首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到19条相似文献,搜索用时 31 毫秒
1.
叶阿勇  李亚成  马建峰  许力 《通信学报》2014,35(11):162-170
针对当前基于位置的服务(LBS)系统存在的隐私保护度、位置服务质量和通信开销三者难于平衡的问题,提出了一种基于服务相似性的k-匿名位置隐私保护方法。在不改变现有LBS 系统架构的情况下,利用位置服务查询结果的相似性来辅助匿名服务器构造匿名区域,从而实现在确保用户隐私安全的基础上,有效提高服务质量和降低系统开销。最后,通过实验验证了该算法的有效性。  相似文献   

2.
针对半诚信的数据收集者对包含敏感属性(SA)数据收集和使用过程中可能造成隐私泄露问题,该文在传统模型中增加实时的数据领导者,并基于改进模型提出一个隐私保护的数据收集协议,确保无可信第三方假设前提下,数据收集者最大化数据效用只能建立在K匿名处理过的数据基础上。数据拥有者分布协作的方式参与协议流程,实现了准标识(QI)匿名化后SA的传输,降低了数据收集者通过QI关联准确SA值的概率,减弱内部标识揭露造成隐私泄露风险;通过树形编码结构将SA的编码值分为随机锚点和补偿距离两份份额,由K匿名形成的等价类成员选举获取两个数据领导者,分别对两份份额进行聚集和转发,解除唯一性的网络标识和SA值的关联,有效防止外部标识揭露造成的隐私泄露;建立符合该协议特性的形式化规则并对协议进行安全分析,证明了协议满足隐私保护需求。  相似文献   

3.
移动环境下LBS位置隐私保护   总被引:9,自引:0,他引:9       下载免费PDF全文
用k匿名模型对基于位置信息的服务(LBS)中的位置隐私进行保护是近年来研究的热点。在移动用户不断发出查询的场景下,该文提出了移动模式攻击(MPA),使得传统的针对孤立查询的隐私保护算法均失效。基于熵理论,提出了熵匿名度度量,并以此为基础提出了移动环境下的模糊化算法Mclique,实验证明其有效地抵御了MPA攻击。通过简化Mclique算法中熵的计算,提出了快速模糊化算法Fclique,实验证明Fclique不仅仍具有较强的MPA抵御能力,且极大提高了时间效率。  相似文献   

4.
朱顺痣  黄亮  周长利  马樱 《电子学报》2016,44(10):2423-2431
针对利用匿名框实现的兴趣点K近邻(KNN)查询带来的通信开销大、时延长等问题,提出了基于单一兴趣点Voronoi图划分和四叉树层次化组织的KNN查询方法。该方法根据兴趣点层次信息有针对性的构造查询匿名框用来获取详细查询信息,在保护位置隐私的同时,降低了查询通信开销,同时注入虚假查询保护了用户的真实查询内容隐私。最后分别采用模拟地理数据和真实地理数据进行理论分析和有效性验证。  相似文献   

5.
全面归纳了移动互联网中位置隐私保护的相关研究工作,总结了位置服务和定位服务中的威胁模型。然后,详细介绍了现有基于位置服务的隐私保护技术,分析了其在抗隐私攻击和位置隐私适用性方面的优缺点,并阐述了定位服务中位置隐私问题的本质、威胁和解决方法。最后指出了需要进一步研究的问题。  相似文献   

6.
首先通过案例说明隐私保护的重要性,然后介绍隐私保护中常用的匿名化方法,并针对评分推荐系统、社交网络和博客分别介绍有效的去匿名化方法。表明在大数据时代下虽然数据的公开有利于学术研究,但是也需要加强考虑隐私保护的问题。  相似文献   

