Location privacy protection method based on l-inquiry

A privacy protection and query request technology, applied in location-based services, security devices, electrical components, etc., to reduce system resource overhead, prevent intersection operation attacks, and improve security

Inactive Publication Date: 2015-04-08
FUJIAN NORMAL UNIV
View PDF4 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

but in position k -In the anonymous mechanism, when a user requests the same query multiple times during the mobile process, the anonymous server will construct multiple anonymous groups with the same theme but different user sets for the user, because these anonymous groups contain the identity of the real user Information, as long as the attacker takes the intersection of these anonymous groups, it is possible to infer the identity information of the real user

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Location privacy protection method based on l-inquiry
  • Location privacy protection method based on l-inquiry
  • Location privacy protection method based on l-inquiry

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] The invention is based on l -A location privacy protection method for query, comprising the following steps:

[0020] (1) When the user needs location services, initiate a query request to the anonymous server;

[0021] (2) The anonymous server is at the location k - On the basis of anonymity, by combining query requests from the same region at the same time and inserting fake queries, construct a k users and l An anonymous query request for a query subject and submit it to the location server;

[0022] (3) The location server is responsible for l Each query topic is processed one by one, and then the combined result set of the query results is returned to the anonymous server;

[0023] (4) After the anonymous server filters out the false query results from the result set, sorting and secondary refinement are performed according to the query topics of different users, and the final location query results are obtained, and then returned to each user respectively.

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a location privacy protection method based on l-inquiry. The method comprises the following steps that (1) when a user requires location service, an inquiry request is initiated for an anonymous server; (2) the anonymous server constructs an anonymous inquiry request including k users and l inquiry subjects by a method of merging the inquiry requests from the same region at the same moment and inserting the false inquiry on the location k-anonymity basis, and in addition, the anonymous inquiry request is submitted to a location server; (3) the location server respectively carries out inquiry processing on the l inquiry subjects one by one, and then returns a result set obtained through merging the inquiry results to the anonymous server; (4) the anonymous server filters away the false inquiry result from the result set, and then carries out sorting and secondary refinement according to the inquiry subjects of different users, the final location inquiry result is obtained, and is then respectively returned to each user. The method has the advantage that the location privacy protection mechanism security can be improved.

Description

technical field [0001] The invention belongs to the technical field of location information services, in particular to a l - The query location privacy protection method can be applied to various location-based information services such as navigation, social interaction and surrounding query. Background technique [0002] Location-based services (Location-Based Services, referred to as LBS) is the technical basis to provide users with many services including traffic guidance, point of interest query, vehicle tracking, emergency call, etc. by obtaining the location information of mobile users. The more accurate the location information provided by the server when making a service request, the more accurate the service information returned by the server to the user. Therefore, while people enjoy the convenience brought by location-based services, they are also threatened by the possible exposure of privacy. [0003] Location k - Anonymity is a common location privacy protec...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W4/02H04W12/00H04L29/08
CPCH04W12/02H04W4/02
Inventor 叶阿勇李亚成陈秋玲许力
Owner FUJIAN NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products