Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Attack method of location anonymization algorithm under continuous LBS requests

An anonymous algorithm and location information technology, applied in the field of cryptography, can solve user concerns about location privacy, achieve the effect of protecting track privacy, reducing the risk of leakage, and narrowing the scope of anonymity

Inactive Publication Date: 2019-04-26
XIDIAN UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But while LBS is developing, location privacy has also become a concern for users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attack method of location anonymization algorithm under continuous LBS requests
  • Attack method of location anonymization algorithm under continuous LBS requests

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] The present invention is described in further detail below in conjunction with accompanying drawing:

[0017] refer to figure 1 , the attack method of position anonymity algorithm under continuous LBS request of the present invention comprises the following steps:

[0018] 1) Assuming that there are users {a, b, c} and users {e, f, g} in the adjacent anonymous areas R and R' respectively, the attack system pairs the users in the adjacent anonymous areas R and R', and obtains 9 position pairs, an anonymous trajectory is formed between two positions in a position pair;

[0019] 2) Set the format of each location information in the anonymous trajectory as {longitude, latitude, query time}, apply for the key of BaiDu MapAPI, and use RouteMatrix v2 to find the driving time, riding time and walking time between each location pair time;

[0020] 3) Set the time difference T between adjacent anonymous locations, and judge whether the driving time, cycling time, and walking t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an attack method of a location anonymization algorithm under continuous LBS requests. The method comprises the following steps: 1) it is set that users {a, b, c} and users {e,f, g} exist in adjacent anonymous regions R and R', and an attack system performs pairing on the users in the adjacent anonymous regions R and R' to obtain 9 location pairs, so that an anonymous trackis formed between two locations in one location pair; 2) a format of each piece of location information in the anonymous track is set as {longitude, latitude and inquiry time}, a key of a BaiDu Map API is applied, and driving time, riding time and walking time between each location pair are calculated out by using the RouteMatrix v2; and 3) a time difference T of the adjacent anonymous locationsis set, whether the driving time, the riding time and the walking time between each location pair are located between T-10% and T+10% or not is judged, and when the driving time, the riding time and the walking time are all not between T-10% and T+10%, the anonymous track corresponding to the location pair is deleted, so that the attack of a location anonymization method under the continuous LBS requests is completed. The method can effectively reduce the anonymous range of the user track.

Description

technical field [0001] The invention belongs to the technical field of cryptography, and relates to an attack method of a location anonymous algorithm under continuous LBS requests. Background technique [0002] With the development of positioning technology, location-based services (LBS) have been widely used in the Internet. LBS service providers provide corresponding services according to the location of users. For example, users can use mobile phones to download location-based services from the application store. The application of querying the nearest halal restaurant from the current location, that is, the nearest neighbor query; or the user wants to find all the objects of interest within a given range, that is, the range query. In addition, LBS has also been practically applied in fields such as intelligent transportation systems. But while LBS is developing, location privacy has also become a concern for users. [0003] Location privacy is divided into two categor...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W4/029H04W4/30H04W4/40H04W12/02
CPCH04W12/02
Inventor 李辉孟雪
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products