7.
伴随着网络化与信息化的发展,信息呈爆炸式增长,大数据时代正悄无声息到来。大数据在影响人们吃穿住行的同时,也让人们陷入了隐私危机。匿名化技术是在数据发布过程中进行隐私保护的一项重要技术。文章通过查阅大量文献,首先简要地概述了大数据隐私危机现状;接着总结了常见的隐私攻击方法及与抗衡的匿名模型及其实现方法与技术;然后讨论了匿名化质量的度量方法;最后总结并说明下一步的研究方向。  相似文献   

8.
基于位置的服务(LBS)在日常生活中的应用越来越广,对位置隐私保护的要求也越来越强。目前有很多种对位置隐私和查询隐私的保护原则、保护算法,其中K-匿名是使用较为广泛的一个原则。针对智能终端的平台特性,提出一种新的基于K-匿名的隐私保护算法,主要通过区域划分和排序的方式,对不同区域之间的查询集合合并,模糊用户位置,完成对位置隐私和查询隐私的保护。实验证明,能在较小的代价下完成对用户的位置隐私保护。  相似文献   

9.
从位置隐私保护理论模型和位置隐私保护方法两个方面入手,对智能移动终端上的位置隐私保护研究现状进行了探讨,重点研究当前模型和方法的优缺点以及各自的适用场景;结合智能终端和移动互联网的发展趋势,指出当前位置隐私保护技术存在的问题,对未来的研究方向提出了建议。  相似文献   

10.
刘晓迁  李千目 《通信学报》2016,37(5):125-129
基于匿名化技术的理论基础,采用DBSCAN聚类算法对数据记录进行聚类,实现将个体记录匿名化隐藏于一组记录中。为提高隐私保护程度,对匿名化划分的数据添加拉普拉斯噪声,扰动个体数据真实值,以实现差分隐私保护模型的要求。通过聚类,分化查询函数敏感性,提高数据可用性。对算法隐私性进行证明,并实验说明发布数据的可用性。  相似文献   

11.
    
In location-based services (LBS),as the untrusted LBS server can be seen as an adversary,and it can utilize the attribute as background knowledge to correlate the real location of the user in the set of uncertain locations.Then the adversary can gain the location privacy when the user enjoys the snapshot and continuous query through the correlation inference attack.In order to cope with this attack,the main scheme in privacy protection is to generalize the attribute and achieve attribute anonymity.However,algorithms of this type usually assumes a trusted third party (TTP) which provides the service of similarity attribute finding and comparing,and it is unpractical in the real environment,as the TTP may become the point of attack or the bottleneck of service and it cannot be considered as the trusted one all the time.Thus,to cope with the correlation inference attack as well as the semi-trusted third party,ciphertext policy attribute based encryption (CP-ABE) and users collaboration based attribute anonymous scheme was proposed.In this scheme,the user coupled achieve location and attribute anonymity.Furthermore,this scheme could also provide security for attacks from the semi-trusted third party as well as semi-trusted collaborative users.At last,security analysis and the experiment results further verify the effectiveness of privacy protection and the efficiency of algorithm execution.  相似文献   

12.
云计算的出现为多个数据拥有者进行数据集成发布及协同数据挖掘提供了更广阔的平台,在数据即服务模式(Daa S,data as a service)下,集成数据被部署在非完全可信的服务运营商平台上,数据隐私保护成为制约该模式应用和推广的挑战性问题。为防止数据集成时的隐私泄露,提出一种面向Daa S应用的两级隐私保护机制。该隐私保护机制独立于具体的应用,将数据属性切分到不同的数据分块中,并通过混淆数据确保数据在各个分块中均衡分布,实现对数据集成隐私保护。通过分析证明该隐私保护机制的合理性,并通过实验验证该隐私保护机制具有较低的计算开销。  相似文献   

13.
在电信行业,如何进一步加强用户隐私保护,如何采用信息化技术与管理手段,高效实施数据安全,取得隐私保护与成本的均衡,在业务与公共安全场景采取分级分类的隐私保护策略和手段确保数据安全,是运营商重点攻关的内容。从隐私保护的评估规划、发现与标识、访问治理、隐私存储的性能与成本均衡4方面进行探讨,提出相关创新思路。  相似文献   

14.
    
