Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Fake-locus-based location privacy protection method for use in recommendation system

A recommendation system and trajectory technology, applied in the field of mobile social networks, can solve problems such as service quality limitation, location leakage, and failure to consider the semantic attributes of location data, so as to reduce computational complexity and ensure security.

Active Publication Date: 2016-05-04
XIDIAN UNIV
View PDF3 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the inaccuracy of location information will lead to the reduction of recommended service quality. The degree of location fuzzy processing must meet the requirements of service quality. protection of
[0008] To sum up, using the above two methods will still lead to location leakage to a certain extent, and the quality of service obtained is also limited
[0009] In addition, in the above two types of methods, k-anonymity achieves location privacy protection by hiding the user's real location in some false locations, and the obfuscation-based method of location offset is to make a certain geographical difference to the original location. Deviate or generalize the location so that the server or attacker cannot determine the user's true location
However, current k-anonymity and obfuscation-based privacy protection basically do not consider the semantic properties of location data, and the generated fake locations may be semantically completely unrelated to real locations
Therefore, applying the above two location privacy protection techniques to a location recommendation system will lead to a decrease in service quality

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Fake-locus-based location privacy protection method for use in recommendation system
  • Fake-locus-based location privacy protection method for use in recommendation system
  • Fake-locus-based location privacy protection method for use in recommendation system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] specific implementation plan

[0038] refer to figure 1 , the core idea of ​​the present invention is that the user extracts the semantic attributes of each position in the real trajectory TR to form a semantic sequence O={o 1 ,o 2 ,o 3 ,...,o i ,o i+1 ,...,o n}, and then according to the semantic sequence O, the positions in the public location database are classified according to their corresponding semantic attributes, forming a semantic class S={S 1 ,S 2 ,...,S i ,S i+1 ,...,S n}, in order to protect the privacy of the user’s location, the location in the real trajectory TR is removed from the semantic class S to form a cluster S′=S-TR. False trajectory FL={FL 1 ,FL 2 ,...,FL i ,FL i+1 ,...,FL n} can be modeled as a Hidden Markov Model, where O={o 1 ,o 2 ,o 3 ,...,o i ,o i+1 ,...,o n} as the observable sequence in the hidden Markov model, and the position sequence in S′ as the hidden sequence in the hidden Markov model, the user uses the Viterbi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a fake-locus-based location privacy protection method for use in a recommendation system. According to the technical scheme, the method comprises the following steps that: 1, a communication system framework consisting of a user, a public location database and a recommendation service operator is built; 2, the user caches an actual location locus, and converts the actual location locus into a corresponding semantic locus; 3, the user builds a location class hierarchy tree according to a semantic class of location data in the public location database, and performs clustering according to the similarity of the location data; 4, the user generates a fake locus through a Viterbi algorithm; and 5, the user uploads the fake locus to the recommendation service operator in order to protect the location privacy of the user. According to the method, a semantic class of an actual location of the user is taken as an input of the Viterbi algorithm to generate the fake locus, and the actual location of the user is not involved in computation, so that the service operator cannot speculate the location of the user; the location privacy of the user is protected; and the service quality of the recommendation system is enhanced at the same time. The method can be applied to a mobile social network for making recommendations according to interests of the user.

Description

technical field [0001] The invention belongs to the technical field of wireless networks, and relates to the protection of location privacy and a mobile social network for user interest recommendation. Background technique [0002] Social network is a form that reflects social communication groups that naturally develops with the application of the Internet such as Email, BBS, blog, and Weibo. platform. With the popularity of various mobile devices such as smart phones and vehicle-mounted mobile terminals, and the application of sensor network technology, it is becoming more and more popular to use mobile terminal devices to access social networks, and mobile social networks have gradually become mainstream. According to the latest report released by Nielsen in February 2013, more than half of social network users worldwide access social networks through mobile devices such as mobile phones. Among all the applications of mobile social networks, location-based service (LBS)...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W4/02H04W12/00H04L29/08
CPCH04W4/02H04W12/00H04L67/55
Inventor 朱晓妍赵木鱼池浩田张澍扬裴庆祺王勇
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products