Personalized dual hiding method based on location-based service privacy protection

A privacy protection and location-based service technology, applied in the field of personalized dual stealth based on location-based service privacy protection, can solve problems such as security risks, security and performance bottlenecks, and query content security issues that do not consider moving objects, and achieve balanced services. Quality, the realization of personalized needs, the effect of high privacy protection

Active Publication Date: 2014-12-03
XIDIAN UNIV
View PDF1 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The disadvantage of this patent is that, first of all, there is a trusted third party participating in this patent, that is, an anonymous server, which is a security and performance bottleneck
Secondly, this patent only protects the privacy of the location of the moving object, and does not take into account the security of the query content of the moving object. For active attacks, the attacker can use the query content of the moving object to analyze the more sensitive information of the moving object. information
Finally, the patent ignores the existence of background information, which can be used by attackers to analyze sensitive information of moving objects, causing great security risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Personalized dual hiding method based on location-based service privacy protection
  • Personalized dual hiding method based on location-based service privacy protection
  • Personalized dual hiding method based on location-based service privacy protection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] The present invention will be further described below in conjunction with the drawings.

[0049] Reference attached figure 1 The specific steps of the present invention are as follows.

[0050] Step 1. Obtain background information.

[0051] The mobile object uses the Internet to obtain the location map of the local city and the query probability of each location in the location map, and divide the location map into n areas of equal size, and each area has m types of query content , Each query content has its own query probability. The mobile object uses the GPS of the mobile device to obtain the location coordinates of the mobile object on the location map, and the location coordinates determine the area where the mobile object is located.

[0052] Reference attached figure 2 In the embodiment of the present invention, the location map is divided into 9 areas, figure 2 The four types of query content in each area are represented by triangles, circles, five-pointed stars, an...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a personalized dual hiding method based on location-based service privacy protection. The personalized dual hiding method overcomes the defects that single-point leakage is caused by the adoption of a trusted third party in the prior art and location privacy or inquiry privacy is achieved singly. The personalized dual hiding method comprises the following steps of (1) obtaining background information, (2) selecting an alternative inquiry content set, (3) selecting an alternative inquiry region set, (4) generating a hiding space, (5) selecting a false inquiry location, (6) selecting false inquiry content, (7) constituting a request, and (8) sending the request. By the adoption of the k-anonymity technology, the 1-diversification technology and the space hiding technology, personalized dual privacy protection of location privacy and inquiry privacy of a mobile object is achieved.

Description

Technical field [0001] The present invention belongs to the field of communication technology, and further relates to a personalized dual stealth method based on location service privacy protection in the field of wireless network security technology. The present invention can be applied to a mobile social network based on location services to perform a stealth operation on a mobile object to realize privacy protection of the mobile object. Background technique [0002] In order to achieve high-quality and high-security privacy protection for mobile objects, traditional privacy protection methods require the participation of a trusted third party to protect the location privacy of mobile objects. The trusted third party is a security bottleneck that cannot be ignored, resulting in a single point Leakage problem. Privacy protection mainly involves two aspects of security issues, query privacy security issues and location privacy security issues. The existing privacy protection m...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04W4/02
Inventor 李晖牛犇李维皓王子龙曹进朱晓妍王莹娟
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products