Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Privacy protection method based on user cooperation

A privacy protection and user technology, applied in the field of privacy protection, can solve the problems of susceptibility to location-related attacks, also known as continuous query attacks, difficulty in ensuring the privacy of collaborative users, and inability to guarantee service quality, so as to save query time and reduce communication overhead , enhancing the effect of possibility and feasibility

Active Publication Date: 2018-07-13
XIDIAN UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

When this scheme is directly used in the continuous query scenario, there are three main problems: First, although each query location point in the continuous query meets the requirement of k-anonymity, the anonymous location set of the continuous query has a spatio-temporal relationship, resulting in Even if k-anonymity protection is performed at each moment of the query, it is still vulnerable to location association attacks, also known as continuous query attacks, that is, the attacker can easily obtain or guess with a high probability by taking the intersection of several location sets Real query users, the process is as follows image 3 shown, including three figures, where image 3 (a) indicates that the query initiator U is at t i-1 The schematic diagram of the anonymous area formed at time, image 3 (b) indicates that the query initiator U is at t i The schematic diagram of the anonymous area formed at time, image 3 (c) indicates that the query initiator U is at t i+1 Schematic diagram of the anonymous area formed at all times, and each map contains 8 users U, B, C, D, E, F, G, and H
[0005] Second, the anonymous location set during the entire continuous query period is only the initially selected k-anonymous location set. Although this method avoids location association attacks to a certain extent, since the user’s movement changes dynamically, the initially formed k- Anonymous location sets are clustered together, or too scattered, resulting in unreliable quality of service
This method protects user privacy to a certain extent, but it also has certain disadvantages, that is, the communication overhead between collaborative users is larger than other solutions, and it is difficult to guarantee the privacy of collaborative users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privacy protection method based on user cooperation
  • Privacy protection method based on user cooperation
  • Privacy protection method based on user cooperation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] specific implementation plan

[0042] The central idea of ​​the present invention is to adopt figure 1 A distributed privacy protection architecture based on user collaboration, which mainly sends out a collaborative group building request by the query initiator and broadcasts it; other users who can receive the collaborative group building request and are willing to cooperate with it reply the corresponding information to the query Initiator, and then the query initiator screens or predicts the returned information according to the number of queries and its privacy protection needs, and finally the query initiator sorts and summarizes to form an aggregated query set AQ or a final aggregated query set FAQ, and send it to the location server. The location server searches the database according to the received content, forms a corresponding candidate result set CRS and returns it to each user. Each cooperating user who receives the candidate result set filters the cand...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a privacy protection method based on user cooperation, which mainly solves the problem of leakage of user privacy in the prior art. The method is characterized by comprising the following steps: a query initiator classifies query regions and issues a cooperative group building request; when the request is received, other users answer a message to the query initiator; the query initiator only predicts and screens user location information according to a current query number and a privacy protection request; the user location information forms an aggregation query set ora final aggregation query set together with a current real and concrete query content and the query set is sent to a location server; after the location server receives the information, a look-up database forms a candidate result set, which is returned to each cooperative user; and each cooperative user screens the required query result, which is stored to a buffer. According to the method, not only are the accuracy and the usability of the prediction information and the query result improved, but also a location correlation attack and a track attack can be resisted at the same time; and the method can be applied to various continuous query location services.

Description

technical field [0001] The invention belongs to the field of wireless network security, and particularly relates to a privacy protection method, which can be used in various continuous query location services. Background technique [0002] Location service LBS, also known as positioning service, is a value-added service provided by the combination of mobile communication network and satellite positioning system. It obtains the location information of the mobile terminal through a set of positioning technologies, such as longitude and latitude coordinate data, and stores the location The information is provided to the mobile user himself, other people or the communication system to realize various location-related services. [0003] Location-based services can be applied in different fields. At the same time, under the trend of the rapid development of the mobile Internet, various applications are also flourishing. In particular, with the rapid development of positioning tec...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W4/021H04W4/08H04W12/02H04L29/06H04L29/08
CPCH04L63/0421H04W4/021H04W4/08H04W12/02H04L67/52
Inventor 朱晓妍牛俊马建峰
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products