Journal on Communications ›› 2019, Vol. 40 ›› Issue (4): 83-94.doi: 10.11959/j.issn.1000-436x.2019077
• Papers • Previous Articles Next Articles
Bin WANG1,2,Lei ZHANG2(),Guoyin ZHANG1
Revised:
2019-02-04
Online:
2019-04-25
Published:
2019-05-05
Supported by:
CLC Number:
Bin WANG,Lei ZHANG,Guoyin ZHANG. Attribute generalization mix-zone based on multiple secure computation[J]. Journal on Communications, 2019, 40(4): 83-94.
"
算法 | 用户数量为5 | 用户数量为10 | 用户数量为15 | 用户数量为20 | 用户数量为25 | 用户数量为30 |
等待忍耐mix-zone | 2.089 7 | 2.989 7 | 3.516 2 | 3.889 7 | 4.179 5 | 4.416 2 |
偏移mix-zone | 2.136 2 | 3.056 2 | 3.594 3 | 3.976 2 | 4.272 3 | 4.514 3 |
多维mix-zone | 2.275 5 | 3.255 5 | 3.828 8 | 4.235 5 | 4.551 0 | 4.808 8 |
加密mix-zone | 2.205 8 | 3.155 8 | 3.711 5 | 4.105 8 | 4.411 7 | 4.661 5 |
AG mix-zone | 2.321 9 | 3.321 9 | 3.906 9 | 4.321 9 | 4.643 9 | 4.906 9 |
"
算法 | 用户数量为5 | 用户数量为10 | 用户数量为15 | 用户数量为20 | 用户数量为25 | 用户数量为30 |
等待忍耐mix-zone | 0.244 5 | 0.133 1 | 0.084 4 | 0.067 0 | 0.053 9 | 0.050 3 |
偏移mix-zone | 0.253 9 | 0.153 5 | 0.110 3 | 0.086 5 | 0.073 1 | 0.063 0 |
多维mix-zone | 0.365 6 | 0.237 1 | 0.184 0 | 0.153 7 | 0.133 7 | 0.119 3 |
加密mix-zone | 0.446 2 | 0.311 2 | 0.257 4 | 0.223 6 | 0.199 6 | 0.182 6 |
AG mix-zone | 1.000 | 1.000 | 1.000 | 1.000 | 1.000 | 1.000 |
"
算法 | 用户数量为5 | 用户数量为10 | 用户数量为15 | 用户数量为20 | 用户数量为25 | 用户数量为30 |
等待忍耐mix-zone | 0.395 3 | 0.399 1 | 0.399 6 | 0.399 8 | 0.3998 | 0.399 9 |
偏移mix-zone | 0.379 2 | 0.392 1 | 0.395 5 | 0.397 0 | 0.3978 | 0.398 3 |
多维mix-zone | 0.371 0 | 0.387 4 | 0.392 2 | 0.394 5 | 0.3958 | 0.396 6 |
加密mix-zone | 0.315 8 | 0.381 2 | 0.511 3 | 0.551 2 | 0.5874 | 0.617 1 |
AG mix-zone | 0.339 3 | 0.478 1 | 0.541 8 | 0.586 1 | 0.720 6 | 0.741 1 |
"
算法 | 用户数量为5 | 用户数量为10 | 用户数量为15 | 用户数量为20 | 用户数量为25 | 用户数量为30 |
等待忍耐mix-zone | 87.87% | 81.97% | 76.62% | 70.33% | 64.36% | 52.78% |
偏移mix-zone | 88.19% | 83.68% | 81.85% | 78.00% | 71.78% | 64.39% |
多维mix-zone | 88.88% | 86.84% | 84.19% | 81.05% | 82.50% | 78.56% |
加密mix-zone | 88.69% | 86.00% | 82.33% | 82.88% | 77.73% | 76.91% |
AG mix-zone | 89.30% | 88.31% | 87.42% | 86.33% | 85.20% | 83.98% |
[18] | ZHANG L . OTIBAAGKA:a new security tool for cryptographic mix-zone establishment in vehicular Ad Hoc networks[J]. IEEE Transactions on Information Forensics and Security, 2017,12(12): 2998-3010. |
[19] | 张磊, 马春光, 杨松涛 ,等. 基于轮廓泛化的位置隐私保护模型及方法[J]. 系统工程与电子技术, 2016,38(12): 2894-2900. |
ZHANG L , MA C G , YANG S T ,et al. Location privacy protection model and algorithm based on profiles generalization[J]. Systems Engineering and Electronics, 2016,38(12): 2894-2900. | |
[20] | 张磊, 马春光, 杨松涛 ,等. 基于属性基加密的用户协作连续查询限私保护策略[J]. 通信学报, 2017,38(9): 76-85. |
ZHANG L , MA C G , YANG S T ,et al. CP-ABE based users collaborative privacy protection scheme for continuous query[J]. Journal on Communications, 2017,38(9): 76-85. | |
[21] | ZHANG L , YANG S , LI J ,et al. A particle swarm optimization clustering-based attribute generalization privacy protection scheme[J]. Journal of Circuits,Systems and Computers, 2018,27(11): 171-121. |
[1] | GRUTESER M , GRUNWALD D . Anonymous usage of location-based services through spatial and temporal cloaking[C]// International Conference on Mobile Systems,Applications and Services. ACM, 2003: 31-42. |
[2] | GEDIK B , LING L . Location privacy in mobile systems:a personalized anonymization model[C]// International Conference on Distributed Computing Systems. IEEE, 2005: 620-629. |
