Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Privacy protection method based on user classification

A privacy protection and user technology, applied in the field of privacy protection, it can solve problems such as difficulty in accurately quantifying user reputation and user credibility, failure to achieve detailed evaluation, and leakage of user privacy.

Active Publication Date: 2019-10-22
XIDIAN UNIV
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this method does not classify users, treats all users uniformly, and does not achieve detailed evaluation, so it is difficult to accurately quantify user reputation and user credibility; at the same time, how to effectively evaluate user reputation from other perspectives and establish what kind of user Issues such as the reputation evaluation mechanism have not been well resolved, so there is still a great risk of user privacy leakage under the traditional k-anonymity privacy protection system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privacy protection method based on user classification
  • Privacy protection method based on user classification
  • Privacy protection method based on user classification

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] specific implementation plan

[0047] The implementation of the present invention is based on the existing centralized anonymous server-based privacy protection framework for privacy protection.

[0048] refer to figure 1 , the central anonymous server-based privacy protection architecture, including mobile users, anonymous servers and location servers LBS-S. The mobile user is an ordinary mobile user in the mobile Internet, and has a mobile device with a cache device, which is used for anonymous server to query a certain When a specific user implements k-anonymous privacy protection, a k-anonymous area is formed. The anonymous server is mainly used in the query service to evaluate the reputation value of each candidate user, select the appropriate user to realize k-anonymity, finally send the k-anonymous query request, and filter the candidate query results to return to the real query user, that is, the anonymous server first chooses to satisfy the real Query the c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a privacy protection method based on user classification, and mainly solves the problem of user privacy leakage in the prior art. According to the scheme, the method comprises:a query user sending a query request to an anonymous server; after receiving the request, the anonymous server firstly dividing each candidate user into a new user and an old user, and then predicting the position of each new user at the last moment; calculating the motion change trend of each new user and each old user in adjacent time intervals, and evaluating the static reputation, the dynamicreputation and the overall reputation of each new user and each old user; finally, selecting user group information with a high overall reputation value and a minimum anonymous region area to form afinal query set together with real user information, and sending the final query set to a position server; the position server forming a candidate result set after receiving the information and returns the candidate result set to the anonymous server; and the anonymous server screening a result required by the real user and returning the result. According to the method, a reputation evaluation anduser classification mechanism is adopted, so that the credibility and availability of the user are ensured, the location injection attack can be resisted, and the method can be applied to various continuous location query services.

Description

technical field [0001] The invention belongs to the field of wireless network security, and in particular relates to a privacy protection method, which can be used in various continuous location query services and mainly resists location injection attacks. Background technique [0002] Location service LBS, also known as positioning service, is a value-added service provided by the combination of mobile communication network and satellite positioning system. It obtains the location information of the mobile terminal through a set of positioning technologies, such as longitude and latitude coordinate data, and stores the location The information is provided to the mobile user himself, other people or the communication system to realize various location-related services. [0003] Location-based services can be applied in different fields. At the same time, under the trend of the rapid development of the mobile Internet, various applications are also flourishing. In particular...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0421H04L67/52
Inventor 牛俊朱晓妍马建峰
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products