Trace privacy protection method based on double K mechanism

A technology of privacy protection and tracking, which is applied in location information-based services, security devices, electrical components, etc. It can solve the problems of leaking sensitive information of users and difficulty in ensuring the privacy of user tracking.

Active Publication Date: 2018-02-02
HUNAN UNIV OF SCI & TECH
View PDF2 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But there are three problems with this structure: (a) the anonymizer knows the precise location and other information of all users. If it is broken by an attacker, it wi

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trace privacy protection method based on double K mechanism
  • Trace privacy protection method based on double K mechanism
  • Trace privacy protection method based on double K mechanism

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0059] The present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0060] Such as image 3 As shown, a trajectory privacy protection method based on the double K mechanism includes the following steps:

[0061] Step 1: Based on the user's current location and the query real location, construct g query prediction locations based on the hybrid prediction model of the trajectory mode, and select K-g-1 query fake locations based on the query prediction location to query the real location and query prediction location Form K query positions with query fake positions;

[0062] Among them, K represents the number of query requests corresponding to the query location sent by the user to the location service provider during a point of interest search process, and

[0063] Obtain g query prediction positions by using the predicted positions, and obtain K-g-1 query false positions by using a false position selection mechani...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses a trace privacy protection method based on a double K mechanism. The method protects trace privacy of a user by deploying multiple anonymizers between the user and a location service provider and using a K location selection mechanism and a multi-anonymizer-based K-anonymous technology. In the method, the anonymizers can be incompletely trusted, and an attacker fails to obtain the trace of the user from a single anonymizer so as to enhance the trace privacy protection for the user, and at the same time, solve the single-point failure risk and performance bottleneck problems in a fully-trusted third party (TTP) structure.

Description

technical field [0001] The invention relates to the field of computer science and technology, in particular to a trajectory privacy protection method based on a double K mechanism. Background technique [0002] In recent years, with the rapid development of wireless communication technology, mobile Internet and positioning technology, location-based service (Location Based Service, LBS) has attracted more and more attention in daily life. Through smart phones or PDAs, users can download location-based service software such as Twitter, Gowalla and Foursquare from the application store. By using these LBS application software to send queries to the LBS server, the Points of Interest (POIs) needed by the user can be obtained, such as traffic navigation information, location-based advertisements, the nearest restaurant offering the user's favorite dishes, etc. However, users need to submit these query requests to an untrustworthy Location Service Provider (Location Service Prov...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08H04W4/02H04W12/02
CPCH04L63/0442H04W12/02H04L67/1001H04L67/52
Inventor 张少波廖俊国宁红辉
Owner HUNAN UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products