[22] | DARGAHI T , AMBROSIN M , CONTI M ,et al. ABAKA:a novel attribute-based k-anonymous collaborative solution for LBSs[J]. Computer Communications, 2016,85(2016): 1-13. |
[23] | 汤全有, 马传贵, 光焱 . 基于全同态加密的秘密数据比较方案[J]. 信息工程大学学报, 2012,13(6): 654-657. |
[3] | BAMBA B , LIU L , PESTI P ,et al. Supporting anonymous location queries in mobile environments with privacygrid[C]// International Conference on World Wide Web. ACM, 2008: 237-246. |
[4] | FUYU L , HUA K A , YING C . Query l-diversity in location-based services[C]// International Conference on Mobile Data Management:Systems,Services and Middleware. ACM, 2009: 436-442. |
[5] | NIU B , ZHU X Y , LI Q H ,et al. A novel attack to spatial cloaking schemes in location-based services[J]. Future Generation Computer Systems-the International Journal of Grid Computing and Escience, 2015,49(2015): 125-132. |
[6] | FEI F , LI S , DAI H ,et al. A K-anonymity based schema for location privacy preservation[J]. 2017,P(99):1. |
[7] | SUN Y M , CHEN M , HU L ,et al. ASA:against statistical attacks for privacy-aware users in Location Based Service[J]. Future Generation Computer Systems-the International Journal of Escience, 2017,70: 48-58. |
[8] | YE A Y , LI Y , XU L . A novel location privacy-preserving scheme based on l-queries for continuous LBS[J]. Computer Communications, 2017,2017(98): 1-10. |
[23] | TANG Q Y , MA C G , GUANG Y . Comparing private numbers based on fully homomorphic encryption[J]. Journal of Information Engineering University, 2012,13(6): 654-663. |
[24] | WANG X F , MU Y , CHEN R M . One-round privacy-preserving meeting location determination for smartphone applications[J]. IEEE Transactions on Information Forensics and Security, 2016,11(8): 1723-1732. |
[9] | PENG T , LIU Q , MENG D C ,et al. Collaborative trajectory privacy preserving scheme in location-based services[J]. Information Sciences, 2017,387: 165-179. |
[10] | WANG Y , XIA Y , HOU J ,et al. A fast privacy-preserving framework for continuous location-based queries in road networks[J]. Journal of Network and Computer Applications, 2015,53(2015): 57-73. |
[25] | PALANISAMY B , LIU L , LEE K ,et al. Anonymizing continuous queries with delay-tolerant mix-zones over road networks[J]. Distributed and Parallel Databases, 2014,32(1): 91-118. |
[26] | PALANISAMY B , LIU L . Attack-resilient mix-zones over road networks:architecture and algorithms[J]. IEEE Transactions on Mobile Computing, 2015,14(3): 495-508. |
[11] | ZEBERGA K , JIN R , CHO H J ,et al. A safe-region approach to a moving k-RNN queries in a directed road network[J]. Journal of Circuits Systems and Computers, 2017,26(5): 1-18. |
[12] | SEPAHKAR M , KHAYYAMBASHI M . A novel collaborative approach for location prediction in mobile networks[J]. Wireless Networks, 2018,24(1): 283-294. |
[13] | YING B , MAKRAKIS D , MOUFTAH H T . Dynamic mix-zone for location privacy in vehicular networks[J]. IEEE Communications Letters, 2013,17(8): 1524-1527. |
[14] | PALANISAMY B , RAVICHANDRAN S , LIU L ,et al. Road network mix-zones for anonymous location based services[C]// International Conference on Data Engineering. IEEE, 2013: 1300-1303. |
[15] | PALANISAMY B , LIU L . Effective mix-zone anonymization techniques for mobile travelers[J]. Geoinformatica, 2014,18(1): 135-164. |
