首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到18条相似文献,搜索用时 46 毫秒
1.
随着智能终端的普及和无线通信技术的发展,基于位置的服务已渗入到人们的日常生活当中.这些服务在给人们的日常生活带来便利的同时,也带来隐私泄漏的风险.针对轨迹数据的推理攻击不仅可分析出目标用户的家庭住址、工作地点等敏感位置信息,甚至可推测出用户的生活习惯、健康状态、宗教信仰等隐私信息.轨迹隐私能否得到妥善保护已成为制约移动互联网发展的瓶颈问题.本文对已有的轨迹隐私保护方法进行了分类描述,并分析已有工作的优缺点,最后指明未来的研究方向.  相似文献   

2.
叶阿勇  林少聪  马建峰  许力 《电子学报》2015,43(7):1362-1368
随着基于位置的信息服务的日益普及,位置信息的隐私保护已逐渐成为了一个突出的安全问题.因此,提出了一种基于主动共享机制的位置隐私保护方案,该方案引入位置服务信息的邻近共享机制,通过在邻居节点主动共享位置服务信息,有效降低了移动用户对位置服务器的依赖,从而提高了其位置信息的隐私性.论文分别采用病毒传播模型和仿真实验对方案进行理论分析和有效性验证.  相似文献   

3.
从位置隐私保护理论模型和位置隐私保护方法两个方面入手,对智能移动终端上的位置隐私保护研究现状进行了探讨,重点研究当前模型和方法的优缺点以及各自的适用场景;结合智能终端和移动互联网的发展趋势,指出当前位置隐私保护技术存在的问题,对未来的研究方向提出了建议。  相似文献   

4.
为解决轨迹差分隐私保护中存在的隐私预算与服务质量等问题,提出了一种融合预测扰动的轨迹差分隐私保护机制。首先,利用马尔可夫链和指数扰动方法预测满足差分隐私和时空安全的扰动位置,并引入服务相似地图检测该位置的可用性;如果预测成功,则直接采用预测位置替代差分扰动的位置,以降低连续查询的隐私开销并提高服务质量。在此基础上,设计基于w滑动窗口的轨迹隐私预算分配机制,确保轨迹中任意连续的w次查询满足ε-差分隐私,解决连续查询的轨迹隐私问题。此外,基于敏感度地图设计一种隐私定制策略,通过自定义语义位置的隐私敏感度,实现隐私预算的量身定制,从而进一步提高其利用率。最后,利用真实数据集对所提方案进行实验分析,结果显示所提方案提供了更好的隐私保护水平和服务质量。  相似文献   

5.
针对连续使用基于位置的服务(LBS)会造成用户位置隐私泄露的问题,首先基于路网拓扑关系,提出了隐私级别划分算法——RPL算法,对敏感路段进行隐私级别划分.然后,提出差分隐私位置保护机制DPLPM,通过为敏感路段分配隐私预算并添加Laplace噪声,实现对位置数据的隐私保护.实验结果表明,所提机制能有效保护位置隐私,具有...  相似文献   

6.
刘思思  叶猛 《电视技术》2014,38(3):95-98
针对传统的基于位置的服务(LBS)隐私保护模式的不足,提出了一种新的位置隐私保护技术,利用RSA密码体制,构造一种盲签名方案来实现用户真实身份的隐藏,从而达到了保护位置信息的目的,实现用户对位置隐私的完全控制,分析结果表明,该技术能有效降低通信开销以及服务器与客户端的处理代价。  相似文献   

7.
随着移动技术的日益发展,互联网从传统的PC端逐渐转向了以移动端为主要载体的新发展模式。位置服务在移动领域具有广泛的应用,但位置信息与用户身份的关联关系可能会被不法分子利用,给用户带来严重的伤害。文章研究了移动网络下的位置隐私保护,首先给出了三种位置服务结构,接着介绍了攻击者常用的攻击方法,并对典型的位置隐私保护技术进行了详细分析,最后结合服务需求和技术的发展趋势,指出了未来的保护技术研究重点。  相似文献   

