011,15(2):351-380. |
[13] | MOKBEL M F . Privacy in location-based services: state-of the-art and research directions[C]// 8th IEEE International Conference on Mobile Data Management (MDM'07). Mannheim, Germany, 2007:228-228. |
[14] | THEODORAKOPOULOS G . The same-origin attack against location privacy[C]// 14th ACM Workshop on Privacy in the Electronic Soci-ety(WPES'15). Denver, United States, 2015:49-53. |
[15] | SHOKRI R , THEODORAKOPOULOS G , BOUDEC J Y LE , et al. Quantifying location privacy[C]// 32nd IEEE Symposium on Security and Privacy(S&P'11). Berkeley, United States, 2011:247-262. |
[16] | LEE B , OH J , YU H , et al. Protecting location privacy using location semantics[C]// 17th ACM international conference on Knowledge dis-covery and data mining(SIGKDD'11). San Diego, United States, 2011:1289-1297. |
[17] | PAN X , XU J , MENG X . Protecting location privacy against loca-tion-dependent attacks in mobile services[J]. IEEE Transactions on Knowledge and Data Engineering, 2012,24(8):1506-1519. |
[18] | 刘海, 李兴华, 王二蒙 , 等. 连续服务请求下基于假位置的用户隐私增强方法[J]. 通信学报, 2016,37(7):140-150. LIU H , LI X H , WANG E M , et al. Privacy enhancing method for dummy based privacy protection with continuous location-based ser-vice queries[J]. Journal on Communications, 2016,37(7):140-150. |
[19] | 潘晓, 郝兴, 孟小峰 . 基于位置服务中的连续查询隐私保护研究[J]. 计算机研究与发展, 2010,47(1):121-129. PAN X , HAO X , MENG X F . Primacy prospering towards continuous query in location-based services[J]. Journal of Computer Research and Development, 2010,47(1):121-129. |
[20] | GRUTESER M , GRUNWALD D . Anonymous usage of loca-tion-based services through spatial and temporal cloaking[C]// 1st ACM International Conference on Mobile Systems, Applications, and Services(MobiSys'03). San Francisco, United States, 2003:31-42. |
[21] | SWEENEY L . k-anonymity: a model for protecting privacy[J]. Inter-national Journal on Uncertainty, Fuzziness and Knowledge-based Sys-tems, 2002,10(5):557-570. |
[22] | CHOW C Y , MOKBEL M F , AREF W G . Casper*: query processing for location services without compromising privacy[J]. ACM Transac-tions on Database Systems, 2009,34(4):1-48. |
[23] | XU T , CAI Y . Feeling-based location privacy protection for loca-tion-based services[C]// 16th ACM Conference on Computer and Communications Security(CCS'09). Chicago, United States, 2009:348-357. |
[24] | GEDIK B , LIU L . Protecting location privacy with personalized k-anonymity: architecture and algorithms[J]. IEEE Transactions on Mobile Computing, 2008,7(1):1-18. |
[25] | GEDIK B , LIU L . Protecting location privacy with personalized k-anonymity: architecture and algorithms[J]. IEEE Transactions on Mobile Computing, 2008,7(1):1-18. |
[26] | 倪巍伟, 马中希, 陈萧 . 面向路网隐私保护连续近邻查询的安全区域构建[J]. 计算机学报, 2016,39(3):628-642. NI W W , MA Z X , CHEN X . Safe region scheme for pri-vacy-preserving continuous recent neighbor query on road networks[J]. Journal of Computers, 2016,39(3):628-642. |
[27] | NIU B , LI Q H , ZHU X Y , et al. A fine-grained spatial cloaking scheme for privacy-aware users in location-based ser-vices[C]// 23rd IEEE International Conference on Computer Communication and Networks (ICCCN'14). Shanghai, China, 2014:1-8. |
