A Semantic Location Privacy Preservation Method Based on Edge Cluster Graph

A technology of privacy protection and semantic location, which is applied in the field of network security and privacy protection, can solve the problems of low service quality, inability to guarantee the anonymous set structure, and slow anonymous speed, so as to improve query efficiency, reduce anonymous time, and increase success rate Effect

Active Publication Date: 2020-09-22
SOUTH CHINA UNIV OF TECH
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the existing semantic-sensitive location privacy protection methods, there are generally problems of low anonymity success rate and slow anonymization speed, and the structure of the anonymity set cannot be guaranteed, which brings a large query delay to the location server, and the anonymous server is relatively high. refinement delay, resulting in lower quality of service

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Semantic Location Privacy Preservation Method Based on Edge Cluster Graph
  • A Semantic Location Privacy Preservation Method Based on Edge Cluster Graph
  • A Semantic Location Privacy Preservation Method Based on Edge Cluster Graph

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0027] The present invention adopts such as figure 1 The system structure based on a trusted third party is shown. The system is mainly divided into three parts: LBS users, anonymous servers, and location servers. LBS users are location service requesters, and anonymous servers execute anonymous algorithms to protect user requests. Service provider, responding to requests protected by anonymity.

[0028] A kind of semantic position privacy protection method based on edge cluster graph provided by the present invention is described in detail below, for convenience of description, at first make following definition:

[0029] Definition 1: (user privacy preference profile) The privacy preference sent by the user to the anonymous server is expressed as profile=(k,l,θ,v,l max );

[0030] Among them, k, l, and θ respectively indicate that the anonymous set needs to contain at least k users and l road sections, θ is the user sensitivity threshold, that is, the ratio of the sum of t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a semantic location privacy protection method based on an edge cluster graph, which includes the following steps: step 1, the user sends the current location, user privacy preference, and type of requested point of interest to an anonymous server; step 2, the anonymous server executes an anonymous algorithm to obtain Anonymous set; step 3, the anonymous server sends an anonymous request to the location server; step 4, the location server performs a query, and returns the query result to the anonymous server; step 5, the anonymous server refines the result, and returns the result to the user. The invention has the advantages of improving the success rate of the anonymous server in protecting the anonymous request, reducing the anonymous time, improving the query efficiency of the location server, and the like.

Description

technical field [0001] The invention belongs to the field of network security and privacy protection, in particular to a semantic location privacy protection method based on an edge cluster graph. Background technique [0002] With the development of positioning technology and the popularization of mobile devices, location-based services (Location Based Service, LBS) have brought a lot of convenience to people's lives, such as querying nearby restaurants, querying nearby bars, or sending notifications when arriving at a specified location, etc. Requests are based on Location-based services are increasingly becoming a part of people's lives. However, while users enjoy the convenience brought by location-based services, there is also the risk of privacy leakage. Users need to send service requests and their own location information when using location-based services. If the location server is attacked or the service provider sends the data For other commercial purposes, the u...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0421H04L67/52
Inventor 徐红云田凯郑耀辉张勇徐成
Owner SOUTH CHINA UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products