首页 | 本学科首页   官方微博 | 高级检索  
     

针对LBS中非可信用户协作构建匿名域的研究
引用本文:杨祎綪,袁家斌.针对LBS中非可信用户协作构建匿名域的研究[J].计算机工程与应用,2014,50(14):82-87.
作者姓名:杨祎綪  袁家斌
作者单位:南京航空航天大学 计算机科学与技术学院,南京 210016
摘    要:基于位置的服务作为一种不断发展的新型服务模式,为人们的生活带来了极大的便利。但另一方面,用户的位置隐私也受到了很大的威胁。从LBS位置隐私保护的实际应用出发,根据现有的位置隐私保护模型,分析了在用户协作构建匿名域的方式下,用户非完全可信时,位置隐私面临的威胁,提出了User-Cooperation Security(UCA)匿名算法,在P2P空间匿名算法的基础上引入数字签名技术,实现用户之间的身份认证,并且在通信过程中,用接收方的私钥加密位置信息,避免了攻击者窃取他们的位置信息。算法中还加入了用户可以容忍的最大等待时间这一参数,通过等待一段时间重新进行节点发现,有效地提高了匿名成功率。通过实验验证,该算法可以更好地保护用户的位置隐私。

关 键 词:基于位置的服务(LBS)  k-匿名  数字签名  用户协作  隐私保护  

Research on incredible users cooperate constructing anonymous region in LBS
YANG Yiqian,YUAN Jiabin.Research on incredible users cooperate constructing anonymous region in LBS[J].Computer Engineering and Applications,2014,50(14):82-87.
Authors:YANG Yiqian  YUAN Jiabin
Affiliation:College of Computer Science & Technology, Nanjing University of Aeronautics & Astronautics, Nanjing 210016, China
Abstract:As a new service model, location-based service brings people great convenience. But, users’ location privacy is facing a lot of threat. According to the actual application on location privacy protection in LBS and the existing privacy protection model, the paper analyzes the threat when using the method based on users’ cooperation to protect location privacy and the users are not fully confidential, and proposes an algorithm called User-Cooperation Security(UCA) spatial algorithm. The algorithm introduces digital signature into the peer-to-peer spatial cloaking algorithm, so that users can realize the identity authentication with others and encrypt the sensitive messages with the private key of receiving party before they send them, avoiding the attackers stealing their position. Besides, the algorithm can discover more nodes when the users broadcast discovering messages again after a little time. Through the experiment, the algorithm is proved that it can protect users’ location privacy better.
Keywords:Location Based Services(LBS)  k-anonymity  digital signature  users&rsquo  cooperation  privacy protection  
本文献已被 CNKI 等数据库收录!
点击此处可从《计算机工程与应用》浏览原始摘要信息
点击此处可从《计算机工程与应用》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号