首页 | 本学科首页   官方微博 | 高级检索  
     

一种位置服务隐私保护方法
引用本文:王木涵,汪佳帧,阳杰,迟焕醒,徐九韵. 一种位置服务隐私保护方法[J]. 计算机系统应用, 2017, 26(8): 267-272
作者姓名:王木涵  汪佳帧  阳杰  迟焕醒  徐九韵
作者单位:中国石油大学(华东) 计算机与通信工程学院, 青岛 266000,中国石油大学(华东) 计算机与通信工程学院, 青岛 266000,中国石油大学(华东) 计算机与通信工程学院, 青岛 266000,中国石油大学(华东) 计算机与通信工程学院, 青岛 266000,中国石油大学(华东) 计算机与通信工程学院, 青岛 266000
摘    要:近年来,大多数的位置服务隐私保护转向了基于用户协作的P2P形式,但是此模式最大的弊端在于协作用户存在不诚信的情况,如果出现恶意的协作用户,那么协作组用户信息可能会被泄露.在此前提下,本文通过添加第三方信任机构为移动用户进行网络行为异常检测的方式,提出一种防范位置隐私泄露给恶意用户的方法,并通过二叉树的形式扩展P2P模式下的寻找协作用户的范围.通过实验验证,可以有效地防范非诚信用户加入匿名组,降低了信息泄露的可能.

关 键 词:位置服务隐私保护  P2P  第三方信任  二叉树模型
收稿时间:2016-12-03

Location-Based Service Privacy Protection Method
WANG Mu-Han,WANG Jia-Zhen,YANG Jie,CHI Huan-Xing and XU Jiu-Yun. Location-Based Service Privacy Protection Method[J]. Computer Systems& Applications, 2017, 26(8): 267-272
Authors:WANG Mu-Han  WANG Jia-Zhen  YANG Jie  CHI Huan-Xing  XU Jiu-Yun
Affiliation:School of Computer & Communication Engineering, China University of Petroleum, Qingdao 266580, China,School of Computer & Communication Engineering, China University of Petroleum, Qingdao 266580, China,School of Computer & Communication Engineering, China University of Petroleum, Qingdao 266580, China,School of Computer & Communication Engineering, China University of Petroleum, Qingdao 266580, China and School of Computer & Communication Engineering, China University of Petroleum, Qingdao 266580, China
Abstract:In recent years, most location-based service privacy protection turns to peer-to-peer based on subscriber cooperation. However, the biggest drawback of that mode lies in the integrity of collaborative users. If there are vicious users in ambient collaborative users, the information of collaborative users may be accessed illegally. So this paper proposes a method of preventing the location privacy from being revealed to vicious users via using third-party trust institutions to detect the abnormal network behaviors for mobile users. In the meanwhile, we broaden the zone of collaborative users in the mode of peer to peer through binary tree. The experimental result shows the method can effectively prevent unfaithful users from joining in the anonymous group and reduce the probability of the information leakage.
Keywords:location-based service privacy protection  P2P  the trusted institutions third party  binary tree
点击此处可从《计算机系统应用》浏览原始摘要信息
点击此处可从《计算机系统应用》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号