Privacy protection method for location sharing system in mobile social network

A mobile social network and social network technology, applied in the field of mobile communication, can solve the problems of limited computing resources, lack of consideration of personal privacy, and excessive computing time.

Active Publication Date: 2017-06-27
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF6 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But it still has the following defects: (1) The dynamic user pseudonym contains the user's real social identity information, and the location server can infer the user's historical location based on the historical user pseudonym
(2) The computing resources of the user terminal are limited. Every time a friend or stranger is found, its location must be asymmetrically encrypted. The calculation time is almost proportional to the number of friends and the number of strangers.
In the case of a large number of friends and strangers, more calculation time is required
(3) This method allows the user to only share the location with all friends, without considering that in practical applications, the user may not trust all friends, and only hopes to share the location with some friends
But there are also the following disadvantages: (1) The system requires a trusted third-party server. Once the attacker successfully attacks the server, the historical locations of all users will be leaked
(2) The location privacy protection here mainly refers to the privacy protection of sensitive locations. It does not take into account that other locations can already expose the personal privacy of some users, such as activity areas, action trajectories, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privacy protection method for location sharing system in mobile social network
  • Privacy protection method for location sharing system in mobile social network
  • Privacy protection method for location sharing system in mobile social network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] In order to make the purpose, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the implementation methods and accompanying drawings.

[0039] The implementation process of the privacy protection method of the location sharing system proposed by the present invention is as follows:

[0040] (1) Location sharing system

[0041] The location sharing system used to implement the present invention mainly includes three parts: a terminal, a location server, and an online social network server. The user initiates a request to inquire about friends and strangers in a specified range through a terminal carried by the user (referred to as the user terminal). The terminal can communicate with location servers and online social networking servers. The online social network server manages the social identity information (user identity identification) of social users, friend list ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

According to the technical scheme of the invention, a location privacy protection method for enabling the location lookup service of surrounding friends and strangers in a mobile online social network is provided. The invention provides a privacy protection method for a location sharing system in a mobile social network for surrounding friends and strangers. According to the invention, the peculiarities of the surrounding friend and stranger searching service relative to traditional location-based services are comprehensively considered. Not only the location privacy of a user is protected, but also the social relationship privacy of the user can be protected. According to the method, when the location-sharing service for searching surrounding friends and strangers is adopted by the user, a location-sharing target is selected. That means, the user is allowed to select one part of friends and display the location of the user to the selected friends, instead of all friends. Based on the protection strategy proposed in the invention, the above method is more efficient compared with existing privacy protection methods. Surrounding friends and strangers can be searched more quickly.

Description

technical field [0001] The invention belongs to the technical field of mobile communication, and in particular relates to privacy protection of a location sharing system in a mobile social network. Background technique [0002] With the rapid development of mobile communication technology and social networks and the popularization of high-performance smart mobile devices, traditional location-based services and social networks are constantly merging to form a mobile online social network. Mobile online social networks provide more location sharing services, users can not only find nearby friends and strangers, but also check-in services. Mobile social networks combine real location services with virtual communities, enriching people's social methods. However, when users enjoy the convenience brought by location-based services, they also bear the risk of sensitive information leakage. [0003] When a user sends a location service request, an attacker can not only associate ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08H04L29/06
CPCH04L63/0442H04L63/062H04L63/083H04L63/107H04L67/52
Inventor 孙罡谢喻霞廖丹孙健
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products