[28] | KIDO H , YANGISAWA Y , SATOH T . An anonymous communication technique using dummies for location-based services[C]// 2nd IEEE International Conference on Pervasive Services(ICPS'05). Santorini, Greece, 2005:88-97. |
[29] | LU H , JENSEN C S , YIU M L . Pad: privacy-area aware, dummy-based location privacy in mobile services[C]// 7th ACM International Workshop on Data Engineering for Wireless and Mobile Access( MobiDE'08). Vancouver, Canada, 2008:16-23. |
[30] | NIU B , ZHU X Y , LI Q H , et al. A novel attack to spatial cloaking schemes in location-based services[J]. Future Generation Computer Systems, 2015,49(1):125-132. |
[31] | CHOW C Y , MOKBEL M F , LIU X . A peer-to-peer spatial cloaking algorithm for anonymous location-based services[C]// 14th ACM In-ternational Symposium on Advances in Geographic information Sys-tems(ACM-GIS'06). Arlington, USA, 2006:171-178. |
[32] | CICEK A E , NERGIZ M E , SAYGIN Y . Ensuring location diversity in privacy-preserving spatio-temporal data publishing[J]. The VLDB Journal, 2014,23(4):609-625. |
[33] | ZHANG X , XIA Y , BAE H Y . A novel location privacy preservation method for moving object[J]. International Journal of Security and Its Applications, 2015,9(2):1-12. |
[34] | ZHANG C , HUANG Y . Cloaking locations for anonymous location based services: a hybrid approach[J]. GeoInformatica, 2009,13(2):159-182. |
[35] | BERESFORD A , STAJANO F . Location privacy in pervasive com-puting[J]. IEEE Pervasive Computing, 2003,2(1):46-55. |
[36] | NIU B , LI Q H , ZHU X Y , et al. Achieving k-anonymity in pri-vacy-aware location-based services[C]// 33th IEEE International Con-ference on Computer Communications(INFOCOM'14). Toronto, Canada, 2014:754-762. |
[37] | NIU B , LI Q H , ZHU X Y , et al. Enhancing privacy through caching in location-based services[C]// 34th IEEE International Conference on Computer Communications(INFOCOM'15). Hong Kong, China, 2015:1017-1025. |
[38] | NIU B , ZHU X Y , LI W H , et al. EPcloak: an efficient and pri-vacy-preserving spatial cloaking scheme for LBSs[C]// 11th IEEE In-ternational Conference on Mobile Ad Hoc and Sensor Sys-tems(MASS'14). Philadelphia, United States, 2014:398-406. |
[39] | PALANISAMY B , LIU L . Attack-resilient mix-zones over road net-works: architecture and algorithms[J]. IEEE Transactions on Mobile Computing, 2015,14(3):495-508. |
[40] | 彭长根, 丁红发, 朱义杰 , 等. 隐私保护的信息熵模型及其度量方法[J]. 软件学报, 2016,27(8):1891-1903. PENG C G , DING H F , ZHU Y J , et al. Information entropy models and privacy metrics methods for privacy protection[J]. Journal of Software, 2016,27(8):1891-1903. |
[41] | SHOKRI R , FREUDIGER J , JADLIWALA M , et al. A distor-tion-based metric for location privacy[C]// 8th ACM Workshop on Pri-vacy in the Electronic Society(WPES'09). Chicago, United States, 2009:21-30. |
[42] | DWORK C , LEI J . Differential privacy and robust statistics[C]// 41st Annual ACM Symposium on Theory of Computing(STOC'09). Be-thesda, United States, 2009:371-380. |
[43] | ANDRES M E , BORDENABE N E , CHATZIKOKOLAKIS K , et al. Geo-indistinguishability: differential privacy for location-based sys-tems[C]// 20th ACM Conference on Computer and Communications Security(CCS'13). Berlin, Germany, 2013:901-914. |
