Track privacy protection method based on position service

A location-based service and privacy protection technology, applied in the field of information technology security, can solve problems such as the absence of a trusted third party, performance bottlenecks, and inability to make full use of surrounding environment knowledge, so as to avoid single-point attacks, reduce risks, and protect real-time tracks Privacy Effects

Active Publication Date: 2019-12-20
HARBIN ENG UNIV
View PDF8 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The independent structure is composed of two components, the client and the server. The privacy protection process is completed on the client. This privacy protection model is simple to implement but has high requirements on the computing performance of the client, and cannot make full use of the knowledge of the surrounding environment.
The structural components of the central anonymizer include: client, trusted central anonymizer, and server. The privacy protection process is mainly completed by the trusted anonymizer. This system structure reduces the requirements for the client, but the central server is vulnerable to single-point attacks. There are also performance bottlenecks, and trusted third parties generally do not exist in reality
[0005] In order to solve the above problems, Zhang Shaobo and others proposed a multi-anonymizer system structure. Although the multi-anonymizer structure can effectively prevent the central anonymizer from being attacked by a single point, the research by Zhang Shaobo and others only uses pseudonyms to replace the identity information of users, and does not protect users. With effective protection of the location information of the user, the attacker can still obtain the user's query request information and then infer the user's trajectory information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Track privacy protection method based on position service
  • Track privacy protection method based on position service
  • Track privacy protection method based on position service

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0043] Such as figure 1 Among them, a track privacy protection method based on location services, the method includes the following steps:

[0044] Step 1: Generate a blurred area BA according to the user's real location;

[0045] Step 2: Replace the real location of the user with the fuzzy area BA, randomly select an anonymous server from multiple anonymizers, and send a query request (id, BA, t, query, k) to it;

[0046] The request information...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a track privacy protection method based on position service. The method comprises the following steps: step 1, generating a fuzzy region BA according to a real position location of a user; 2, replacing the real position location of the user with a fuzzy region BA, randomly selecting an anonymous server from a plurality of anonymizers, and sending a query request (id, BA, t,query, k) to the anonymous server; 3, after the anonymous server receives the request information sent in the step 2, a selecting position point Li in a fuzzy area BA according to a road network; 4,enabling the anonymous server to generate an anonymous query request according to the Li generated in the step 3; and step 5, sending an anonymous query request to the location service provider. The real-time trajectory privacy protection method is researched on the basis of a multi-anonymizer system structure privacy protection model, and a method of combining location ambiguity and K-anonymity is provided, so that the purposes of enhancing trajectory privacy protection and ensuring data availability are achieved.

Description

technical field [0001] The invention belongs to the technical field of information technology security; in particular, it relates to a track privacy protection method based on location services. Background technique [0002] In recent years, with the continuous development and application of mobile smart devices, location-based services (Location-based Service, LBS) have been widely used, which greatly facilitates people's lives. Users need to provide their own location information when obtaining LBS services, so a large amount of spatio-temporal location information, that is, trajectory data, will be generated in the continuous query process. Attackers can infer users’ private information, such as users’ hobbies, by mining trajectory data. , political beliefs, physical health status, etc. Therefore, a real-time trajectory privacy protection technology is proposed on the basis of location privacy protection technology. [0003] In order to solve the problem of trajectory pr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0407H04L67/535H04L67/52
Inventor 韩启龙何伟娜张可佳卢丹张海涛马志强宋洪涛
Owner HARBIN ENG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products