Unlock instant, AI-driven research and patent intelligence for your innovation.

A trajectory privacy protection method in lbs

A privacy-preserving, trajectory technology

Active Publication Date: 2018-04-06
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] However, the entropy value H of the probability set of K positions selected by the DLS algorithm may be much smaller than the theoretically achievable optimal entropy value of the corresponding probability set of K positions

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A trajectory privacy protection method in lbs

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] A track privacy protection method in LBS, its process is as follows figure 1 As shown, it specifically includes the following steps:

[0030] Step 1. Initialization: The user terminal input values ​​include: privacy degree K, user's real location d 1 , the difference is the parameter flag of a single request or a continuous request, the relative time t of the request, the current anonymous area A (that is, the selection range of the false location of the current request), the anonymous threshold ε and the distance threshold s t , where ε≥0.7×K, distance threshold s t The size of is related to the user's request speed and the interval of request time, s t Refers to the maximum distance acceptable to the client when two adjacent requests of the same continuous request are submitted; the client judges whether it is a single request or a continuous request based on the input value: when flag=0, it is a single request, and flag= 1 is a continuous request; further, if it i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention proposes a simple and effective track privacy protection method, which belongs to the technical field of information security. The method has low calculation cost and strong practicability. This method is based on the DLS algorithm and introduces the definition of edge trajectory probability. It comprehensively considers the situation of LBS single request and continuous request. It can effectively protect the user's location privacy in the case of a single request, and can Effectively protect the user's trajectory privacy. The method provided by the invention solves the related privacy and security problems caused by the traditional K-anonymous technology used for LBS continuous requests.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a track privacy protection method in an LBS. Background technique [0002] With the rapid development of modern communication technology and mobile terminals, application systems based on location services have achieved great success. In recent years, because the location-based service (LBS) system can bring great convenience to people's life, it has quickly attracted people's attention and is widely used in various fields. In the LBS application system, people can use handheld terminals (smart phones, tablets) to easily initiate requests to the LBS server to get the relevant information they want, such as finding the nearest cost-effective restaurant and the nearest gas station. stand. However, while enjoying the convenience brought by location-based services to our lives, it also exposes many privacy and security issues. In location-based services, e...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/02H04W64/00
CPCH04W12/02H04W64/00
Inventor 廖丹李慧孙罡黄勋辉
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA