Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Privacy protection method based on return verification

A privacy protection and initiator technology, applied in the field of privacy protection, can solve problems such as being vulnerable to location-related attacks, also called continuous query attacks, difficult to guarantee the privacy of cooperative users, and unable to guarantee the quality of service, so as to save query time and reduce communication Effects of Cost, Enhancement Likelihood, and Feasibility

Active Publication Date: 2018-07-06
XIDIAN UNIV
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

When this scheme is directly used in the continuous query scenario, there are three main problems: First, although each query location point in the continuous query meets the requirement of k-anonymity, the anonymous location set of the continuous query has a spatio-temporal relationship, resulting in Even if k-anonymity protection is performed at each moment of the query, it is still vulnerable to location association attacks, also known as continuous query attacks, that is, the attacker can easily obtain or guess with a high probability by taking the intersection of several location sets Real query users, the process is as follows image 3 shown, including three figures, where image 3 (a) indicates that the query initiator U is at t i-1 The schematic diagram of the anonymous area formed at time, image 3 (b) indicates that the query initiator U is at t i The schematic diagram of the anonymous area formed at time, image 3 (c) indicates that the query initiator U is at t i+1 Schematic diagram of the anonymous area formed at all times, and each map contains 8 users U, B, C, D, E, F, G, H
[0005] Second, the anonymous location set during the entire continuous query period is only the initially selected k-anonymous location set. Although this method avoids location association attacks to a certain extent, since the user’s movement changes dynamically, the initially formed k- Anonymous location sets are clustered together, or too scattered, resulting in unreliable quality of service
This method protects user privacy to a certain extent, but it also has certain disadvantages, that is, the communication overhead between collaborative users is larger than other solutions, and it is difficult to guarantee the privacy of collaborative users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privacy protection method based on return verification
  • Privacy protection method based on return verification
  • Privacy protection method based on return verification

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] specific implementation plan

[0043] The central idea of ​​the present invention is to adopt figure 1 A distributed privacy protection architecture based on user collaboration, which mainly sends out a collaborative group building request by the query initiator and broadcasts it; other users who can receive the collaborative group building request and are willing to cooperate with it reply the corresponding information to the query Initiator, then the query initiator screens or predicts the returned information according to the number of queries and its privacy protection needs, and returns it to each collaborative user to verify the availability of the predicted information, and finally the query initiator will make available The prediction information of the user is sorted together with its own information to form an aggregated query set AQ or a final aggregated query set FAQ, and sends it to the location server. The location server searches the database according ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a privacy protection method based on return verification, mainly solving the problem of user privacy leakage in the prior art. The privacy protection method based on return verification comprises the following steps: a query initiator classifies query regions and sends a collaborative group building request; other users who receive the request reply messages to the query initiator; the query initiator performs screening and prediction on the replied information according to the current query times and privacy protection requirements, returns the prediction information to each cooperative user to judge the availability, and uses the available prediction information and the own information to form an aggregated query set or a final aggregated query set to send to a location server; after receiving the information, the location server looks up the database and forms a candidate result set to return to each collaborative user; and each collaborative user filters outthe required query results and stores in the register. The return verification mechanism is used by the privacy protection method based on return verification, therefore, the accuracy and availability of the prediction information is improved; and the privacy protection method based on return verification can resist position correlation attack and track attack simultaneously, and can be used in various continuously queried location services.

Description

technical field [0001] The invention belongs to the field of wireless network security, and particularly relates to a privacy protection method, which can be used in various continuous query location services. Background technique [0002] Location service LBS, also known as positioning service, is a value-added service provided by the combination of mobile communication network and satellite positioning system. It obtains the location information of the mobile terminal through a set of positioning technologies, such as longitude and latitude coordinate data, and stores the location The information is provided to the mobile user himself, other people or the communication system to realize various location-related services. [0003] Location-based services can be applied in different fields. At the same time, under the trend of the rapid development of the mobile Internet, various applications are also flourishing. In particular, with the rapid development of positioning tec...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W4/021H04W4/029H04W12/02H04L29/06G06F21/62
CPCG06F21/6254H04L63/0421H04W4/023H04W12/02
Inventor 朱晓妍牛俊马建峰
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products