通信学报 ›› 2019, Vol. 40 ›› Issue (12): 51-59.doi: 10.11959/j.issn.1000-436x.2019235
修回日期:
2019-10-08
出版日期:
2019-12-25
发布日期:
2020-01-16
作者简介:
张文静(1988- ),女,黑龙江绥化人,西安电子科技大学博士生,主要研究方向为数据隐私和隐私度量|刘樵(1989- ),男,陕西咸阳人,博士,西安电子科技大学讲师,主要研究方向为物理层安全|朱辉(1981- ),男,河南周口人,博士,西安电子科技大学教授、博士生导师,主要研究方向为数据安全与隐私保护、安全方案及协议设计、网络及应用安全
基金资助:
Wenjing ZHANG,Qiao LIU(),Hui ZHU
Revised:
2019-10-08
Online:
2019-12-25
Published:
2020-01-16
Supported by:
摘要:
针对位置数据拥有者对数据使用者具有不同的信任程度时,会对使用者进行不同等级的划分并向其发布不同扰动程度的位置数据这一场景中的隐私泄露问题,提出了基于信息论中的互信息的隐私度量方法与保护问题。此外,基于互信息提出了度量攻击者获取不同等级的扰动数据而对真实位置数据进行更精确的推断分析所造成的隐私泄露的方法。借鉴用于求解率失真函数的Blahut-Arimoto算法提出了多等级位置隐私保护机制。实验结果表明,在上述2种问题场景中,所提位置隐私保护机制与基于差分隐私的位置隐私保护方法相比具有更低的隐私泄露,且当真实位置数据具有显著不同的受欢迎程度时,优势更明显。
中图分类号:
张文静,刘樵,朱辉. 基于信息论方法的多等级位置隐私度量与保护[J]. 通信学报, 2019, 40(12): 51-59.
Wenjing ZHANG,Qiao LIU,Hui ZHU. Evaluation and protection of multi-level location privacy based on an information theoretic approach[J]. Journal on Communications, 2019, 40(12): 51-59.
[1] | KIDO H , YANAGISAWA Y , SATOH T . Protection of location privacy using dummies for location based services[C]// 21st International Conference on Data Engineering Workshops. 2005: 1248-1248. |
[2] | AHAMED S I , HAQUE M M , HASAN C S . A novel location privacy framework without trusted third party based on location anonymity prediction[J]. ACM SIGAPP Applied Computing Review, 2012,12(1): 24-34. |
[3] | BAMBA B , LIU L , PESTI P ,et al. Supporting anonymous location queries in mobile environments with privacygrid[C]// The 17th International Conference on World Wide Web. 2008: 237-246. |
[4] | CHENG R , ZHANG Y , BERTINO E ,et al. Preserving user location privacy in mobile data management infrastructures[C]// International Workshop on Privacy Enhancing Technologies. 2006: 393-412. |
[5] | GEDIK B , LIU L . A customizable k-anonymity model for protecting location privacy[R]. Georgia Institute of Technology, 2004. |
[6] | GHINITA G , KALNIS P , SKIADOPOULOS S . PRIVE:anonymous location-based queries in distributed mobile systems[C]// The 16th International Conference on World Wide Web. 2007: 371-380. |
[7] | KALNIS P , GHINITA G , MOURATIDIS K ,et al. Preventing location-based identity inference in anonymous spatial queries[J]. IEEE Transactions on Knowledge and Data Engineering, 2007,19(12): 1719-1733. |
[8] | MOKBEL M F , CHOW C Y , AREF W G . The new casper:query processing for location services without compromising privacy[C]// The 32nd International Conference on Very Large Data Bases. 2006: 763-774. |
[9] | ANDR?S M E , BORDENABE N E , CHATZIKOKOLAKIS K ,et al. Geo-indistinguishability:differential privacy for location-based systems[C]// ACM Conference on Computer and Communications Security. ACM, 2013. |
[10] | BORDENABE N E , CHATZIKOKOLAKIS K , PALAMIDESSI C . Optimal geo-indistinguishable mechanisms for location privacy[C]// The 2014 ACM SIGSAC Conference on Computer and Communications Security. 2014: 251-262. |
[11] | SWEENEY L . k-anonymity:a model for protecting privacy[J]. International Journal of Uncertainty,Fuzziness and Knowledge-Based Systems, 2002,10(5): 557-570. |