8.
首先,提出一种基于中心服务器结构的位置隐私保护模型,然后,针对该模型设计了一种基于伪随机置换的位置隐私保护方案,此方案借鉴k-匿名技术、秘密信息检索技术的设计理念和方法,实现了完美匿名和基于位置的盲查询。最后,证明此方案具备不可追踪性和不可关联性等安全属性,并对方案的效率问题进行了分析。  相似文献   

9.
毛典辉  曹健  蔡强  李海生 《通信学报》2013,34(Z1):230-234
随着无线通信技术与智能移动终端的发展,基于位置的服务(LBS, location-based service)得到广泛应用,与移动对象位置相关的数据隐私保护已经成为LBS中的研究热点。首先简单介绍了位置隐私与情境感知的基本概念;其次,对现有的位置隐私保护方法从隐私保护效果、服务质量、系统结构和时空情境自适应性4个方面进行分析总结,指出了该研究的发展趋势;最后,对情境感知的位置隐私保护方法现状进行介绍,讨论了该领域存在的研究难点以及未来的研究方向。  相似文献   

10.
崔杰  陈学峰  张静  魏璐  仲红 《通信学报》2021,42(7):150-161
为了解决车联网中车辆用户使用基于位置的服务(LBS)时真实位置的泄露问题,提出一种基于公交车缓存的位置隐私保护方案.公交车先根据其线路信息向LBS提供商获取兴趣点(POI)池,然后在行驶时根据其当前位置从POI池中挑选部分POI数据形成POI列表并广播给周围私家车.私家车在接收到广播信息后,验证公交车身份,然后将POI...  相似文献   

11.
叶阿勇  李亚成  马建峰  许力 《通信学报》2014,35(11):162-170
针对当前基于位置的服务(LBS)系统存在的隐私保护度、位置服务质量和通信开销三者难于平衡的问题,提出了一种基于服务相似性的k-匿名位置隐私保护方法。在不改变现有LBS 系统架构的情况下,利用位置服务查询结果的相似性来辅助匿名服务器构造匿名区域,从而实现在确保用户隐私安全的基础上,有效提高服务质量和降低系统开销。最后,通过实验验证了该算法的有效性。  相似文献   

12.
车辆自组网的位置隐私保护技术研究   总被引:1,自引:0,他引:1  
车辆自组网的位置服务在解决道路安全问题、为驾乘者提供便捷服务的同时,也带来了相应的隐私保护问题。总结了隐私保护内容,重点分析了车辆自组网的假名和签名2类隐私保护技术,其中假名方案分为基于特殊地形、基于安静时段、加密mix-zones和mix-zones通信代理;签名方案分为群签名和环签名。继而针对隐私保护水平的高低,分析了匿名集合、熵度量、数学理论分析和形式化证明几类主要的位置隐私度量方法,对其各自的特点进行了总结比较。  相似文献   

13.
    
Location-based service (LBS) brings a lot of conveniences in people’s daily life,but the conveniences are accompanied with the leaking of privacy.A dummy-based location-preserving scheme was proposed,which took the correlation between spatial issues and temporal issues into account.Two algorithms were included in this scheme,map dividing algorithm and dummy contents determining algorithm.The map dividing algorithm divided the map into discrete location cells by Voronoi Diagram to ensure these discrete location cells were not adjacent to each other.The dummy contents determining algorithm replaced the query content in previous moment by the intending location in next moment,which efficiently avoided the adversary inferring mobile users’ sensitive information according to the correlation between spatial issues and temporal issues.The simulation experiments show that the proposed scheme is effective and efficient.  相似文献   

14.
基于位置服务中用户信息安全保护方法   总被引:1,自引:0,他引:1  
由于物联网位王服务(LBS)中信息的采集与传输非常频繁,采集终端遍布全球,信息的安全问题是关系到物联网产业能否安全可持续发展,为了解决在物联网LBS中的隐私保护的问题,提出了一个新的面向隐私保护的安全模型,使位置掩护设施来加强隐私信息保护,能够以时间和空间属性的方式来掩盖用户的真实位置.与其他的保护隐私的方法相比,本文提出的访问控制模型能更灵活、更完善地保护用户的隐私信息.  相似文献   

15.
Tourist recommendation services provide suggestions for places of interest. While the spatial structure of a tourist's visit has been successfully exploited to improve the quality of place recommendations, its temporal structure has not been taken into account so far. This is surprising because the importance of the visitors' time management is well known from tourism research. We present findings of an empirical study that sheds light on the temporal aspects of tourist exploration behaviour and discuss implications for the design of tourist-recommender systems. The data-set consists of interviews, GPS tracks and geo-referenced photo sequences from visitors of a typical Middle European destination for cultural tourism. Among the results relevant to place recommending are the following: (1) the set of places is often replanned during the visit; (2) comparing place popularity based on photo frequency and place popularity based on staying time, we found notable differences in rank ordering; and (3) the photo frequency and the detour sinuosity of the GPS tracks are decreasing slowly over time. We interpret this last finding as a time-geographic cone effect. Based on the empirical results, we discuss the implications for the design of tourist-recommending services and propose a corresponding user interface utilising a recommendation strategy that tries to counterbalance the time-geographic cone effect, that is, to decelerate the visiting experience.  相似文献   

16.
随着无线通信技术和智能移动终端的快速发展,基于位置的服务(LBS)在军事、交通、物流等诸多领域得到了广泛应用,它能够根据移动对象的位置信息提供个性化服务。在人们享受各种位置服务的同时,移动对象个人信息泄露的隐私威胁也渐渐成为一个严重的问题。为移动用户提供位置服务的同时,保护移动用户的位置隐私也至关重要。本文就位置业务隐私保护技术和位置业务隐私管控手段进行了探讨。  相似文献   

17.
    
While providing plenty of convenience for users in daily life, the increasingly popular location-based ser-vice(LBS) posed a serious threat to users' privacy. The research about privacy-preserving techniques for LBS is becoming a hot spot, and there are a large number of research results. First, background information of privacy protection for LBS was introduced, including application scenarios of LBS, the LBS framework, objects of privacy protection and system architectures of privacy protection. Second, adversary models and metrics for privacy protection in LBS was discussed. Third, four types of privacy-preserving techniques based on generalization and obfuscation for LBS were analyzed and summarized thoroughly. Finally, the potential research directions for privacy-preserving techniques for LBS in the future were shown.  相似文献   

18.
The recent proliferation of wireless local area networks (WLAN) has introduced new location privacy risks. An adversary controlling several access points could triangulate a client’s position. In addition, interface identifiers uniquely identify each client, allowing tracking of location over time. We enhance location privacy through frequent disposal of a client’s interface identifier. While not preventing triangulation per se, it protects against an adversary following a user’s movements over time. Design challenges include selecting new interface identifiers, detecting address collisions at the MAC layer, and timing identifier switches to balance network disruptions against privacy protection. Using a modified authentication protocol, network operators can still control access to their network. An analysis of a public WLAN usage trace shows that disposing addresses before reassociation already yields significant privacy improvements. Marco Gruteser is a Ph.D. candidate in computer science, advised by Prof. Dirk Grunwald at the University of Colorado at Boulder. His research interests include location privacy, context-aware applications, and wireless networks. He received his MS in computer science from the University of Colorado at Boulder and completed a Vordiplom at the Technical University Darmstadt, Germany. During a one-year leave at the IBM T.J. Watson Research Center, he developed software infrastructure that integrates sensors to support context-aware applications in the BlueSpace smart office project. He is a student member of the ACM. Contact him at Campus Box 430, Boulder, CO 80309-0430;. Dirk Grunwald received his Ph.D. from the University of Illinois in 1989 and joined the University of Colorado the same year. His work addresses research and teaching in the broad area of “computer systems”, which includes computer architecture, operating systems, networks, and storage systems. His interests also include issues in pervasive computing, novel computing models, and enjoying the mountains. He is currently an Associate Professor in the Department of Computer Science and in Electrical and Computer Engineering and is also the Director of the Colorado Center for Information Storage.This revised version was published online in AUgust 2005 with a corrected cover date.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号