Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for protecting sensitive semantic location privacy for continuous query in road network environment

A semantic location and privacy protection technology, applied in the field of privacy protection, can solve the problems of location privacy theft, reduce the degree of privacy protection, and not consider semantic location information, so as to prevent attacks and enhance the protection degree

Inactive Publication Date: 2019-04-12
ANHUI NORMAL UNIV
View PDF4 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, while users enjoy the convenience brought by location-based services, they may face the risk of location privacy being stolen. By analyzing location semantic information, attackers are likely to infer users' privacy information such as hobbies, living habits, occupations, and health.
[0003] Most of the existing continuous query location privacy protection methods use K-anonymity and L-segment diversity methods, that is, the anonymous server replaces the precise location uploaded by the user with an anonymous area containing K users and L road segments, thereby improving location privacy security. However, this method does not consider the semantic location information under continuous query. The attacker matches the anonymous area with the city map, analyzes the semantic location in the anonymous area, and conducts semantic inference attacks to infer the semantic location information of the user and reduce privacy. degree of protection

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for protecting sensitive semantic location privacy for continuous query in road network environment
  • Method for protecting sensitive semantic location privacy for continuous query in road network environment
  • Method for protecting sensitive semantic location privacy for continuous query in road network environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0037] figure 1 The embodiment of the present invention provides a continuous request-oriented sensitive semantic location privacy protection system under the road network environment.

[0038] The user sends a location query request to the anonymous server TTP, and the anonymous server TTP uses the time-space similarity to select users to build an anonymous user set, uses the semantic position set by the user in the anonymous user set to build an anonymous area, and sends the constructed anonymous area to the location server LBS, The location server LBS returns the query results of the anonymous ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention is applicable to the technical field of privacy protection, and provides a method for protecting sensitive semantic location privacy for continuous query in a road network environment. The method comprises the following steps: S1, receiving a location query request sent by a user; S2, judging whether the location query request is a first time location query request of the user, if the detection result is yes, constructing an anonymous user set based on the space-time similarity, and if the detection result is no, executing a step S3; S3, constructing a semantic secure anonymous area of the anonymous user set, and sending the semantic secure anonymous area to an LBS location server; S4, receiving candidate results returned by the LBS location server; and S5, filtering the candidate results based on a precise location of the user, and returning the filtered query result to the user. By adoption of the method provided by the invention, an attacker can be effectively prevented from using a semantic inference attack to attack the user location privacy under the continuous query location service; and by constructing the semantic secure anonymous area, the protection degreeof a K-anonymous algorithm on the user location privacy under the continuous query location service is enhanced.

Description

technical field [0001] The invention belongs to the technical field of privacy protection, and provides a method for protecting privacy of sensitive semantic locations under a road network environment with continuous query direction. Background technique [0002] With the continuous development of mobile technology, location-based services (Location-based services, LBS) have been gradually applied to a wider range of fields. Continuous query is a common LBS service. Users need to continuously upload their own location to obtain service information within the validity period of the query, for example: query the location information of the nearest hospitals in the surrounding area, navigation routes when driving, etc. However, while users enjoy the convenience brought by location-based services, they may face the risk of location privacy being stolen. By analyzing location semantic information, attackers are likely to infer users' privacy information such as hobbies, living ha...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W4/02H04W12/02
CPCH04W4/02H04W12/02
Inventor 左开中王永录曾海燕刘蕊
Owner ANHUI NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products