Anonymity based on multi-anonymizer (AMA) location service method

A technology of location services and anonymizers, applied in secure communication devices and key distribution, which can solve problems such as security threats, performance bottlenecks, and difficulty in finding third-party entities.

Inactive Publication Date: 2018-10-09
HUNAN UNIV OF SCI & TECH
View PDF6 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there are three problems in the central server structure based on a trusted third party: (a) the anonymizer knows the precise location of the user, and if it is compromised by an attacker, it will pose a serious security threat
(b) The anonymizer undertakes heavy computing tasks such as anonymity and refinement, and is likely to become a performance bottleneck in the structure
(c) In reality, it is also difficult to find a completely credible third-party entity

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anonymity based on multi-anonymizer (AMA) location service method
  • Anonymity based on multi-anonymizer (AMA) location service method
  • Anonymity based on multi-anonymizer (AMA) location service method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0111] The present invention will be further specifically described below in conjunction with the accompanying drawings and specific embodiments.

[0112] The invention discloses a location service method based on multi-anonymizer anonymity, comprising the following steps: a mobile terminal performs identity verification to a trusted authentication center CA to obtain a pseudonym; at the same time, a Shamir threshold scheme is used to divide the user's query content into n pieces of information; Step 2, the mobile terminal randomly selects n different anonymizers to anonymize the user, and sends n pieces of information to the LBS server; Step 3, the LBS server first aggregates and receives t pieces of information from n anonymizers, according to the Shamir threshold scheme Recover the user's query content, and then query the POIs contained in the anonymous area according to the query content in the LBS database; step 4, LBS randomly selects w different anonymizers to forward en...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an Anonymity Based on Multi-Anonymizer (AMA) location service method. The AMA location service method comprises the steps that: step 1, a mobile terminal conducts identity authentication in a CA to obtain a pseudonym, and user query content is divided into n pieces of sub-information by using a Shamir threshold scheme; step 2, the mobile terminal selects n different anonymizers to anonymize the user, and transmits the n pieces of sub-information to an LBS server by means of the anonymizers; step 3, the LBS server aggregates t pieces of information received from the n anonymizers at first, restores the user query content according to the Shamir threshold scheme, and then queries POIs contained in an anonymous region in an LBS database according to the query content;step 4, the LBS server randomly selects w different anonymizers to forward an encrypted candidate result set to the mobile terminal; step 5, and the mobile terminal obtains a precise query result through filtering and refinement. The AMA location service method strengthens the trajectory privacy protection of the user, and effectively solves the single point failure risk of a single anonymizer.

Description

technical field [0001] The invention relates to the field of computer science and technology, in particular to an anonymous location service method based on multiple anonymizers. Background technique [0002] With the rapid popularization of smart terminal devices, the rapid development of mobile Internet and positioning technology, location-based service (Location Based Service, LBS) mobile social network APP is also widely used, such as Foursquare, Twitter and Loopt. These APPs have brought great convenience to people's lives. Typical applications include: traffic navigation, finding the nearest cinema, hospital, etc. In the LBS APP application, users need to send their location and query content to the LBS server to obtain the expected query results. However, while people enjoy the convenience brought by LBS, they also face the risk of leakage of personal sensitive information. According to the LBS queries sent continuously by the user, the attacker can track the user's ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08H04L9/32H04L9/08
CPCH04L9/0869H04L9/321H04L9/3247H04L63/0421H04L63/0428H04L63/1466H04L67/52
Inventor 张少波廖俊国宁红辉
Owner HUNAN UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products