[16] | KANG J W , YU R , HUANG X M ,et al. Location privacy attacks and defenses in cloud-enabled internet of vehicles[J]. IEEE Wireless Communications, 2016,23(5): 52-59. |
[17] | ARAIN Q A , DENG Z L , MEMON I ,et al. Privacy preserving dynamic pseudonym-based multiple mix-zones authentication protocol over road networks[J]. Wireless Personal Communications, 2017,95(2): 505-521. |
[1] | Xindi MA, Qinghua LI, Qi JIANG, Zhuo MA, Sheng GAO, Youliang TIAN, Jianfeng MA. Byzantine-robust federated learning over Non-IID data [J]. Journal on Communications, 2023, 44(6): 138-153. |
[2] | Tao FENG, Liqiu CHEN, Junli FANG, Jianming SHI. Blockchain data sharing scheme based on localized difference privacy and attribute-based searchable encryption [J]. Journal on Communications, 2023, 44(5): 224-233. |
[3] | Baiji HU, Xiaojuan ZHANG, Yuancheng LI, Rongxin LAI. Multi-function supported privacy protection data aggregation scheme for V2G network [J]. Journal on Communications, 2023, 44(4): 187-200. |
[4] | Ming XU, Baojun ZHANG, Yiming WU, Chenduo YING, Ning ZHENG. Cyber attacks and privacy protection distributed consensus algorithm for multi-agent systems [J]. Journal on Communications, 2023, 44(3): 117-127. |
[5] | Shengxing YU, Zhong CHEN. Efficient secure federated learning aggregation framework based on homomorphic encryption [J]. Journal on Communications, 2023, 44(1): 14-28. |
[6] | Yatao YANG, Deli LIU, Peihe LIU, Ping ZENG, Song XIAO. BFV-Blockchainvoting: blockchain-based electronic voting systems with BFV full homomorphic encryption [J]. Journal on Communications, 2022, 43(9): 100-111. |
[7] | Xuewang ZHANG, Zhihong LI, Jinzhao LIN. Privacy protection scheme based on fair blind signature and hierarchical encryption for consortium blockchain [J]. Journal on Communications, 2022, 43(8): 131-141. |
[8] | Jifeng WANG, Guofeng WANG. Research on ciphertext search and sharing technology in edge computing mode [J]. Journal on Communications, 2022, 43(4): 227-238. |
[9] | Huamin FENG, Rui SHI, Feng YUAN, Yanjun LI, Yang YANG. Efficient strong privacy protection and transferable attribute-based ticket scheme [J]. Journal on Communications, 2022, 43(3): 63-75. |
[10] | Haining YU, Hongli ZHANG, Xiangzhan YU, Jiaxing QU, Mengmeng GE. Privacy-preserving trajectory similarity computation method [J]. Journal on Communications, 2022, 43(11): 1-13. |
[11] | Yan YAN, Yiming CONG, Mahmood Adnan, Quanzheng SHENG. Statistics release and privacy protection method of location big data based on deep learning [J]. Journal on Communications, 2022, 43(1): 203-216. |
[12] | Hui LIU, Xinyan LIU, Yan XU, Hong ZHONG, Meng WANG. Privacy protection of warning message publishing protocol in VANET [J]. Journal on Communications, 2021, 42(8): 120-129. |
[13] | Hongtao LI, Xiaoyu REN, Jie WANG, Jianfeng MA. Continuous location privacy protection mechanism based on differential privacy [J]. Journal on Communications, 2021, 42(8): 164-175. |
[14] | Wenbo ZHANG, Wenhua HUANG, Jingyu FENG. Secure communication mechanism for VSN based on certificateless signcryption [J]. Journal on Communications, 2021, 42(7): 128-136. |
[15] | Jie CUI, Xuefeng CHEN, Jing ZHANG, Lu WEI, Hong ZHONG. Bus cache-based location privacy protection scheme in the Internet of vehicles [J]. Journal on Communications, 2021, 42(7): 150-161. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|