LBS (location-based service) track privacy protecting method

A privacy protection and trajectory technology, applied in the field of information security, to achieve the effect of enhancing trajectory privacy security, reducing time complexity, and protecting trajectory privacy security

Active Publication Date: 2015-05-13
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF5 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] However, the entropy value H of the probability set of K positions selected by the DLS algorithm may be m...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • LBS (location-based service) track privacy protecting method
  • LBS (location-based service) track privacy protecting method
  • LBS (location-based service) track privacy protecting method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] A track privacy protection method in LBS, its process is as follows figure 1 As shown, it specifically includes the following steps:

[0030] Step 1. Initialization: The user terminal input values ​​include: privacy degree K, user's real location d 1 , the difference is the parameter flag of a single request or a continuous request, the relative time t of the request, the current anonymous area A (that is, the selection range of the false location of the current request), the anonymous threshold ε and the distance threshold s t , where ε≥0.7×K, distance threshold s t The size of is related to the user's request speed and the interval of request time, s t Refers to the maximum distance acceptable to the client when two adjacent requests of the same continuous request are submitted; the client judges whether it is a single request or a continuous request based on the input value: when flag=0, it is a single request, and flag= 1 is a continuous request; further, if it i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a simple and effective track privacy protecting method and belongs to the technical field of information safety. The track privacy protecting method is low in calculating cost and high in practicality. The track privacy protecting method is based on the DLS (dynamic list scheduling) algorithm, introduces the definition of side track probability and comprehensively takes single request and continuous request of LBS into consideration, and accordingly can effectively protect the location privacy of users under the condition of single request and effectively protect the track privacy of the users under the condition of continuous request. The track privacy protecting method solves associated privacy safety problems caused by traditional K-anonymity technology applied to the LBS continuous request.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a track privacy protection method in an LBS. Background technique [0002] With the rapid development of modern communication technology and mobile terminals, application systems based on location services have achieved great success. In recent years, because the location-based service (LBS) system can bring great convenience to people's life, it has quickly attracted people's attention and is widely used in various fields. In the LBS application system, people can use handheld terminals (smart phones, tablets) to easily initiate requests to the LBS server to get the relevant information they want, such as finding the nearest cost-effective restaurant and the nearest gas station. stand. However, while enjoying the convenience brought by location-based services to our lives, it also exposes many privacy and security issues. In location-based services, e...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/02H04W64/00
CPCH04W12/02H04W64/00
Inventor 廖丹李慧孙罡黄勋辉
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products