通信学报 ›› 2019, Vol. 40 ›› Issue (12): 51-59.doi: 10.11959/j.issn.1000-436x.2019235
修回日期:
2019-10-08
出版日期:
2019-12-25
发布日期:
2020-01-16
作者简介:
张文静(1988- ),女,黑龙江绥化人,西安电子科技大学博士生,主要研究方向为数据隐私和隐私度量|刘樵(1989- ),男,陕西咸阳人,博士,西安电子科技大学讲师,主要研究方向为物理层安全|朱辉(1981- ),男,河南周口人,博士,西安电子科技大学教授、博士生导师,主要研究方向为数据安全与隐私保护、安全方案及协议设计、网络及应用安全
基金资助:
Wenjing ZHANG,Qiao LIU(),Hui ZHU
Revised:
2019-10-08
Online:
2019-12-25
Published:
2020-01-16
Supported by:
摘要:
针对位置数据拥有者对数据使用者具有不同的信任程度时,会对使用者进行不同等级的划分并向其发布不同扰动程度的位置数据这一场景中的隐私泄露问题,提出了基于信息论中的互信息的隐私度量方法与保护问题。此外,基于互信息提出了度量攻击者获取不同等级的扰动数据而对真实位置数据进行更精确的推断分析所造成的隐私泄露的方法。借鉴用于求解率失真函数的Blahut-Arimoto算法提出了多等级位置隐私保护机制。实验结果表明,在上述2种问题场景中,所提位置隐私保护机制与基于差分隐私的位置隐私保护方法相比具有更低的隐私泄露,且当真实位置数据具有显著不同的受欢迎程度时,优势更明显。
中图分类号:
张文静,刘樵,朱辉. 基于信息论方法的多等级位置隐私度量与保护[J]. 通信学报, 2019, 40(12): 51-59.
Wenjing ZHANG,Qiao LIU,Hui ZHU. Evaluation and protection of multi-level location privacy based on an information theoretic approach[J]. Journal on Communications, 2019, 40(12): 51-59.
[1] | KIDO H , YANAGISAWA Y , SATOH T . Protection of location privacy using dummies for location based services[C]// 21st International Conference on Data Engineering Workshops. 2005: 1248-1248. |
[2] | AHAMED S I , HAQUE M M , HASAN C S . A novel location privacy framework without trusted third party based on location anonymity prediction[J]. ACM SIGAPP Applied Computing Review, 2012,12(1): 24-34. |
[3] | BAMBA B , LIU L , PESTI P ,et al. Supporting anonymous location queries in mobile environments with privacygrid[C]// The 17th International Conference on World Wide Web. 2008: 237-246. |
[4] | CHENG R , ZHANG Y , BERTINO E ,et al. Preserving user location privacy in mobile data management infrastructures[C]// International Workshop on Privacy Enhancing Technologies. 2006: 393-412. |
[5] | GEDIK B , LIU L . A customizable k-anonymity model for protecting location privacy[R]. Georgia Institute of Technology, 2004. |
[6] | GHINITA G , KALNIS P , SKIADOPOULOS S . PRIVE:anonymous location-based queries in distributed mobile systems[C]// The 16th International Conference on World Wide Web. 2007: 371-380. |
[7] | KALNIS P , GHINITA G , MOURATIDIS K ,et al. Preventing location-based identity inference in anonymous spatial queries[J]. IEEE Transactions on Knowledge and Data Engineering, 2007,19(12): 1719-1733. |
[8] | MOKBEL M F , CHOW C Y , AREF W G . The new casper:query processing for location services without compromising privacy[C]// The 32nd International Conference on Very Large Data Bases. 2006: 763-774. |
[9] | ANDR?S M E , BORDENABE N E , CHATZIKOKOLAKIS K ,et al. Geo-indistinguishability:differential privacy for location-based systems[C]// ACM Conference on Computer and Communications Security. ACM, 2013. |
[10] | BORDENABE N E , CHATZIKOKOLAKIS K , PALAMIDESSI C . Optimal geo-indistinguishable mechanisms for location privacy[C]// The 2014 ACM SIGSAC Conference on Computer and Communications Security. 2014: 251-262. |
[11] | SWEENEY L . k-anonymity:a model for protecting privacy[J]. International Journal of Uncertainty,Fuzziness and Knowledge-Based Systems, 2002,10(5): 557-570. |
