共查询到18条相似文献,搜索用时 46 毫秒
1.
随着智能终端的普及和无线通信技术的发展,基于位置的服务已渗入到人们的日常生活当中.这些服务在给人们的日常生活带来便利的同时,也带来隐私泄漏的风险.针对轨迹数据的推理攻击不仅可分析出目标用户的家庭住址、工作地点等敏感位置信息,甚至可推测出用户的生活习惯、健康状态、宗教信仰等隐私信息.轨迹隐私能否得到妥善保护已成为制约移动互联网发展的瓶颈问题.本文对已有的轨迹隐私保护方法进行了分类描述,并分析已有工作的优缺点,最后指明未来的研究方向. 相似文献
2.
3.
4.
为解决轨迹差分隐私保护中存在的隐私预算与服务质量等问题,提出了一种融合预测扰动的轨迹差分隐私保护机制。首先,利用马尔可夫链和指数扰动方法预测满足差分隐私和时空安全的扰动位置,并引入服务相似地图检测该位置的可用性;如果预测成功,则直接采用预测位置替代差分扰动的位置,以降低连续查询的隐私开销并提高服务质量。在此基础上,设计基于w滑动窗口的轨迹隐私预算分配机制,确保轨迹中任意连续的w次查询满足ε-差分隐私,解决连续查询的轨迹隐私问题。此外,基于敏感度地图设计一种隐私定制策略,通过自定义语义位置的隐私敏感度,实现隐私预算的量身定制,从而进一步提高其利用率。最后,利用真实数据集对所提方案进行实验分析,结果显示所提方案提供了更好的隐私保护水平和服务质量。 相似文献
5.
6.
针对传统的基于位置的服务(LBS)隐私保护模式的不足,提出了一种新的位置隐私保护技术,利用RSA密码体制,构造一种盲签名方案来实现用户真实身份的隐藏,从而达到了保护位置信息的目的,实现用户对位置隐私的完全控制,分析结果表明,该技术能有效降低通信开销以及服务器与客户端的处理代价。 相似文献
7.
8.
9.
10.
11.
12.
13.
Location-based service (LBS) brings a lot of conveniences in people’s daily life,but the conveniences are accompanied with the leaking of privacy.A dummy-based location-preserving scheme was proposed,which took the correlation between spatial issues and temporal issues into account.Two algorithms were included in this scheme,map dividing algorithm and dummy contents determining algorithm.The map dividing algorithm divided the map into discrete location cells by Voronoi Diagram to ensure these discrete location cells were not adjacent to each other.The dummy contents determining algorithm replaced the query content in previous moment by the intending location in next moment,which efficiently avoided the adversary inferring mobile users’ sensitive information according to the correlation between spatial issues and temporal issues.The simulation experiments show that the proposed scheme is effective and efficient. 相似文献
14.
基于位置服务中用户信息安全保护方法 总被引:1,自引:0,他引:1
由于物联网位王服务(LBS)中信息的采集与传输非常频繁,采集终端遍布全球,信息的安全问题是关系到物联网产业能否安全可持续发展,为了解决在物联网LBS中的隐私保护的问题,提出了一个新的面向隐私保护的安全模型,使位置掩护设施来加强隐私信息保护,能够以时间和空间属性的方式来掩盖用户的真实位置.与其他的保护隐私的方法相比,本文提出的访问控制模型能更灵活、更完善地保护用户的隐私信息. 相似文献
15.
《Journal of Location Based Services》2013,7(4):268-284
Tourist recommendation services provide suggestions for places of interest. While the spatial structure of a tourist's visit has been successfully exploited to improve the quality of place recommendations, its temporal structure has not been taken into account so far. This is surprising because the importance of the visitors' time management is well known from tourism research. We present findings of an empirical study that sheds light on the temporal aspects of tourist exploration behaviour and discuss implications for the design of tourist-recommender systems. The data-set consists of interviews, GPS tracks and geo-referenced photo sequences from visitors of a typical Middle European destination for cultural tourism. Among the results relevant to place recommending are the following: (1) the set of places is often replanned during the visit; (2) comparing place popularity based on photo frequency and place popularity based on staying time, we found notable differences in rank ordering; and (3) the photo frequency and the detour sinuosity of the GPS tracks are decreasing slowly over time. We interpret this last finding as a time-geographic cone effect. Based on the empirical results, we discuss the implications for the design of tourist-recommending services and propose a corresponding user interface utilising a recommendation strategy that tries to counterbalance the time-geographic cone effect, that is, to decelerate the visiting experience. 相似文献
16.
随着无线通信技术和智能移动终端的快速发展,基于位置的服务(LBS)在军事、交通、物流等诸多领域得到了广泛应用,它能够根据移动对象的位置信息提供个性化服务。在人们享受各种位置服务的同时,移动对象个人信息泄露的隐私威胁也渐渐成为一个严重的问题。为移动用户提供位置服务的同时,保护移动用户的位置隐私也至关重要。本文就位置业务隐私保护技术和位置业务隐私管控手段进行了探讨。 相似文献
17.
While providing plenty of convenience for users in daily life, the increasingly popular location-based ser-vice(LBS) posed a serious threat to users' privacy. The research about privacy-preserving techniques for LBS is becoming a hot spot, and there are a large number of research results. First, background information of privacy protection for LBS was introduced, including application scenarios of LBS, the LBS framework, objects of privacy protection and system architectures of privacy protection. Second, adversary models and metrics for privacy protection in LBS was discussed. Third, four types of privacy-preserving techniques based on generalization and obfuscation for LBS were analyzed and summarized thoroughly. Finally, the potential research directions for privacy-preserving techniques for LBS in the future were shown. 相似文献
18.
The recent proliferation of wireless local area networks (WLAN) has introduced new location privacy risks. An adversary controlling several access points could triangulate a client’s position. In addition, interface identifiers uniquely identify each client, allowing tracking of location over time. We enhance location privacy through frequent disposal of a client’s interface identifier. While not preventing triangulation per se, it protects against an adversary following a user’s movements over time. Design challenges include selecting new interface identifiers, detecting address collisions at the MAC layer, and timing identifier switches to balance network disruptions against privacy protection. Using a modified authentication protocol, network operators can still control access to their network. An analysis of a public WLAN usage trace shows that disposing addresses before reassociation already yields significant privacy improvements.
Marco Gruteser is a Ph.D. candidate in computer science, advised by Prof. Dirk Grunwald at the University of Colorado at Boulder. His research interests include location privacy, context-aware applications, and wireless networks. He received his MS in computer science from the University of Colorado at Boulder and completed a Vordiplom at the Technical University Darmstadt, Germany. During a one-year leave at the IBM T.J. Watson Research Center, he developed software infrastructure that integrates sensors to support context-aware applications in the BlueSpace smart office project. He is a student member of the ACM. Contact him at Campus Box 430, Boulder, CO 80309-0430;.
Dirk Grunwald received his Ph.D. from the University of Illinois in 1989 and joined the University of Colorado the same year. His work addresses research and teaching in the broad area of “computer systems”, which includes computer architecture, operating systems, networks, and storage systems. His interests also include issues in pervasive computing, novel computing models, and enjoying the mountains. He is currently an Associate Professor in the Department of Computer Science and in Electrical and Computer Engineering and is also the Director of the Colorado Center for Information Storage.This revised version was published online in AUgust 2005 with a corrected cover date. 相似文献