共查询到18条相似文献,搜索用时 125 毫秒
1.
2.
3.
4.
5.
6.
本文就当前国内基于位置的服务业务发展的状态和挑战进行分析,分析了隐私问题和定位精度问题对发展基于位置服务的业务的影响;阐述了作为移动网络的新增基本功能,位置服务具有整合移动网络、地图信息服务、互联网服务的能力。 相似文献
7.
8.
数据分析与挖掘技术是构建经营分析系统的关键技术,本文主要介绍了三种新的数据分析与挖掘技术:数据流技术、移动对象技术和基于位置服务的技术,数据流技术能够解决经营分析系统在实时处理动态产生的海量数据上的不足;移动对象技术可以使得经营分析系统对移动用户的时空数据加以利用,从而提供多种新业务及更好的决策支持;而基于位置服务技术将使得经营分析系统对开展定位相关业务提供决策支持. 相似文献
9.
肖祖丽 《内蒙古广播与电视技术》2003,(4):37-38
1 背景分析 位置服务即LCS(Location Services)又称定位服务,是通过移动通信网,获取移动用户的位置信息(经纬度坐标数据),然后提供相应服务的一种增值业务。开通这项服务,手机用户可以方便地获知自己目前所处的位置,并用手机查询或收取他附近各种场所的资讯。位置服务的巨大魅力正是在于能在正确的时间,正确的地点把正确的信息发送给正确的人。同时它还可以对手机用户进行定位,并对手机用户的位置进行实时监测和跟踪,使所有被控对象都显示在监控中心的电子地图上,一目了然。因 相似文献
10.
11.
随着基于位置的服务(10cation—basedservices,简称LBS)的广泛应用,个人位置信息的保护越来越受到人们关注。在LBS服务中,常常会遇到“谁附近有什么资源”的问题,“谁”代表实体位置,“什么”代表服务请求。在“谁附近有什么”的信息查询服务过程中,如何在保护“谁”的基础上提供相对可靠的服务,将是本文的研究重点。针对这一问题,用模糊集来实现对“谁”的保护,并针对模糊集,提出一种基于位置隐私保护的模糊查询方法,在模糊位置信息的基础上提供相对可靠的服务,并在一定程度上实现了位置隐私保护和位置服务质量之间的平衡。最后,通过相关实验来评估该方法的性能。 相似文献
12.
Yanzhe Che Qinming He Xiaoyan Hong Kevin Chiew 《International Journal of Communication Systems》2015,28(1):167-186
While enjoying various LBS (location‐based services), users also face the threats of location privacy disclosure. This is because even if the communications between users and LBS providers can be encrypted and anonymized, the sensitive information inside LBS queries may disclose the exact location or even the identity of a user. The existing research on location privacy preservation in mobile peer‐to‐peer (P2P) networks assumed that users trust each other and directly share location information with each other. Nonetheless, this assumption is not practical for most of the mobile P2P scenarios, for example, an adversary can pretend to be a normal user and collect the locations of other users. Aiming at this issue, this paper presents x‐region as a solution to preserve the location privacy in a mobile P2P environment where no trust relationships are assumed amongst mobile users. The main idea is to allow users to share a blurred region known as x‐region instead of their exact locations so that one cannot distinguish any user from others inside the region. We propose a theoretical metric for measuring the anonymity property of x‐region, together with three algorithms for generating an x‐region, namely, benchmark algorithm, weighted expanding algorithm, and aggressive weighted expanding algorithm. These algorithms achieve the anonymity and QoS requirements with different strategies. Our experiments verify the performance of the algorithms against three key metrics. Copyright © 2013 John Wiley & Sons, Ltd. 相似文献
13.
14.
移动用户在享受基于位置的服务(LBS)的同时受到位置隐私泄露的威胁,因而提供有效的位置隐私保护策略至关重要。传统的位置隐私保护方法主要采用空间匿名的方式,若攻击者获得了更多与匿名空间相关的背景知识,尤其是与位置相关的语义信息,就会严重降低匿名效果。为了防止由位置语义分析造成的敏感位置信息泄露,并根据移动用户活动范围大多限定为道路网络的特点,提出一种基于位置语义的路网位置隐私保护方法,充分考虑了用户的个性化隐私需求,并通过实验验证了方法的可行性及有效性。 相似文献
15.
While providing plenty of convenience for users in daily life, the increasingly popular location-based ser-vice(LBS) posed a serious threat to users' privacy. The research about privacy-preserving techniques for LBS is becoming a hot spot, and there are a large number of research results. First, background information of privacy protection for LBS was introduced, including application scenarios of LBS, the LBS framework, objects of privacy protection and system architectures of privacy protection. Second, adversary models and metrics for privacy protection in LBS was discussed. Third, four types of privacy-preserving techniques based on generalization and obfuscation for LBS were analyzed and summarized thoroughly. Finally, the potential research directions for privacy-preserving techniques for LBS in the future were shown. 相似文献
16.
石云 《信息安全与通信保密》2006,(4):67-69
定位服务的关键在于对用户位置信息的使用,而位置信息与个人隐私密切相关,为了防止位置信息的滥用,定位系统需要充分考虑用户的私密性保护。论文针对不同类型的业务分析了私密性保护的需求,并根据定位系统的体系结构提出了私密性保护的必要方面,最后结合定位流程描述了私密性控制的实现。 相似文献
17.
In the process of continuous queries,a method of trajectory privacy protection based on location obfuscation was proposed to solve the problem that K-anonymity was difficult to guarantee user privacy in third party architectrue.Firstly,the (G-1) query obfuscation locations through the location prediction was obtained and the dummy location selection mechanism,and then sent them together with the user’s real query location to different anonymizers to form cloaking regions and sent them to the LBS server for queries,and the query results were returned to the user by different anonymizers.In this method,the user’s real query location was confused by the location obfuscation,and the attacker couldn’t deduce the user’s trajectory from a single anonymizer or the LBS server.The method can enhance the privacy of the user’s trajectory and can effectively solve the performance bottleneck in the single anonymizer structure.Security analysis shows the security of the proposed approach,and experiments show this method can reduce the number of interactions between the user and the LBS server and the overhead of the single anonymizer. 相似文献
18.
Abdur R. Shahid Niki Pissinou S.S. Iyengar Kia Makki 《International Journal of Communication Systems》2021,34(1)
The ubiquitous use of location‐based services (LBS) through smart devices produces massive amounts of location data. An attacker, with an access to such data, can reveal sensitive information about users. In this paper, we study location inference attacks based on the probability distribution of historical location data, travel time information between locations using knowledge of a map, and short and long‐term observation of privacy‐preserving queries. We show that existing privacy‐preserving approaches are vulnerable to such attacks. In this context, we propose a novel location privacy‐preserving approach, called KLAP, based on the three fundamental obfuscation requirements: minimum k ‐locations, l ‐diversity, and privacy a rea p reservation. KLAP adopts a personalized privacy preference for sporadic, frequent, and continuous LBS use cases. Specifically, it generates a secure concealing region (CR) to obfuscate the user's location and directs that CR to the service provider. The main contribution of this work is twofold. First, a CR pruning technique is devised to establish a balance between privacy and delay in LBS usage. Second, a new attack model called a long‐term obfuscated location tracking attack, and its countermeasure is proposed and evaluated both theoretically and empirically. We assess KLAP with two real‐world datasets. Experimental results show that it can achieve better privacy, reduced delay, and lower communication costs than existing state‐of‐the‐art methods. 相似文献