[12] | GRUTESER M , GRUNWALD D . Anonymous usage of location-based services through spatial and temporal cloaking[C]// The 1st International Conference on Mobile systems,Applications and Services. 2003: 31-42. |
[13] | XIAO Z , MENG X , XU J . Quality aware privacy protection for location-based services[C]// International Conference on Database Systems for Advanced Applications. 2007: 434-446. |
[14] | LI C , PALANISAMY B . ReverseCloak:Protecting multi-level location privacy over road networks[C]// The 24th ACM International on Conference on Information and Knowledge Management. 2015: 673-682. |
[15] | SANKAR L , RAJAGOPALAN S R , POOR H V . Utility-privacy tradeoffs in databases:an information-theoretic approach[J]. IEEE Transactions on Information Forensics and Security, 2013,8(6): 838-852. |
[16] | CALMON F D P , FAWAZ N . Privacy against statistical inference[C]// The 50th Annual Allerton Conference on Communication,Control,and Computing. 2012: 1401-1408. |
[17] | OYA S , TRONCOSO C , P?REZ-GONZ?LEZ F . Back to the drawing board:revisiting the design of optimal location privacy-preserving mechanisms[C]// The 2017 ACM SIGSAC Conference on Computer and Communications Security. 2017: 1959-1972. |
[18] | COVER T M , THOMAS J A . Elements of Information Theory[M]. New Jersey: John Wiley & SonsPress, 2012. |
[19] | CSISZ I,TUSN?DY G . Information geometry and alternating minimization procedures[J]. Statistics and Decisions, 1984(1): 205-237. |
[20] | BLAHUT R . Computation of channel capacity and rate-distortion functions[J]. IEEE Transactions on Information Theory, 1972,18(4): 460-473. |
[21] | ANDR?S M E , BORDENABE N E , CHATZIKOKOLAKIS K ,et al. Geo-indistinguishability:differential privacy for location-based systems[C]// The 20th ACM conference on Computer and Communications Security. 2013: 901-914. |
[1] | 朱思峰, 蔡江昊, 柴争义, 孙恩林. 车联网云边协同计算场景下的多目标优化卸载决策[J]. 通信学报, 2022, 43(6): 223-234. |
[2] | 兰巨龙, 朱棣, 李丹. 面向多模态网络业务切片的虚拟网络功能资源容量智能预测方法[J]. 通信学报, 2022, 43(6): 143-155. |
[3] | 尹长川, 李妍珏, 朱海龙, 何欣欣, 韩文璇. HSTC:TSN中的混合流量调度机制[J]. 通信学报, 2022, 43(6): 119-132. |
[4] | 燕昺昊, 刘勤让, 沈剑良, 汤先拓, 梁栋. 软件定义网络中一种快速无循环路径迁移策略[J]. 通信学报, 2022, 43(5): 24-35. |
[5] | 李翠然, 王雪洁, 谢健骊, 吕安琪. 基于改进PSO的铁路监测线性无线传感器网络路由算法[J]. 通信学报, 2022, 43(5): 155-165. |
[6] | 王劲林, 井丽南, 陈晓, 尤佳莉. 面向多模态网络的可编程数据处理方法及系统设计[J]. 通信学报, 2022, 43(4): 14-25. |
[7] | 罗洪斌, 张珊, 王志远. 共生网络——异构网络安全高效互联的体系结构与机理[J]. 通信学报, 2022, 43(4): 36-49. |
[8] | 莫梓嘉, 高志鹏, 杨杨, 林怡静, 孙山, 赵晨. 面向车联网数据隐私保护的高效分布式模型共享策略[J]. 通信学报, 2022, 43(4): 83-94. |
[9] | 赵增华, 童跃凡, 崔佳洋. 基于域自适应的Wi-Fi指纹设备无关室内定位模型[J]. 通信学报, 2022, 43(4): 143-153. |
[10] | 李凤华, 李超洋, 郭超, 李子孚, 房梁, 郭云川. 泛在网络环境下隐蔽通道关键技术研究综述[J]. 通信学报, 2022, 43(4): 186-201. |
[11] | 言洪萍, 周强, 王世豪, 姚旺, 何刘坤, 王良民. 基于SDN的实际网络流中Tor网页复合特征提取方法[J]. 通信学报, 2022, 43(3): 76-87. |
[12] | 吴平, 常朝稳, 左志斌, 马莹莹. 基于地址重载的SDN分组转发验证[J]. 通信学报, 2022, 43(3): 88-100. |
[13] | 贾洪勇, 潘云飞, 刘文贺, 曾俊杰, 张建辉. 基于高阶异构度的执行体动态调度算法[J]. 通信学报, 2022, 43(3): 233-245. |
[14] | 李冲, 杜秀娟, 王丽娟, 田晓静. 基于规则与感知的水声网络MAC协议[J]. 通信学报, 2022, 43(2): 65-75. |
[15] | 杨宏宇, 袁海航, 张良. 基于攻击图的主机安全评估方法[J]. 通信学报, 2022, 43(2): 89-99. |
阅读次数 | ||||||
全文 |
|
|||||
摘要 |
|
|||||
|