Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Location privacy protection method based on location sensitivity and hot degree in road network

A privacy-preserving and sensitive technology, applied in location-based services, security devices, electrical components, etc., to achieve good performance

Active Publication Date: 2015-12-02
SUN YAT SEN UNIV
View PDF4 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Existing algorithms consider only one label: location popularity, or confuse popularity with the location's sensitivity

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Location privacy protection method based on location sensitivity and hot degree in road network
  • Location privacy protection method based on location sensitivity and hot degree in road network
  • Location privacy protection method based on location sensitivity and hot degree in road network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0035] The system architecture of the present invention is as figure 2 As shown, a trusted proxy server, called an anonymous server, is introduced between the mobile user and the service provider. The whole protection process is as image 3 Shown:

[0036] S1, introducing a credible proxy server between the mobile user and the service provider, the proxy server is called an anonymous server;

[0037] S2. The anonymous server receives a query based on the exact location of the user, and considers the influence of the heat and sensitivity of the location on the coverage area, thereby generating a suitable coverage area with a higher degree of privacy protection and sending it to the service provider business;

[0038] S3. The service provider returns a candidate result data set according to the query based on fuzzy information sent by the anonymous server. The anonymous server filters the result data set according to the exact information of the user it knows, and returns th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a location privacy protection method based on location sensitivity and hot degree in a road network. The location privacy protection method comprises the steps that: S1, a credible proxy server is introduced between a mobile user and a service provider, wherein the proxy server is called an anonymous server; S2, the anonymous server receives a query based on a user's own exact location, takes the influence of hot degree and sensitivity of the location on a cloaking region into account, generates an appropriate cloaking region with higher privacy protection degree, and sends the cloaking region to the service provider; S3, and the service provider returns a candidate result data set according to the query based on fuzzy information sent by the anonymous server, and the anonymous server filters the result data set according to known exact information of the user and returns a most appropriate result to the user. The location privacy protection method considers the correlativity between hot degree and sensitivity of the location comprehensively, and prevents an attacker from conjecturing a sensitive location where the user has dwelled in the region according to dwell time of the user in the cloaking region.

Description

technical field [0001] The invention relates to the research field of location privacy protection, in particular to a method for location privacy protection based on location sensitivity and heat in a road network. Background technique [0002] The two main techniques for location privacy protection are K-anonymity and locationcloaking. K-anonymity technology has been widely used in various data privacy protection, mainly by introducing K-1 data items that are the same or similar to the target, so that the attacker cannot guess which is the real target item to be protected. It can be seen that the probability of user information leakage will be reduced to 1 / K, and the larger the K value, the higher the security. The area coverage technology blurs the precise location of the user into a small area, so that the attacker cannot determine the exact location of the target user. Today, K-anonymity and area coverage techniques are often used together to preserve location privacy....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W4/02H04W12/02
CPCH04W4/02H04W12/02
Inventor 沈鸿陈舒
Owner SUN YAT SEN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products