[44] | XIAO Y , XIONG L . Protecting locations with differential privacy under temporal correlations[C]// 22nd ACM Conference on Computer and Communications Security(CCS'15). Denver, United States, 2015:1298-1309. |
[45] | IETF. Geographic location/privacy (geopriv)[EB/OL]. . |
[46] | World Wide Web Consortium(W3C). Platform for privacy prefer-ences(P3P) project[EB/OL]. . |
[47] | PAULET R , KAOSAR M G , YI X , et al. Privacy-preserving and con-tent-protecting location based queries[J]. IEEE Transactions on Knowledge and Data Engineering, 2014,26(5):1200-1210. |
[48] | GHINITA G , KALNIS P , KHOSHGOZARAN A , et al. Private queries in location based services: anonymizers are not necessary[C]// 27th ACM Conference on Management of Data(SIGMOD'08). Vancouver, Canada, 2008:121-132. |
[49] | YI X , PAULET R , BERTINO E , et al. Practical approximate k nearest neighbor queries with location and query privacy[J]. IEEE Transac-tions on Knowledge and Data Engineering, 2016,PP(99):1-14. |
[50] | KALNIS P , GHINITA G , MOURATIDIS K , et al. Preventing loca-tion-based identity inference in anonymous spatial queries[J]. IEEE Transactions on Knowledge and Data Engineering, 2007,19(12):1719-1733. |
[51] | NGO H , KIM J . Location privacy via differential private perturbation of cloaking area[C]// 28th IEEE Computer Security Foundations Sym-posium(CSF'15). Verona, Italy, 2015:63-74. |
[52] | YIU M L , JENSEN C S , M?LLER J , et al. Design and analysis of a ranking approach to private location-based services[J]. ACM Transac-tions on Database Systems, 2011,36(2):1-42. |
[53] | PERAZZO P , DINI G . A uniformity-based approach to location pri-vacy[J]. Computer Communications, 2015,64(1):21-32. |
[54] | ARDAGNA C A , CREMONINI M , DE CAPITANI DI VIMERCATI S , et al. An obfuscation-based approach for protecting location pri-vacy[J]. IEEE Transactions on Dependable and Secure Computing, 2011,8(1):13-27. |
[55] | DüRR F , SKVORTSOV P , ROTHERMEL K . Position sharing for location privacy in non-trusted systems[C]// 9th IEEE International Conference on Pervasive Computing and Communica-tions(PerCom'11). Seattle, United States, 2011:189-196. |
[56] | PINGLEY A , YU W , ZHANG N , et al. Cap: a context-aware privacy protection system for location-based services[C]// 29th IEEE Interna-tional Conference on Distributed Computing Systems(ICDCS'09). Montreal, Canada, 2009:49-57. |
[57] | 周长利, 马春光, 杨松涛 . 基于敏感位置多样性的LBS位置隐私保护方法研究[J]. 通信学报, 2015,36(4):14-25. ZHOU C L , MA C G , YANG S T . Research of LBS privacy preserving based on sensitive location diversity[J]. Journal on Communications, 2015,36(4):14-25. |
[58] | SHOKRI R , THEODORAKOPOULOS G , TRONCOSO C , et al. Protecting location privacy: optimal strategy against localization at-tacks[C]// 19th ACM Conference on Computer and Communications Security(CCS'12). Raleigh, United States, 2012:617-627. |
[59] | BORDENABE N E , CHATZIKOKOLAKIS K , PALAMIDESSI C . Optimal geo-indistinguishable mechanisms for location privacy[C]// 21st ACM Conference on Computer and Communications Secu-rity(CCS'14). Scottsdale, United States, 2014:251-262. |
