Privacy protection method for position density distribution attack

A privacy protection and density distribution technology, applied in security devices, electrical components, transmission systems, etc., can solve the problem of high deployment costs, achieve the effects of low computing costs, reduced attacks, and sufficient energy

Active Publication Date: 2019-09-06
NANJING UNIV OF TECH
View PDF8 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the disadvantage of edge computing is the high deployment cost. In the future, with the progress of society, the cost of edge server deployment will gradually decrease

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privacy protection method for position density distribution attack
  • Privacy protection method for position density distribution attack
  • Privacy protection method for position density distribution attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] The technical scheme of the present invention is described in further detail below in conjunction with some accompanying drawings:

[0057] In order to make the purpose, technical solutions and advantages of the present invention clearer, the technical solutions of the present invention will be clearly and completely described below in conjunction with the embodiments and accompanying drawings. Obviously, the specific embodiments described here are only used to explain the present invention , and are not intended to limit the present invention.

[0058] Those skilled in the art can understand that, unless otherwise defined, all terms (including technical terms and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. It should also be understood that terms such as those defined in commonly used dictionaries should be understood to have a meaning consistent with the meaning in the c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a privacy protection method for position density distribution attacks, and provides a privacy protection scheme for the position density distribution attacks of regional privacy. The method comprises: using an edge server to divide the service area, and counting the service requests in each area; then, detecting the difference of preset values of the sub-regions and the range level difference of neighborhoods of the sub-regions, and determining an abnormal state; and finally, calculating the number of noise added through an improved differential privacy method, and adding noise to the abnormal area, thereby reducing privacy protection budget, controlling noise cost, and reducing attacks caused by background knowledge to area privacy until abnormities completely disappear. The privacy disclosure problem caused by the position density distribution attack can be effectively reduced.

Description

technical field [0001] The invention relates to a location privacy protection method for the location density distribution attack problem facing area privacy, and belongs to the field of location privacy protection. Background technique [0002] With the popularization of smart phones and wearable devices, location-based services (LBS) develop rapidly. However, while location data brings convenience, it also brings people the problem of privacy leakage. [0003] In LBS service, the location density of a certain area Figure 1 Generally, it shows the effect of gradually decreasing density from multiple densely populated areas to the outside. Suppose a confidential area A stipulates that the use of private communication equipment is prohibited. Although the risk of privacy leakage is cut off from the communication source, when the unscrupulous operator puts the location request sent by other ordinary users on the map, A should comply with the surrounding area. The trend of r...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/00H04W12/02H04L29/06H04W12/122
CPCH04W12/02H04L63/20H04W12/03
Inventor 白光伟顾一鸣沈航陈林曹磊
Owner NANJING UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products