A Location Privacy Preservation Method Based on False Location and Geometry in Location Services

A location service and fake location technology, applied in the field of information security, can solve the problems of not considering the correlation between location and query content and query time, slow convergence speed, and inability to apply anonymity, etc.

Active Publication Date: 2017-12-15
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method uses an enumeration method when selecting K-1 fake positions. Although it ensures that the entropy value of the selected K positions is the largest, the algorithm complexity is high and the convergence speed is too slow, especially not suitable for anonymity. demanding user
This method only considers the side information that may be exploited by the attacker, but does not consider the correlation between location and query content and query time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Location Privacy Preservation Method Based on False Location and Geometry in Location Services
  • A Location Privacy Preservation Method Based on False Location and Geometry in Location Services
  • A Location Privacy Preservation Method Based on False Location and Geometry in Location Services

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0050] This embodiment specifically adopts the following technical solutions:

[0051] A location privacy protection method based on pseudo location and geometry in location services, the specific process is as follows figure 1 shown, including the following steps:

[0052] Step 1. Initialization: In this method, the LBS server is a service provider, which stores the database of all services and is responsible for updating service data; when the user sends an LBS service request, the LBS server is responsible for receiving the user's service query request, and in the database Search for the corresponding service data in , and then feed back the search results to the user;

[0053] At the same time, in the area served by the LBS server, the LBS server is responsible for classifying each location according to its location attributes (such as restaurants, shopping malls, schools, etc.) The historical request probability of each location), and the LBS server can publish the hist...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a location privacy protection method based on false locations and geometry in location services, and belongs to the technical field of information security. The method is based on the DLS algorithm and uses entropy to measure the degree of anonymization. It not only considers the side information that may be mastered by the attacker, but also considers the correlation between the location, the query content and the query time, that is, the semantic coefficient. At the same time, using the method of the present invention to generate The location information in the request message can freely choose whether to include the user's real location. Since the side information that may be used by the attacker and the correlation between the location and the query content and query time are considered when choosing a false location, the present invention can effectively realize K anonymity, enable users to obtain a large enough entropy value, and reduce user Probability of true location exposure.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a location privacy protection method based on false locations and geometry in location services. Background technique [0002] With the rapid development of modern communication technology and mobile terminals, application systems based on location services have achieved great success. In recent years, because the location-based service (LBS) system can bring great convenience to people's life, it has quickly attracted people's attention and is widely used in various fields. In the LBS application system, people can easily initiate a request to the LBS server by using a handheld terminal (smart phone, tablet) to obtain the relevant information they want. However, while enjoying the convenience brought by location-based services to our lives, it also exposes many privacy and security issues. In location-based services, every time a request is made, the p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W4/02H04W12/02
CPCH04W4/02H04W4/022H04W12/02
Inventor 廖丹黄勋辉李乐民孙罡李慧
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products