Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A Trajectory Privacy Preservation Method Based on Caching and Position Prediction Mechanism

A prediction mechanism and privacy protection technology, applied in transmission systems, electrical components, etc., to reduce risks, improve trajectory privacy, and reduce query overhead

Active Publication Date: 2020-02-18
HUNAN UNIV OF SCI & TECH
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although some privacy protection techniques are used in the LBS query process, these methods provide users with limited privacy protection

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Trajectory Privacy Preservation Method Based on Caching and Position Prediction Mechanism
  • A Trajectory Privacy Preservation Method Based on Caching and Position Prediction Mechanism
  • A Trajectory Privacy Preservation Method Based on Caching and Position Prediction Mechanism

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] The present invention will be further described below in conjunction with the drawings and embodiments.

[0048] In this example, the user is used to represent the requesting client and neighboring clients.

[0049] Such as figure 1 with figure 2 As shown, a trajectory privacy protection method based on cache and location prediction mechanism mainly includes client-side cache lookup and query request, anonymizer cache lookup and location anonymization, LSP data query, anonymizer update and matching user result set, request client The five processes of end update and refinement results are as follows:

[0050] Step 1: Client cache lookup and query request

[0051] The system specifies a query range before the user query. The range can be determined by the coordinates of the lower left corner (x 1 ,y 1 ) And the upper right corner coordinates (x 2 ,y 2 ) Is determined, and it is divided into m×m grids of equal size. Therefore, the grid structure of the query range specified by...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a trajectory privacy protection method based on cache and location prediction mechanism. The method uses a multi-level cache mechanism on the client and an anonymizer respectively to cache the candidate result set obtained by the user's query for subsequent follow-up in the user's continuous LBS query. Inquiry points or other users use to reduce the interaction between users and LSPs and reduce the risk of user information being exposed to LSPs. At the same time, through the Markov-based mobile location prediction method, combined with data timeliness and user query probability, an anonymous domain is formed, which not only improves the cache hit rate, but also improves the privacy of the user's trajectory, and reduces the query overhead of the LBS server.

Description

Technical field [0001] The invention belongs to the field of computer science and technology, and particularly relates to a trajectory privacy protection method based on a cache and location prediction mechanism. Background technique [0002] At present, Location Based Service (LBS) has been widely used in military, commercial and people's livelihood fields. Through LBS, users can obtain Points of Interests (POIs) near their current location, such as the nearest theater, hospital, and restaurant. According to the user's continuous LBS query, the attacker may analyze the sensitive information of a specific user's trajectory, such as behavioral characteristics such as home address, living habits, and health status. The "privacy door" storm triggered by Apple's mobile phone is to leak the privacy of users through LBS. Therefore, the protection of trajectory privacy in LBS has become an urgent problem to be solved. [0003] In continuous LBS query, scholars have proposed some trajec...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0442H04L67/52H04L67/568
Inventor 张少波廖俊国李雄宁红辉
Owner HUNAN UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products