Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Method for protecting track privacy by forwarding inquiries based on neighboring nodes in location service

A privacy protection and location service technology, applied in the field of trajectory privacy protection based on neighbor node forwarding query, can solve the problem of not fully protecting user trajectory location privacy, and achieves protection of location privacy and trajectory privacy, strong anti-attack ability, and easy implementation. Effect

Inactive Publication Date: 2010-09-15
HUAZHONG NORMAL UNIV
View PDF2 Cites 52 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Soon, some researchers proposed a method of directly performing PIR (Privacy Information Retrive, privacy information query) on the location server without using an anonymizer. The server executes the privacy information query without knowing the user's location information and returns a query range. The refinement of query results is completed on the user side. This method solves the problem that anonymity technology cannot fully protect the privacy of user track locations.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for protecting track privacy by forwarding inquiries based on neighboring nodes in location service
  • Method for protecting track privacy by forwarding inquiries based on neighboring nodes in location service
  • Method for protecting track privacy by forwarding inquiries based on neighboring nodes in location service

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] Below in conjunction with accompanying drawing and embodiment describe in detail:

[0033] 1. Trajectory privacy protection system based on neighbor node forwarding query (referred to as this system)

[0034] Such as figure 1 , the system includes a user area 20 and a location server 30, and is provided with a trajectory privacy protection module 10; the user area 20, the trajectory privacy protection module 10 and the location server 30 are connected in sequence;

[0035] Described trajectory privacy protection module 10 comprises authentication server 11, pseudonym server 12 and position anonymous module 13; Its interactive relation is:

[0036] The authentication server 11 verifies the credibility and legitimacy of its identity to the user who makes the request, and ensures that the user who is responsible for forwarding the request can find a credible neighbor node;

[0037] Pseudonym server 12 distributes a pseudonym for each credible user, and user's service req...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for protecting track privacy by forwarding inquiries based on neighboring nodes in a location service and relates to the privacy protection method in the field of information security. The method comprises the following steps of: (1) sending a location service request by an authorized creditable user u by using an anonym; (2) mapping the two-dimensional coordinates of the user to a one-dimensional space by using the Hilbert space filling curve to form an ordered Hilbert sequence and finding out the nearest neighboring node uN of the inquiry user according to the Hilbert value, wherein the node is taken as a node for forwarding an inquiry request; and (3) selecting k-1 users having the Hilbert values more than or less than that of the uN at the uN to form a k anonym group with u and a set of anonym requests after finishing the location anonym at the uN. The method can better reduce the association among the location information and securely and effectively protect the location privacy and track privacy of the user and is easy to implement.

Description

technical field [0001] The invention relates to a privacy protection method in the field of information security, in particular to a trajectory privacy protection method based on neighbor node forwarding queries in location services. Background technique [0002] In recent years, with the vigorous development of mobile computing technology and sensor network technology, location-based services have become more and more widely used, and user trajectory privacy has received great attention. Many anonymous algorithms have been proposed to protect user location information. There are mainly two types of location privacy protection problems in location-based services. One is to prevent the attacker from knowing the location information of the user at a certain time; the other is to prevent the attacker from knowing the user's multiple continuous location information, that is, to prevent the user's location from being Tracking, this category is called user track privacy protection...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08
Inventor 郭亚军郭艳华郭奕旻
Owner HUAZHONG NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products