Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Privacy Preservation Method Based on Dynamic Location Association

A privacy protection and dynamic location technology, applied in the field of privacy protection, can solve problems such as user privacy leakage, user reputation rough evaluation, infringement of user security interests, etc., to achieve the effect of enhancing possibility and feasibility, and improving accuracy

Active Publication Date: 2021-03-23
XIDIAN UNIV
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this method only achieves a rough evaluation of user reputation, without considering the correlation between user dynamic motion patterns, so it is difficult to accurately quantify and evaluate user reputation in continuous query scenarios; at the same time, how to effectively evaluate user reputation from other perspectives and What kind of user reputation evaluation mechanism to establish? These issues have not been well resolved. Therefore, under the traditional k-anonymity privacy protection system, there is still a great risk of user privacy leakage, which seriously violates user security interests.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privacy Preservation Method Based on Dynamic Location Association
  • Privacy Preservation Method Based on Dynamic Location Association
  • Privacy Preservation Method Based on Dynamic Location Association

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] specific implementation plan

[0036] The present invention adopts figure 1 Centralized privacy protection based on anonymous server privacy protection architecture.

[0037] refer to figure 1 , based on the anonymous server privacy protection architecture, including mobile users, anonymous server and location server LBS-S. The mobile user is an ordinary mobile user in the mobile Internet, and has a mobile device with a cache device, which is used for anonymous server to query a certain When a specific user implements k-anonymous privacy protection, a k-anonymous area is formed. The anonymous server is mainly used in the query service to evaluate the reputation value of each candidate user, select the appropriate user to realize k-anonymity, finally send the k-anonymous query request, and filter the candidate query results to return to the real query user, that is, the anonymous server first chooses to satisfy the real Query the candidate users with user privacy p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a privacy protection method based on dynamic position association, and mainly solves the problem of user privacy disclosure in the prior art. According to the scheme, a query user sends a query request to an anonymous server; After receiving the request, the anonymous server firstly calculates and inquires the maximum movement boundary of the user, and then obtains the maximum reachable boundary of each user and the intersection of the maximum reachable boundaries; the possible Euclidean distance at the previous moment is predicted, and the current Euclidean distance, the reputation of each user and the number of high-low reputation users are calculated; Finally, user information with the highest overall reputation, more high-reputation users and small anonymous area and real user information are combined to form a final query set to be sent to a position server; After receiving the information, the position server forms a candidate result set and returns the candidate result set to the anonymous server; And the anonymous server screens results required by the real users and returns the results. According to the method, a reputation evaluation and distance prediction mechanism is adopted, the user credibility and availability are ensured, position injection attacks are resisted, and the method can be used for various continuous position query services.

Description

technical field [0001] The invention belongs to the field of wireless network security, and in particular relates to a privacy protection method, which can be used in various continuous location query services and mainly resists location injection attacks. Background technique [0002] Location service LBS, also known as positioning service, is a value-added service provided by the combination of mobile communication network and satellite positioning system. It obtains the location information of the mobile terminal through a set of positioning technologies, such as longitude and latitude coordinate data, and stores the location The information is provided to the mobile user himself, other people or the communication system to realize various location-related services. [0003] Location-based services can be applied in different fields. At the same time, under the trend of the rapid development of the mobile Internet, various applications are also flourishing. In particular...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08H04L9/00H04W4/02H04W12/02
Inventor 朱晓妍牛俊马建峰
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products