Track privacy protection method based on buffering and position predicating mechanism

A prediction mechanism and privacy protection technology, applied in electrical components, transmission systems, etc., to reduce interactions, reduce risks, and reduce query overhead

Active Publication Date: 2018-02-16
HUNAN UNIV OF SCI & TECH
View PDF5 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although some privacy protection techniques are used in the LBS query

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Track privacy protection method based on buffering and position predicating mechanism
  • Track privacy protection method based on buffering and position predicating mechanism
  • Track privacy protection method based on buffering and position predicating mechanism

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] The present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0049] In this example, the user is used to represent the requesting client and neighboring clients.

[0050] Such as figure 1 and figure 2 As shown, a trajectory privacy protection method based on cache and location prediction mechanism mainly includes client cache lookup and query request, anonymizer cache lookup and location anonymization, LSP data query, anonymizer update and matching user result set, request client There are five processes of terminal update and refinement results, as follows:

[0051] Step 1: Client Cache Lookup and Query Requests

[0052] The system specifies a query range before the user queries, and the range can be defined by the coordinates of the lower left corner (x 1 ,y 1 ) and the coordinates of the upper right corner (x 2 ,y 2 ) is determined, and at the same time it is divided into m×m grids of equal size. Ther...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a track privacy protection method based on a buffering and position predicating mechanism. According to the method, a multistage buffering mechanism is used in a client and ananonymous device; and a candidate result set which is obtained through searching by a user is buffered, thereby supplying the candidate result set for use by the user at the subsequent searching pointin continuous LBS searching or use by other users, reducing interaction between the user and an LSP, and reducing risk of user information exposure to the LSP. Furthermore through a movement positionpredicating method based on Markov, an anonymous domain is formed according to data timeliness and user searching probability, thereby improving buffering hit rate and user track privacy protection,and reducing searching expenditure of the LBS server.

Description

technical field [0001] The invention belongs to the field of computer science and technology, and in particular relates to a trajectory privacy protection method based on a cache and position prediction mechanism. Background technique [0002] At present, location-based service (Location Based Service, LBS) has been widely used in military, commercial and people's livelihood and other fields. Users can obtain Points of Interests (POIs) near the current location through LBS, such as the nearest theaters, hospitals and restaurants. According to the user's continuous LBS query, the attacker may analyze the sensitive information of the specific user's trajectory, such as home address, living habits and health status and other behavioral characteristics. The "privacy door" storm caused by Apple mobile phones is to leak users' privacy through LBS. Therefore, trajectory privacy protection in LBS has become an urgent problem to be solved. [0003] In continuous LBS query, scholar...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0442H04L67/52H04L67/568
Inventor 张少波廖俊国李雄宁红辉
Owner HUNAN UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products