Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Location tag based LBS track privacy protection method

A privacy protection and labeling technology, applied in the field of information security, can solve the problems of increasing difficulty, time-consuming, and affecting user perception for K users, and achieve the effect of protecting trajectory privacy and location privacy.

Active Publication Date: 2015-09-23
UNIV OF ELECTRONIC SCI & TECH OF CHINA
View PDF4 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method takes K and L as the input of bilinear mapping and homomorphic encryption, and defines K=q, L=|q|, that is, both bilinear mapping and homomorphic encryption are based on a large prime number q, which is theoretically It is feasible; but in practice, this will make the whole LBS system operate quite slowly; because K=q, L=|q|, this makes K and L quite large
Although the larger K is, the better the anonymity effect of K will be, but the time efficiency will be sacrificed accordingly, which makes it more difficult to select suitable K users; moreover, this method also uses homomorphic encryption technology, and encryption and decryption itself are quite time-consuming. In addition, PLAM uses a distributed structure, and it needs to wait until K suitable users jointly initiate a request, and the waiting process is also very time-consuming
Therefore, the PLAM protocol method will make the LBS request slow, which seriously affects the user's perception

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Location tag based LBS track privacy protection method
  • Location tag based LBS track privacy protection method
  • Location tag based LBS track privacy protection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0045] In this embodiment, it is assumed that 100 users are evenly distributed in area A (area A includes common locations and sensitive locations). For the convenience of simulation, these 100 users are within the communication range. user u 1 In a common location and initiate an LBS request, other users may have initiated aggregation request messages, but the number of aggregations does not exceed K (random). The probability p = 0.5 of exchanging PID protocols. In order to facilitate message transmission, this embodiment assumes that the LP server (LBS provider) provides 32 service types, so Serve has 32 bits. In order to satisfy L diversification, this embodiment assumes that L=K / 2.

[0046] figure 2 It is the comparison of the request delay of the existing PLAM algorithm and the algorithm provided by the present invention under different K values. It can be observed from the figure that the request delay of the existing PLAM algorithm increases with the increase of th...

Embodiment 2

[0048] In this embodiment, it is assumed that 100 users are still in area A, but most of them are densely distributed in sensitive locations, and a small number of them are scattered in common locations. user u 1 Be in a sensitive location and initiate an LBS request. image 3 The variation of the request delay with the value of the security parameter K of the LBS system in this embodiment is described. from image 3 It can be seen that when the K value is less than 20, the request delay of the PLAM algorithm is lower than that of the trajectory privacy protection algorithm based on location tags. Because when the user is in a sensitive location, the user density in the sensitive location is high, and it is very likely that more than half of the combined K users are in the same location. Therefore, the PID exchange protocol needs to be implemented, and the process of exchanging PIDs needs to consume a small amount of time, so that the request delay is lengthened. When the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a location tag based LBS track privacy protection method, and belongs to the technical field of information safety. The track privacy protection method based on a PLAM method combines K anonymity with L diversification, sensitive locations are divided from common locations in a service are of an LBS system, the user identity is prevented from being identified by an attacker by utilizing a PID exchange method, linkage between a user and the track is cut off, and thus, the track privacy of the user is protected. The method of the invention is low in calculation cost, the capability of privacy protection is high, and the method is completely suitable for the LBS system which serves large amount of clients.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a location tag-based LBS track privacy protection method. Background technique [0002] With the rapid development of positioning technology and mobile communication technology, the application of location-based service (LBS) rises rapidly and has attracted the attention of the majority of people. The LBS application system has been involved in various fields, such as transportation, medical care, tourism, social networking, entertainment and so on. Using various handheld terminals such as tablet computers, mobile phones, etc., users can easily initiate requests to the LBS system in the case of a wireless communication network environment (WiFi, 3G, 4G, etc.). After the LBS application system receives the user's request message, it first Locate the specific location of the user, and provide corresponding services according to the location information and...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W4/02H04W12/02H04W60/00
CPCH04W4/025H04W4/029H04W12/02H04W12/04H04W60/00
Inventor 廖丹李慧孙罡黄勋辉
Owner UNIV OF ELECTRONIC SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products