通信学报 ›› 2015, Vol. 36 ›› Issue (12): 114-123.doi: 10.11959/j.issn.1000-436x.2015320

• 隐私保护 • 上一篇    下一篇

高效的轨迹隐私保护方案

李凤华1,张翠1,牛犇1,李晖2,华佳烽2,史国振3   

  1. 1 中国科学院 信息工程研究所 信息安全国家重点实验室,北京 100195
    2 西安电子科技大学 综合业务网理论及关键技术国家重点实验室,陕西 西安 710071
    3 北京电子科技学院 信息安全系,北京 100070
  • 出版日期:2015-12-25 发布日期:2017-07-17
  • 基金资助:
    国家自然科学基金—广东联合基金资助项目;国家高技术研究发展计划(“863”计划)基金资助项目;教育部重点基金资助项目

Efficient scheme for user's trajectory privacy

Feng-hua LI1,Cui ZHANG1,Ben NIU1,Hui LI2,Jia-feng HUA2,Guo-zhen SHI3   

  1. 1 State Key Laboratory of Information Security,Institute of Information Engineering,Chinese Academy of Sciences,Beijing 100195,China
    2 State Key Laboratory of Integrated Services Networks,Xidian University,Xi’an 710071,China
    3 Department of Information Security,Beijing Electronic Science and Technology Institute,Beijing 100070,China
  • Online:2015-12-25 Published:2017-07-17
  • Supported by:
    The National Natural Science Foundation of China—Guangdong Union Foundation;The National High Technology Research and Development Program of China (863 Program);The Key Program of Scientific and Technology Research of Ministry of Education

摘要:

作为基于位置服务中的一种重要信息,智能终端用户的轨迹隐私保护问题日益受到广大研究者的重视。为解决这一问题,综合考虑了用户所处区域的背景信息、用户行动模式和轨迹相似性等特征,构建了(k?1)条难以被拥有背景信息的敌手所区分的虚假轨迹,从而为移动用户提供k-匿名级别的轨迹隐私保护。相对于现有技术,该方案不依赖于任何可信第三方,能够在保证虚假轨迹与真实轨迹相似性的基础上有效抵御拥有背景信息的敌手的攻击。实验结果表明了方案的有效性和高效性。

关键词: 无线网络安全, 基于位置服务, 位置隐私, 轨迹隐私

Abstract:

As one of the most important information in location-based services (LBS),the trajectory privacy for smart devices users has gained increasingly popularity over recent years.To address this problem,(k?1) dummy trajectories to achieve trajectory k-anonymity with comprehensively considering side information were generated,user's mobility pattern and the trajectory similarity etc.Without relying on the trusted third party,the scheme could provide trajectory k-anonymity against adversaries with side information by generating (k?1) realistic dummy trajectories.The evaluation results indicate its effectiveness and efficiency.

Key words: wireless network security, location-based services, location privacy, trajectory privacy

No Suggested Reading articles found!