Anonymous region construction method based on query range

A construction method and a technology of query scope, applied in the field of information security, can solve the problems of too large anonymity area and reduced service quality, achieve the effect of small query area, improve service quality, and solve the problem of location privacy security

Active Publication Date: 2017-06-06
XIDIAN UNIV
View PDF3 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The purpose of the present invention is to provide a method for constructing an anonymous area based on a query range, aiming to solve the problem that the existing K-anonymous method has too large an anonymous area and lower service quality

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anonymous region construction method based on query range
  • Anonymous region construction method based on query range
  • Anonymous region construction method based on query range

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] In order to make the purpose, technical method and advantages of the present invention clearer, the present invention will be further described in detail below.

[0029] The application principle of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0030] refer to figure 1 , the use scenario of the present invention is a K-anonymous centralized system, including three parts of user, anonymous server and service provider LSP, which is mainly used for location-based service LBS, and the working principle of the system is as follows:

[0031] Assuming that there is a secure communication channel between the user and the anonymous server, when the user queries nearby POIs, the query request q= will be passed through the secure channel first. Channels are sent to trusted anonymous servers. Among them, ID represents the identity of the user; L (x, y) represents the position coordinates of the user; r represents the quer...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an anonymous region construction method based on a query range, which mainly solves a problem that a conventional K-anonymity technique is large in anonymous region and causes degradation of the service quality in location-based service. The method comprises 1) an anonymous server generates a sub-anonymous region set CS that satisfies a user privacy protection requirement; 2) updating the sub-anonymous region set CS by using the query region area of a service provider as a criterion; 3) repeating the step 2) until the update condition of the sub-anonymous region set CS is not satisfied, and ultimately constructing an anonymous region CS'. The anonymous region construction method can meet the privacy requirement of the user, and an experiment shows that the query region area of the service provider is reduced, the delay for the user to obtain service is reduced, the service quality is improved, and the method can be used for the protection for user location privacy based on the location-based service.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a method for constructing an anonymous area, which can be used to protect user location privacy in location-based services. Background technique [0002] With the popularity of mobile devices and the development of positioning technology, location-based services (LBS) have been widely used. It means that users obtain information query and entertainment services related to their designated location through mobile devices, such as Google Maps and Sifang.com. However, while the location service provider (LSP) provides convenient services for users, it may also collect and abuse the user's service information, thereby illegally obtaining the user's private information, such as: home address, work unit, health status, etc. Therefore, location privacy protection in LBS has received extensive attention from researchers. [0003] K-anonymity is the most commonl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08H04W4/02H04W12/02
CPCH04L63/0421H04W4/02H04W12/02H04L67/52
Inventor 李兴华裴卓雄刘海雷凯跃雒彬马建峰
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products