Supercharge Your Innovation With Domain-Expert AI Agents!

Track privacy protection method based on false track technology

A privacy protection and trajectory technology, applied in the field of privacy protection, can solve the problems of large differences, achieve the effect of protecting location privacy and ensuring trajectory privacy

Pending Publication Date: 2022-07-22
四川泛华航空仪表电器有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Therefore, in view of the problem that previous researchers randomly generated false trajectories, which caused a large difference from the real trajectories of mobile users, the present invention proposes a trajectory privacy protection method based on false trajectory technology, which can protect the privacy of user trajectories and obtain high quality service request

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Track privacy protection method based on false track technology
  • Track privacy protection method based on false track technology
  • Track privacy protection method based on false track technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0046] A method for protecting trajectory privacy based on fake trajectory technology in this embodiment, such as Figure 1-Figure 3 shown, including the following steps:

[0047] Step S1. The mobile user interacts with the service provider through a trusted third party;

[0048] Step S2. Within the unit time interval T, the mobile user moves from the position X to the position Y, and selects k user partners to form two equivalence classes, so as to ensure that the attacker can identify the real user position points from the user position points in the equivalence class. The probability of 1 / k is 1 / k, which realizes the user's location privacy protection;

[0049] Step S3. When the user selects the equivalence class, calculate the distance between the surrounding users and the real user through the Euclidean distance, and select the k users closest to the user to form an equivalence class;

[0050] Step S4. In the time interval T, calculate the distance between the user part...

Embodiment 2

[0054] This embodiment is further optimized on the basis of Embodiment 1, and step S1 includes:

[0055] Step S1.1. The mobile user carries a mobile device with a positioning function, accurately locates and completes the task of collecting various types of data according to the mobile device, and then interacts with the LBS application; the mobile users do not trust each other;

[0056] Step S1.2. The trusted third party includes a certificate storage module, a trajectory data preprocessing module, and a privacy protection processing module; as an independent organization, the trusted third party will not disclose relevant information of users, and users in the equivalence class trust certificates from trusted third parties;

[0057] Step S1.3. The mobile user sends the information with the location information and the query request to the service provider, and the service provider returns the query result to the mobile user after calculation, and the service provider is not ...

Embodiment 3

[0060] This embodiment is further optimized on the basis of the above-mentioned Embodiment 1 or 2, and this embodiment discloses:

[0061] Communication between mobile users does not include their real location information.

[0062] The other parts of this embodiment are the same as the above-mentioned Embodiment 1 or 2, and thus are not repeated here.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of privacy protection, and discloses a false trajectory technology-based trajectory privacy protection method, which comprises the following steps that: S1, a mobile user interacts with a service provider through a trusted third party; s2, within a unit time interval T, the mobile user moves from the position X to the position Y, k user partners are selected respectively to form two equivalence classes, and position privacy protection of the user is achieved; s3, when the user selects the equivalence class, calculating the distance between the surrounding user and the real user through the Euclidean distance; and S4, within the time interval T, calculating the distance between the user partner and the user through the Euclidean distance, sorting the obtained distance, obtaining the mapping relation between the users, and connecting two position points to form the trajectory of the user partner, thereby ensuring that the probability of an attacker identifying a real user trajectory segment from the user trajectory data in the equivalence class is 1 / k. The method is used for protecting the track privacy of the user and obtaining the high-quality service request.

Description

technical field [0001] The invention relates to the technical field of privacy protection, in particular, to a trajectory privacy protection method based on fake trajectory technology, which is used to protect user's trajectory privacy and obtain high-quality service requests. Background technique [0002] Trajectory data is closely related to personal privacy, and direct exposure of trajectory data to other malicious attackers will lead to serious privacy leakage problems. Attackers can infer very sensitive private information of mobile users based on trajectory data. For example, if the trajectory data shows that a user appears at two fixed locations in the morning and at night over a long period of time, the attacker can infer the mobile user's home address and work location; and if the user's trajectory data The location points in the mobile phone frequently appear near the hospital, and the attacker may infer that the user suffers from a disease; and other uniquely ide...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W4/029H04W4/02H04W12/02
CPCH04W4/029H04W4/025H04W12/02
Inventor 范博全杨洪森赵灿
Owner 四川泛华航空仪表电器有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More