Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A location privacy protection method based on p2p structure

A privacy protection and location information technology, applied in transmission systems, electrical components, etc., can solve the problems of high query overhead and communication overhead, reduce query overhead and communication overhead, improve privacy protection, and reduce query overhead and communication overhead Effect

Active Publication Date: 2020-05-22
SOUTH CHINA UNIV OF TECH
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

When the distribution of users in the P2P network is too sparse, the final area that meets the anonymity requirements may be very large, resulting in the query overhead of the user and the large communication overhead caused by the server returning a large result set; in addition Under the P2P structure, the user's privacy problem may come from the malicious user node, that is, the malicious user may save the relevant information of the query user, and then conspire with the server to infer the user's identity and location-related information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A location privacy protection method based on p2p structure
  • A location privacy protection method based on p2p structure
  • A location privacy protection method based on p2p structure

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0049] The present invention is mainly deployed on the user's equipment, and there are three main tasks that the user needs to complete: 1) Locating and initiating to find the information of the assisting node; 2) Generate multiple sub-anonymous areas according to the node information, and send them to each sub-area Random user node; 3) Obtain the result set returned in each sub-area, filter and refine it to obtain the appropriate query result. Among them, the present invention is mainly aimed at the anonymous region generation work in the second step, and the third step also has a corresponding design. The algorithm goal of the present invention is to generate multiple sub-anonymous regions to meet 1) user K’s anonymity requirements; 2) region offset to resist central point attack; 3) regions have similarity and resist location homogeneity attacks; 4) each region The number of users in the network is evenly distributed, resisting the collusion attack of malicious user nodes. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a location privacy protection method based on a P2P structure, which includes the following steps: 1. The user generates a request for finding an assisting node, collects the location information of nodes willing to assist, and forms a user node set; 2. The user obtains his own location information ; The number of n sub-regions and the similarity factor of the δ region carry out the generation of multiple sub-anonymous regions; 3. Generate queries in the corresponding sub-regions; send different query intervals to the corresponding proxy nodes at random time intervals; 4. Different proxy nodes Send the corresponding query information to the LBS server; 5. The LBS server searches the database according to different query information, and sends the corresponding query candidate set results to the corresponding proxy node; 6. Filter and refine all the result sets to obtain Appropriate query results. It has the advantages of good performance in the three aspects of average anonymous area size, user distribution entropy and malicious user collusion attack resistance.

Description

technical field [0001] The location privacy protection method based on the P2P structure of the present invention is a technology based on the P2P structure that considers protecting the user's location privacy through multiple anonymous areas; the method is based on the Euclidean space to ensure that the user maintains the original anonymous demand At the same time, the user node set is divided into multiple anonymous areas, and two strategies based on area similarity and user balance are considered to generate multiple sub-anonymous areas, which effectively reduces query overhead and communication overhead, and can resist malicious attacks under the P2P structure. Collusion attacks between user nodes and semi-trusted servers enhance the privacy protection of users. Background technique [0002] With the rapid development of the mobile Internet and the popularity of sensors and mobile devices today, location-based service (Location-based Service, LBS) applications are becom...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0421H04L63/1441H04L67/1042H04L67/52
Inventor 徐红云张勇郑耀辉田凯徐成
Owner SOUTH CHINA UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products