Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Privacy protection method of lbs trajectory based on location label

A privacy protection and labeling technology, applied in the field of information security, can solve problems such as time-consuming, increased difficulty for K users, and slow LBS request speed, and achieve the effect of protecting location privacy and trajectory privacy.

Active Publication Date: 2018-04-06
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method takes K and L as the input of bilinear mapping and homomorphic encryption, and defines K=q, L=|q|, that is, both bilinear mapping and homomorphic encryption are based on a large prime number q, which is theoretically It is feasible; but in practice, this will make the whole LBS system operate quite slowly; because K=q, L=|q|, this makes K and L quite large
Although the larger K is, the better the anonymity effect of K will be, but the time efficiency will be sacrificed accordingly, which makes it more difficult to select suitable K users; moreover, this method also uses homomorphic encryption technology, and encryption and decryption itself are quite time-consuming. In addition, PLAM uses a distributed structure, and it needs to wait until K suitable users jointly initiate a request, and the waiting process is also very time-consuming
Therefore, the PLAM protocol method will make the LBS request slow, which seriously affects the user's perception

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privacy protection method of lbs trajectory based on location label
  • Privacy protection method of lbs trajectory based on location label
  • Privacy protection method of lbs trajectory based on location label

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0045] In this embodiment, it is assumed that 100 users are evenly distributed in area A (area A includes common locations and sensitive locations). For the convenience of simulation, these 100 users are within the communication range. user u 1 In a common location and initiate an LBS request, other users may have initiated aggregation request messages, but the number of aggregations does not exceed K (random). The probability p = 0.5 of exchanging PID protocols. In order to facilitate message transmission, this embodiment assumes that the LP server (LBS provider) provides 32 service types, so Serve has 32 bits. In order to satisfy L diversification, this embodiment assumes that L=K / 2.

[0046] figure 2 It is the comparison of the request delay of the existing PLAM algorithm and the algorithm provided by the present invention under different K values. It can be observed from the figure that the request delay of the existing PLAM algorithm increases with the increase of th...

Embodiment 2

[0048] In this embodiment, it is assumed that 100 users are still in area A, but most of them are densely distributed in sensitive locations, and a few of them are scattered in common locations. user u 1 Be in a sensitive location and initiate an LBS request. image 3 The variation of the request delay with the value of the security parameter K of the LBS system in this embodiment is described. From image 3 It can be seen that when the K value is less than 20, the request delay of the PLAM algorithm is lower than that of the trajectory privacy protection algorithm based on location tags. Because when the user is in a sensitive location, the user density in the sensitive location is high, and it is very likely that more than half of the combined K users are in the same location. Therefore, it is necessary to execute the PID exchange protocol, and the process of exchanging PIDs needs to consume a small amount of time, thus lengthening the request delay. When the value of K ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a location tag-based LBS track privacy protection method, which belongs to the technical field of information security. The trajectory privacy protection method provided by the present invention is based on the PLAM method, and adopts the combination of "K anonymity" and "L diversification". By dividing sensitive locations and common locations in the service area of ​​the LBS system, the method of exchanging PIDs is used to Protect the user's identity from being identified by the attacker, thereby cutting off the connection between the user and the track, and protecting the privacy of the user's track. The method of the invention has low calculation cost and strong privacy protection ability, and is completely applicable to the LBS system serving a large number of user terminals.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a location tag-based LBS track privacy protection method. Background technique [0002] With the rapid development of positioning technology and mobile communication technology, the application of location-based service (LBS) rises rapidly and has attracted the attention of the majority of people. The LBS application system has been involved in various fields, such as transportation, medical care, tourism, social networking, entertainment and so on. Using various handheld terminals such as tablet computers, mobile phones, etc., users can easily initiate requests to the LBS system in the case of a wireless communication network environment (WiFi, 3G, 4G, etc.). After the LBS application system receives the user's request message, it first Locate the specific location of the user, and provide corresponding services according to the location information and...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W4/02H04W4/029H04W12/02H04W60/00
CPCH04W4/025H04W4/029H04W12/02H04W12/04H04W60/00
Inventor 廖丹李慧孙罡黄勋辉
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products