K-anonymity-based personalized position privacy protection method

A privacy protection, fake location technology, applied in the field of information security, can solve the problems of small indistinguishability of k locations, not considering the actual needs of users, affecting the quality of query request service, etc., to achieve abbreviated location diversity and resist location distribution attacks. and background information attack, to achieve the effect of diversity

Active Publication Date: 2019-07-26
NANJING UNIV OF AERONAUTICS & ASTRONAUTICS
View PDF7 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, since the selected fake locations all have similar query probabilities, it may lead to a more regular distribution of fake locations, or multiple locations have the same location type, that is, the indistinguishability of k locations is small, so that the attacker can exploit fake locations. Location distribution characteristics and location semantics infer the real location
Moreover, the enhanced-DLS method makes the false location distribution spread as much as possible, does not consider the actual needs of users, and reasonably limits the area of ​​​​anonymous regions, which will generate a lot of computational overhead and seriously affect the service quality of query requests

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • K-anonymity-based personalized position privacy protection method
  • K-anonymity-based personalized position privacy protection method
  • K-anonymity-based personalized position privacy protection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The technical solutions of the present invention will be further described below in conjunction with the accompanying drawings and specific embodiments. It should be understood that these examples are used to illustrate the present invention and not to limit the scope of the present invention. The implementation conditions used in the examples can be further adjusted according to the conditions of specific manufacturers, and the implementation conditions not indicated are usually the conditions in routine experiments.

[0030] In the location privacy protection process of LBS, users need to obtain their current location through the positioning system first, and then generate k-1 effective fake locations through a personalized fake location generation algorithm, and construct an anonymous area CR in combination with the user's real location. Such as figure 1 As shown in , the shades of different cells in the rightmost column represent different query probabilities; this...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a K-anonymity-based personalized position privacy protection method, and belongs to the field of information security. The method includes: generating an efficient k- anonymousset by a personalized false position generation algorithm; using the anonymous set to replace a real position and sending the anonymous set to a service provider, so that the position privacy of theuser is protected when the user sends a request based on the position service (LBS), and the user can define the anonymous degree and the service demand according to the actual condition to obtain a query result meeting the privacy protection demand. The method is suitable for services of a single discrete request, such as interest point retrieval.

Description

technical field [0001] The invention relates to a personalized fake location generation algorithm, which belongs to the field of information security, in particular to a k-anonymity-based location privacy protection method. Background technique [0002] With the rapid development of wireless communication networks and mobile devices, location-based services (LBS) have become an indispensable service in daily life. LBS refers to obtaining corresponding requested services from an LBS provider based on the geographical location of a mobile user. When users obtain services, they need to provide their own location information. From the location information, other sensitive information such as the user's home address and living habits can be further inferred. If such information is leaked to an untrustworthy third party, it will seriously threaten the rights and interests of users. and safe. Therefore, it is very important to protect the user's location privacy. [0003] The co...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W4/02H04W12/02
CPCH04W4/02H04W12/02
Inventor 周珂欣王箭
Owner NANJING UNIV OF AERONAUTICS & ASTRONAUTICS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products