基于用户分布感知的移动P2P快速位置匿名算法
作者:
作者简介:

许明艳(1974-),女,河南新乡人,副研究员,主要研究领域为移动通信,移动互联网安全;季新生(1968-),男,教授,博士生导师,主要研究领域为电信网安全,移动通信,移动互联网安全;赵华(1979-),女,讲师,主要研究领域为移动通信,移动互联网安全;申涓(1977-),女,讲师,主要研究领域为网络体系结构,移动互联网安全.

通讯作者:

许明艳,E-mail:xumingyan886@126.com

基金项目:

国家自然科学基金(61521003);Research on the Fundamental Theories for Cyber-Space Mimic Defense


Distribution-Perceptive-Based Spatial Cloaking Algorithm for Location Privacy in Mobile Peer-to-Peer Enviroments
Author:
Fund Project:

National Natural Science Foundation (61521003); Research on the Fundamental Theories for Cyber-Space Mimic Defense

  • 摘要
  • | |
  • 访问统计
  • |
  • 参考文献 [23]
  • |
  • 相似文献 [20]
  • | | |
  • 文章评论
    摘要:

    针对移动点对点(P2P)结构下位置隐私保护匿名区形成存在着通信开销大、匿名效率低以及成功率低等问题,提出了一种移动P2P结构下用户分布感知方案,用户在邻域内共享邻域加权密度参数,获取邻域用户实时分布信息,根据用户分布特征为用户推荐隐私参数及候选用户查找半径,帮助用户快速形成匿名区.仿真结果表明,该算法通信开销小,在满足移动P2P网络移动设备节能需求的同时,匿名区生成时间平均在500ms以下,平均成功率达到92%以上.

    Abstract:

    The mobile peer-to-peer environment is easier to implement in location privacy preserving research. The mobile users cooperate through P2P multi-hop routing to blur their accurate locations into a spatial cloaking region, but most existing spatial cloaking algorithm cannot work well because of the high communication overhead, time consumption and the lower success rate. This paper proposes an algorithm that can recommend user's privacy requirements by collecting users' weighed density information in their neighborhood, and therefore help mobile users to find enough collaborative users quickly. The approach shows great anonymization success rate by 92% through extensive simulation experiments for a range of P2P environment scenarios. It achieves lower communication cost and less than 500ms of searching time at the same time.

    参考文献
    [1] Gruteser M, Grunwald D. Anonymous usage of location-based services through spatial and temporal cloaking. In:Proc. of the 1st Int'l Conf. on Mobile Systems, Applications and Services. New York:ACM Press, 2003. 31-42.
    [2] Gedik B, Liu L. Location privacy in mobile systems:A personalized anonymization model. In:Proc. of the 25th IEEE Int'l Conf. on Distributed Computing Systems. IEEE, 2005. 620-629.
    [3] Bu GG, Liu L. A customizable k-anonymity model for protecting location privacy. In:Proc. of the ICDCS. 2004. 620-629.
    [4] Mokbel MF, Chow CY, Aref WG. The new Casper:Query processing for location services without compromising privacy. In:Proc. of the 32nd Int'l Conf. on Very Large Data Bases. VLDB Endowment, 2006. 763-774.
    [5] Duckham M, Kulik L. A formal model of obfuscation and negotiation for location privacy. In:Pervasive Computing. Berlin, Heidelberg:Springer-Verlag, 2005. 152-170.
    [6] Chow CY, Mokbel MF, Liu X. A peer-to-peer spatial cloaking algorithm for anonymous location-based service. In:Proc. of the 14th Annual ACM Int'l Symp. on Advances in Geographic Information Systems. ACM, 2006. 171-178.
    [7] Che Y, Yang Q, Hong X. A dual-active spatial cloaking algorithm for location privacy preserving in mobile peer-to-peer networks. In:Proc. of the 2012 IEEE Wireless Communications and Networking Conf. (WCNC). IEEE, 2012. 2098-2102.
    [8] Chow CY, Mokbel MF, Liu X. Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments. GeoInformatica, 2011,15(2):351-380.
    [9] Mokbel MF, Chow CY. Challenges in preserving location privacy in peer-to-peer environments. In:Proc. of the 7th Int'l Conf. on Web-Age Information Management Workshops, WAIM 2006. IEEE, 2006. 1.
    [10] Huang Y, Huo Z, Meng X. CoPrivacy:A collaborative location privacy-preserving method without cloaking. Chinese Journal of Computers, 2011,34(10):1976-1985(in Chinese with English abstract).
    [11] Zhang C, Huang Y. Cloaking locations for anonymous location based services:A hybrid approach. GeoInformatica, 2009,13(2):159-182.
    [12] Yang N, Cao Y, Liu Q, et al. A novel personalized TTP-free location privacy preserving method. Int'l Journal of Security and Its Applications, 2014,8(2):387-398.
    [13] Solanas A, Martinez-Balleste A. A TTP-free protocol for location privacy in location-based services. Computer Communications, 2008,31(6):1181-1191.
    [14] Hashem T, Kulik L. "Don't trust anyone":Privacy protection for location-based services. Pervasive and Mobile Computing, 2011, 7(1):44-59.
    [15] Gao S, Ma J, Yao Q, et al. Towards cooperation location privacy-preserving group nearest neighbor queries in LBS. Journal on Communication, 2015,3:142-150(in Chinese with English abstract).
    [16] Ghaffari M, Ghadiri N, Manshaei MH, et al. P4QS:A peer to peer privacy preserving query service for location-based mobile applications. IEEE Trans. on Vehicular Technology, 2016,PP(99):1.
    [17] Dargahi T, Ambrosin M, Conti M, et al. ABAKA:A novel attribute-based k-anonymous collaborative solution for LBSs. Computer Communications, 2016,85:1-13.
    [18] Pingley A, Yu W, Zhang N, et al. CAP:A context-aware privacy protection system for location-based services. In:Proc. of the IEEE Int'l Conf. on Distributed Computing Systems. 2009. 49-57.
    [19] Ahamed SI, Haque MM, Hasan CS. A novel location privacy framework without trusted third party based on location anonymity prediction. ACM SIGAPP Applied Computing Review, 2012,12(1):24-34.
    [20] Brinkhoff T. A framework for generating network-based moving objects. GeoInformatica, 2002,6(2):153-180.
    附中文参考文献:
    [10] 黄毅,霍峥,孟小峰.CoPrivacy:一种用户协作无匿名区域的位置隐私保护方法.计算机学报,2011,34(10):1976-1985.
    [15] 高胜,马建峰,姚青松,孙聪.LBS中面向协同位置隐私保护的群组最近邻查询.通信学报,2015,3:142-150.
    引证文献
    网友评论
    网友评论
    分享到微博
    发 布
引用本文

许明艳,赵华,季新生,申涓.基于用户分布感知的移动P2P快速位置匿名算法.软件学报,2018,29(7):1852-1862

复制
分享
文章指标
  • 点击次数:4883
  • 下载次数: 6292
  • HTML阅读次数: 3365
  • 引用次数: 0
历史
  • 收稿日期:2017-05-18
  • 最后修改日期:2017-07-13
  • 在线发布日期: 2017-10-17
文章二维码
您是第19830970位访问者
版权所有:中国科学院软件研究所 京ICP备05046678号-3
地址:北京市海淀区中关村南四街4号,邮政编码:100190
电话:010-62562563 传真:010-62562533 Email:jos@iscas.ac.cn
技术支持:北京勤云科技发展有限公司

京公网安备 11040202500063号