While providing plenty of convenience for users in daily life, the increasingly popular location-based ser-vice(LBS) posed a serious threat to users' privacy. The research about privacy-preserving techniques for LBS is becoming a hot spot, and there are a large number of research results. First, background information of privacy protection for LBS was introduced, including application scenarios of LBS, the LBS framework, objects of privacy protection and system architectures of privacy protection. Second, adversary models and metrics for privacy protection in LBS was discussed. Third, four types of privacy-preserving techniques based on generalization and obfuscation for LBS were analyzed and summarized thoroughly. Finally, the potential research directions for privacy-preserving techniques for LBS in the future were shown.  相似文献   

15.
车辆自组网的位置隐私保护技术研究   总被引:1,自引:0,他引:1  
车辆自组网的位置服务在解决道路安全问题、为驾乘者提供便捷服务的同时,也带来了相应的隐私保护问题。总结了隐私保护内容,重点分析了车辆自组网的假名和签名2类隐私保护技术,其中假名方案分为基于特殊地形、基于安静时段、加密mix-zones和mix-zones通信代理;签名方案分为群签名和环签名。继而针对隐私保护水平的高低,分析了匿名集合、熵度量、数学理论分析和形式化证明几类主要的位置隐私度量方法,对其各自的特点进行了总结比较。  相似文献   

16.
Privacy-preserving data publishing(PPDP) is one of the hot issues in the field of the network security.The existing PPDP technique cannot deal with generality attacks,which explicitly contain the sensitivity attack and the similarity attack.This paper proposes a novel model,(w,y,k)-anonymity,to avoid generality attacks on both cases of numeric and categorical attributes.We show that the optimal(w,y,k)-anonymity problem is NP-hard and conduct the Top-down Local recoding(TDL) algorithm to implement the model.Our experiments validate the improvement of our model with real data.  相似文献   

17.
Privacy-preserving data publishing (PPDP) is one of the hot issues in the field of the network security. The existing PPDP technique cannot deal with generality attacks, which explicitly contain the sensitivity attack and the similarity attack. This paper proposes a novel model, (w,γ, k)-anonymity, to avoid generality attacks on both cases of numeric and categorical attributes. We show that the optimal (w, γ, k)-anonymity problem is NP-hard and conduct the Top-down Local recoding (TDL) algorithm to implement the model. Our experiments validate the improvement of our model with real data.  相似文献   

18.
    
Location-based service (LBS) brings a lot of conveniences in people’s daily life,but the conveniences are accompanied with the leaking of privacy.A dummy-based location-preserving scheme was proposed,which took the correlation between spatial issues and temporal issues into account.Two algorithms were included in this scheme,map dividing algorithm and dummy contents determining algorithm.The map dividing algorithm divided the map into discrete location cells by Voronoi Diagram to ensure these discrete location cells were not adjacent to each other.The dummy contents determining algorithm replaced the query content in previous moment by the intending location in next moment,which efficiently avoided the adversary inferring mobile users’ sensitive information according to the correlation between spatial issues and temporal issues.The simulation experiments show that the proposed scheme is effective and efficient.  相似文献   

19.
    
Rapid development of wireless networks brings about many security problems in portable communication systems (PCSs), which can provide mobile users with an opportunity to enjoy global roaming services. In this regard, designing a secure user authentication scheme, especially for recognizing legal roaming users, is indeed a challenging task. It is noticed that there is no delegation-based protocol for PCSs, which can guarantee anonymity, untraceability, perfect forward secrecy, and resistance of denial-of-service (DoS) attack. Therefore, in this article, we put forward a novel delegation-based anonymous and untraceable authentication protocol, which can guarantee to resolve all the abovementioned security issues and hence offer a solution for secure communications for PCSs.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号