基于位置服務(wù)的軌跡隱私保護技術(shù)研究
發(fā)布時間:2018-05-18 13:20
本文選題:位置服務(wù) + LBS ; 參考:《杭州電子科技大學(xué)》2014年碩士論文
【摘要】:隨著無線傳感網(wǎng)絡(luò)技術(shù)和移動無線全球定位技術(shù)的迅速發(fā)展,基于位置的移動應(yīng)用服務(wù)(Location-Based Service,LBS)越來越被廣泛的應(yīng)用于生活的方方面面,在使用位置服務(wù)的時候,用戶需要將自己的位置信息和查詢消息一起發(fā)送給位置服務(wù)提供商,這就有很大可能導(dǎo)致用戶的位置隱私和查詢隱私的泄漏。因此,針對位置隱私保護技術(shù)的研究得到了廣泛的關(guān)注,并且提出了眾多的方法來保護用戶的位置隱私。但是,現(xiàn)有的方法很多都是針對用戶單個位置的隱私保護,而現(xiàn)實情況是,用戶始終處在一個連續(xù)運動的狀態(tài)下,在每一個地點都有可能發(fā)出位置查詢服務(wù),由此可以產(chǎn)生一個用戶運動的軌跡。因此如何保證這條軌跡不被攻擊者識別出來就是連續(xù)查詢條件下要解決的問題。本文根據(jù)隱私保護的系統(tǒng)結(jié)構(gòu),針對軌跡隱私保護的問題,,作了如下幾個方面的研究和探討: (1)深入介紹了基于位置的服務(wù)及位置服務(wù)中的隱私保護問題。 (2)針對軌跡中用戶的敏感位置,提出了一種基于抑制法的軌跡隱私保護模型,通過抑制用戶軌跡中敏感位置的發(fā)布,再從概率統(tǒng)計出發(fā),選擇用戶到達概率最大的非敏感位置代替敏感位置發(fā)布。從而保護了用戶軌跡上敏感位置的泄露,進而使得用戶軌跡得到保護。此方法可有效阻止攻擊者實施基于敏感位置的攻擊。并給出了基于抑制法的軌跡隱私保護度的計算方法。 (3)提出了一種基于假軌跡的軌跡隱私保護方法,通過生成與真實軌跡相似的假軌跡來降低攻擊者識別真實軌跡的概率,從而提高軌跡隱私保護度。最后,通過仿真實驗與隨機生成假軌跡方法相對比,驗證了假軌跡方法的有效性。
[Abstract]:With the rapid development of wireless sensor network technology and mobile wireless global positioning technology, Location-Based Service LBSs (LBSs), a location-based mobile application service, are more and more widely used in all aspects of life. Users need to send their location information and query message to the location service provider together, which may lead to the leak of location privacy and query privacy. Therefore, the research of location privacy protection technology has been widely concerned, and many methods are proposed to protect the location privacy of users. However, many of the existing methods are aimed at the privacy protection of the user's individual location, and the reality is that the user is always in a state of continuous motion, and it is possible to issue a location query service at each location. Thus, a trajectory of user motion can be generated. Therefore, how to ensure that the trajectory is not recognized by the attacker is a problem to be solved under the condition of continuous query. According to the system structure of privacy protection and the problem of trajectory privacy protection, this paper studies and discusses the following aspects: This paper introduces the privacy protection of location-based services and location services. (2) aiming at the sensitive position of the user in the trajectory, a trajectory privacy protection model based on the suppression method is proposed. By suppressing the release of the sensitive position in the user's trajectory, and then starting from the probability statistics, Select the non-sensitive location where the user has the highest probability of arrival instead of the sensitive location. Thus, the leakage of sensitive position on the user's trajectory is protected, and then the user's trajectory is protected. This method can effectively prevent an attacker from carrying out an attack based on sensitive location. The calculation method of trajectory privacy protection based on suppression method is also presented. (3) A new path privacy protection method based on false trajectory is proposed. By generating false trajectory similar to real trajectory, the probability of identifying real trajectory is reduced, and the degree of privacy protection of trajectory is improved. Finally, the validity of the false trajectory method is verified by comparing the simulation experiment with the random generated false trajectory method.
【學(xué)位授予單位】:杭州電子科技大學(xué)
【學(xué)位級別】:碩士
【學(xué)位授予年份】:2014
【分類號】:TN929.5
【參考文獻】
相關(guān)期刊論文 前4條
1 陳洌;馮云霞;戴國駿;;LBS中基于移動終端的連續(xù)查詢用戶軌跡隱匿方法[J];計算機應(yīng)用研究;2011年12期
2 潘曉;肖珍;孟小峰;;位置隱私研究綜述[J];計算機科學(xué)與探索;2007年03期
3 林欣;李善平;楊朝暉;;LBS中連續(xù)查詢攻擊算法及匿名性度量[J];軟件學(xué)報;2009年04期
4 陸鋒;鄭年波;段瀅瀅;張健欽;;出行信息服務(wù)關(guān)鍵技術(shù)研究進展與問題探討[J];中國圖象圖形學(xué)報;2009年07期
本文編號:1905982
本文鏈接:http://sikaile.net/kejilunwen/wltx/1905982.html
最近更新
教材專著