[60] | 倪巍伟, 陈萧, 马中希 . 支持偏好调控的路网隐私保护k近邻查询方法[J]. 计算机学报, 2015,38(4):884-896. NI W W , CHENG X , MA Z X . Location privacy preserving k-nearest neighbor query method on road network in presence of user's prefer-ence[J]. Chinese Journal of Computers, 2015,38(4):884-896. |
[61] | PINGLEY A , ZHANG N , FU X , et al. Protection of query privacy for continuous location based services[C]// 30th IEEE International Con-ference on Computer Communications (INFOCOM'11). Shanghai, China, 2011:1710-1718. |
[62] | MA C Y T , YAU D K Y , YIP N K , et al. Privacy vulnerability of pub-lished anonymous mobility traces[J]. IEEE Transactions on Network-ing, 2013,21(3):720-733. |
[63] | LIU X , LIU K , GUO L , et al. A game-theoretic approach for achieving k-anonymity in location based services[C]// 32nd IEEE International Conference on Computer Communications(INFOCOM'13). Turin, It-aly, 2013:2985-2993. |
[64] | MANWEILER J , SCUDELLARI R , COX L P . Smile: encounter-based trust for mobile social services[C]// 16th ACM Conference on Com-puter and Communications Security(CCS'09). Chicago, United States, 2009:246-255. |
[65] | SHOKRI R , THEODORAKOPOULOS G , PAPADIMITRATOS P , et al. Hiding in the mobile crowd: location privacy through collaboration[J]. IEEE Transactions on Dependable and Secure Computing, 2014,11(3):266-279. |
[66] | 黄毅, 霍峥, 孟小峰 . CoPrivacy:一种用户协作无匿名区域的位置隐私保护方法[J]. 计算机学报, 2011,34(10):1976-1985. HUANG Y , HUO Z , MENG X F . CoPrivacy: a collaborative cocation privacy-preserving method without clocking region[J]. Chinese Jour-nal of Computers, 2011,34(10):1976-1985. |
[67] | 李凤华, 李晖, 贾焰 , 等. 隐私计算研究范畴及发展趋势[J]. 通信学报, 2016,37(4):1-11. LI F H , LI H , JIA Y , et al. Privacy computing: concept, connotation and its research trend[J]. Journal on Communications, 2016,37(4):1-11. |
[1] | 马鑫迪, 李清华, 姜奇, 马卓, 高胜, 田有亮, 马建峰. 面向Non-IID数据的拜占庭鲁棒联邦学习[J]. 通信学报, 2023, 44(6): 138-153. |
[2] | 冯涛, 陈李秋, 方君丽, 石建明. 基于本地化差分隐私和属性基可搜索加密的区块链数据共享方案[J]. 通信学报, 2023, 44(5): 224-233. |
[3] | 夏莹杰, 朱思雨, 刘雪娇. 区块链架构下具有条件隐私的车辆编队跨信任域高效群组认证研究[J]. 通信学报, 2023, 44(4): 111-123. |
[4] | 胡柏吉, 张晓娟, 李元诚, 赖荣鑫. 支持多功能的V2G网络隐私保护数据聚合方案[J]. 通信学报, 2023, 44(4): 187-200. |
[5] | 徐明, 张保俊, 伍益明, 应晨铎, 郑宁. 面向网络攻击和隐私保护的多智能体系统分布式共识算法[J]. 通信学报, 2023, 44(3): 117-127. |
[6] | 余晟兴, 陈钟. 基于同态加密的高效安全联邦学习聚合框架[J]. 通信学报, 2023, 44(1): 14-28. |
[7] | 张学旺, 黎志鸿, 林金朝. 基于公平盲签名和分级加密的联盟链隐私保护方案[J]. 通信学报, 2022, 43(8): 131-141. |
[8] | 王继锋, 王国峰. 边缘计算模式下密文搜索与共享技术研究[J]. 通信学报, 2022, 43(4): 227-238. |
[9] | 封化民, 史瑞, 袁峰, 李艳俊, 杨旸. 高效的强隐私保护和可转让的属性票据方案[J]. 通信学报, 2022, 43(3): 63-75. |
[10] | 于海宁, 张宏莉, 余翔湛, 曲家兴, 葛蒙蒙. 隐私保护的轨迹相似度计算方法[J]. 通信学报, 2022, 43(11): 1-13. |
[11] | 彭滔, 钟文韬, 王国军, 罗恩韬, 熊金波, 刘忆宁, Hao Wang. 移动社交网络中面向隐私保护的精确好友匹配[J]. 通信学报, 2022, 43(11): 90-103. |
[12] | 史瑞, 封化民, 谢惠琴, 史国振, 刘飚, 杨旸. 基于带智能卡的移动终端实现的隐私保护的属性票据方案[J]. 通信学报, 2022, 43(10): 26-41. |
[13] | 熊金波, 周永洁, 毕仁万, 万良, 田有亮. 边缘协同的轻量级隐私保护分类框架[J]. 通信学报, 2022, 43(1): 127-137. |
[14] | 晏燕, 丛一鸣, Adnan Mahmood, 盛权政. 基于深度学习的位置大数据统计发布与隐私保护方法[J]. 通信学报, 2022, 43(1): 203-216. |
[15] | 马立川, 彭佳怡, 裴庆祺, 朱浩瑾. 高效的决策树隐私分类服务协议[J]. 通信学报, 2021, 42(8): 80-89. |
阅读次数 | ||||||
全文 |
|
|||||
摘要 |
|
|||||
|