[12] | GRUTESER M , GRUNWALD D . Anonymous usage of location-based services through spatial and temporal cloaking[C]// The 1st International Conference on Mobile systems,Applications and Services. 2003: 31-42. |
[13] | XIAO Z , MENG X , XU J . Quality aware privacy protection for location-based services[C]// International Conference on Database Systems for Advanced Applications. 2007: 434-446. |
[14] | LI C , PALANISAMY B . ReverseCloak:Protecting multi-level location privacy over road networks[C]// The 24th ACM International on Conference on Information and Knowledge Management. 2015: 673-682. |
[15] | SANKAR L , RAJAGOPALAN S R , POOR H V . Utility-privacy tradeoffs in databases:an information-theoretic approach[J]. IEEE Transactions on Information Forensics and Security, 2013,8(6): 838-852. |
[16] | CALMON F D P , FAWAZ N . Privacy against statistical inference[C]// The 50th Annual Allerton Conference on Communication,Control,and Computing. 2012: 1401-1408. |
[17] | OYA S , TRONCOSO C , P?REZ-GONZ?LEZ F . Back to the drawing board:revisiting the design of optimal location privacy-preserving mechanisms[C]// The 2017 ACM SIGSAC Conference on Computer and Communications Security. 2017: 1959-1972. |
[18] | COVER T M , THOMAS J A . Elements of Information Theory[M]. New Jersey: John Wiley & SonsPress, 2012. |
[19] | CSISZ I,TUSN?DY G . Information geometry and alternating minimization procedures[J]. Statistics and Decisions, 1984(1): 205-237. |
[20] | BLAHUT R . Computation of channel capacity and rate-distortion functions[J]. IEEE Transactions on Information Theory, 1972,18(4): 460-473. |
[21] | ANDR?S M E , BORDENABE N E , CHATZIKOKOLAKIS K ,et al. Geo-indistinguishability:differential privacy for location-based systems[C]// The 20th ACM conference on Computer and Communications Security. 2013: 901-914. |
[1] | 李竟博, 马礼, 李阳, 傅颖勋, 马东超. 感传算协同工业互联网优化设计[J]. 通信学报, 2023, 44(6): 12-22. |
[2] | 赵仕祺, 黄小红, 钟志港. 基于信誉的域间路由选择机制的研究与实现[J]. 通信学报, 2023, 44(6): 47-56. |
[3] | 陈真, 陈文辉, 刘啸威, 尤殿龙, 刘林林, 申利民. 功能互补关系增强的云API推荐方法[J]. 通信学报, 2023, 44(6): 125-137. |
[4] | 魏德宾, 潘成胜, 杨力, 颜佐任. 基于网络流量水平等级预测的自适应随机早期检测算法[J]. 通信学报, 2023, 44(6): 154-166. |
[5] | 李元诚, 秦永泰. 基于深度强化学习的软件定义安全中台QoS实时优化算法[J]. 通信学报, 2023, 44(5): 181-192. |
[6] | 夏莹杰, 朱思雨, 刘雪娇. 区块链架构下具有条件隐私的车辆编队跨信任域高效群组认证研究[J]. 通信学报, 2023, 44(4): 111-123. |
[7] | 谢人超, 文雯, 唐琴琴, 刘云龙, 谢高畅, 黄韬. 轨道交通移动边缘计算网络安全综述[J]. 通信学报, 2023, 44(4): 201-215. |
[8] | 罗智勇, 张玉, 王青, 宋伟伟. 基于贝叶斯攻击图的SDN入侵意图识别算法的研究[J]. 通信学报, 2023, 44(4): 216-225. |
[9] | 王一丰, 郭渊博, 陈庆礼, 方晨, 林韧昊, 周永良, 马佳利. 基于对比增量学习的细粒度恶意流量分类方法[J]. 通信学报, 2023, 44(3): 1-11. |
[10] | 张进, 葛强, 徐伟海, 江逸茗, 马海龙, 于洪涛. 拟态路由器BGP代理的设计实现与形式化验证[J]. 通信学报, 2023, 44(3): 33-44. |
[11] | 经普杰, 王良民, 董学文, 张玉书, 王骞, Muhammad Sohail. 分层跨链结构:一种面向区块链系统监管的可行架构[J]. 通信学报, 2023, 44(3): 93-104. |
[12] | 舒坚, 史佳伟, 刘琳岚, Manar Al-Kali. 基于时空卷积的机会网络拓扑预测[J]. 通信学报, 2023, 44(3): 145-156. |
[13] | 王东滨, 吴东哲, 智慧, 郭昆, 张勖, 时金桥, 张宇, 陆月明. 软件定义网络抗拒绝服务攻击的流表溢出防护[J]. 通信学报, 2023, 44(2): 1-11. |
[14] | 康海燕, 龙墨澜. 基于吸收马尔可夫链攻击图的网络攻击分析方法研究[J]. 通信学报, 2023, 44(2): 122-135. |
[15] | 张云涛, 方滨兴, 杜春来, 王忠儒, 崔志坚, 宋首友. 基于异构观测链的容器逃逸检测方法[J]. 通信学报, 2023, 44(1): 49-63. |
阅读次数 | ||||||
全文 |
|
|||||
摘要 |
|
|||||
|